Trust Portal

Start your security review
View & download sensitive information
ControlK

Welcome! Our Trust Portal is dedicated to showcasing our unwavering commitment to security, privacy, and compliance. Here, you can explore our robust security posture and access comprehensive documentation about our security program to streamline the security review process.

Designed to enhance transparency and instill confidence, our Trust Portal helps you manage risks effectively while using our software. By adhering to stringent security requirements, we strive to minimize cyber threats and uphold the highest standards of security and integrity.

SOC 2 Logo
SOC 2
ISO/IEC 27001:2022 Logo
ISO/IEC 27001:2022
ISO/IEC 27001 SoA Logo
ISO/IEC 27001 SoA
ISO/IEC 27017 Logo
ISO/IEC 27017
ISO/IEC 27018 Logo
ISO/IEC 27018
ISO/IEC 27701 Logo
ISO/IEC 27701
CISA: Secure-by-Design Pledge Logo
CISA: Secure-by-Design Pledge
DoD IL5 Logo
DoD IL5
FedRAMP High Logo
FedRAMP High
FedRAMP Moderate Logo
FedRAMP Moderate
TX-RAMP Logo
TX-RAMP
IRAP Logo
IRAP
ProcessUnity Logo
ProcessUnity
FIPS 140-2 Logo
FIPS 140-2
GDPR Logo
GDPR
EU-US DPF Logo
EU-US DPF
Swiss-US DPF Logo
Swiss-US DPF
UK Extension to EU-US DPF Logo
UK Extension to EU-US DPF
CCPA Logo
CCPA
CPRA Logo
CPRA
PCI DSS Logo
PCI DSS
TX-RAMP Level 2 Logo
TX-RAMP Level 2

Security and Trust Reports

Featured Documents

REPORTSPentest Summary Report
Trust Portal Updates

BeyondTrust Security Advisory: React and Next.js Vulnerability

Copy link
Incidents

In December 2025, BeyondTrust became aware of a critical vulnerability affecting React Server Components and frameworks such as Next.js, classified as CVE-2025-55182 (commonly referred to as “React2Shell”). This vulnerability could allow remote code execution under certain conditions.  

Our team immediately initiated an investigation to assess any potential impact on BeyondTrust systems or data. Using our suite of security tools and audit capabilities, we have found no evidence of compromise. Additionally, we have applied all vendor-recommended patches within our environment and implemented enhanced monitoring. 

We will continue to monitor the situation and provide updates as needed. For more information, refer to the official guidance from React and Nextjs , as well as any Cybersecurity & Infrastructure Security Agency (CISA) Alerts & Advisories.

Gainsight Incident Monitoring

Incidents

BeyondTrust is actively monitoring recent threat activity targeting SaaS supply chains, including the Gainsight-Salesforce compromise. In accordance with our incident response protocols, we immediately initiated an internal investigation, which has produced no evidence of impact to BeyondTrust systems or data. We continue to maintain heightened vigilance and continue to monitor for any anomalous activity.
 

Key Observations

  • Threat actors are leveraging social engineering and OAuth abuse in SaaS integrations.
  • No indicators of compromise or unauthorized access detected in BeyondTrust environments.
  • BeyondTrust continues to actively maintain comprehensive detection for behavioral anomalies such as OAuth token misuse and suspicious API calls.
     

Customer Impact Assessment

  • No observed impact to BeyondTrust customers.
  • All customer-facing services remain fully operational.
  • No evidence of unauthorized access to BeyondTrust data or systems.
  • BeyondTrust will promptly update customers if the situation changes.

F5 Networks Security Incident - No Impact to BeyondTrust

Incidents

In mid-October 2025, BeyondTrust became aware of a security incident disclosed by F5 Networks involving unauthorized access by a nation-state threat actor to internal systems, including their BIG-IP product development environment. 

Our team promptly reviewed our infrastructure and can confirm that we do not utilize any F5 technologies. Based on this assessment, we are not impacted by this incident. 

Out of an abundance of caution, we recommend:

  • Notifying supply chain partners to ensure awareness and evaluation of any potential downstream impacts
  • Continuing to monitor threat intelligence sources for indicators of compromise related to this disclosure
  • Maintaining heightened vigilance across your environment 

We remain committed to transparency and will provide updates should new information become available. For more details, please refer to the advisory posted by F5: https://www.f5.com/company/blog/f5-security-incident-update.

Salesforce / Drift Security Incident

Incidents

For details regarding the Salesforce/Drift security incident, please refer to the following link: Incident Summary.

Security Advisory - Privilege Management for Windows Vulnerability

Vulnerabilities

We want to inform you of a newly disclosed high vulnerabilities affecting Privilege Management for Windows for customers on versions prior to 25.4.270.0.
 
Vulnerability ID: BT25-05 and BT25-06
 
Severity: High
 
Description:

  • CVE-2025-2297: A vulnerability in Privilege Management for Windows allows a local authenticated attacker to elevate privileges by manipulating user profile files and injecting illegitimate challenge response codes into the local user registry.
  • CVE-2025-6250: A vulnerability in Privilege Management for Windows allows a local attacker with elevated privileges to bypass anti-tamper protections by stopping the Defendpoint service using wmic.exe, enabling unauthorized privilege escalation.

Public Disclosure Date: 2025-07-28
 
Customers can push version 25.4.270.0 to clients to remediate this vulnerability; customers with auto-update enabled will be patched automatically. Please note that this is not related to a security incident and is a proactive message from BeyondTrust. There are no known exploits for these vulnerabilities.
 
For more information, refer to the official Security Advisory.

If you think you may have discovered a vulnerability, please send us a note.
Report issue
Built onSafeBase by Drata Logo