PatchPilot exists because patch hygiene is the single biggest control gap that cyber-insurers and auditors care about. Our own security posture has to be at least as strong as the one we report on for our customers.
organization_id at the SQL layer. No shared tables across organisations; cross-tenant reads are physically impossible by design.Every framework below ships with an evidence-walkthrough document mapping PatchPilot features to specific control IDs — the exact thing an auditor or insurer asks for.
Patch management, secure configuration, malware protection, and access control mapped to all five Cyber Essentials controls.
Annex A controls 5.x — 8.x covered with audit-log evidence and policy attestations.
Trust Service Criteria evidence pack — CC6.x (Logical Access), CC7.x (System Operations), CC8.x (Change Management).
Article 32 technical measures, Article 28 processor obligations, DSAR-ready data export & delete.
Administrative, physical, and technical safeguards mapped to PatchPilot controls.
Patching, vulnerability scanning, audit-log retention, and access-review evidence.
Evidence walkthroughs (markdown, customer-redactable) are bundled with every paid plan. Your CISO, auditor, or cyber-insurance underwriter can pull the exact evidence they need from the audit log without going through us.
If you believe you have found a security vulnerability in PatchPilot, please report it privately to security@patchpilot.co.uk. We commit to:
For sensitive reports, please request our PGP public key by emailing security@ and we will respond with the key fingerprint and a current key file.
The agent intentionally collects the minimum signal needed to do its job. We do not collect:
In the event of a security incident affecting customer data:
Our backup-restore runbook is exercised at least quarterly; restore-to-clean-DB is timed and recorded in the launch-readiness compliance pack.