Technical overview
Security &
Compliance
This page is designed for IT, security, and procurement teams evaluating the Peopletree Group platform. It covers cloud architecture, encryption standards, access controls, compliance certifications, and integration capabilities.

Cloud architecture
Microsoft Azure infrastructure
The Peopletree platform runs on a dedicated Microsoft Azure subscription with EU-based data centres. All database infrastructure runs without public IP addresses, accessible only via private endpoints within a dedicated virtual network. Cryptographic key management is handled through Azure Key Vault with HSM backing.
Full technical architecture documentation - including network diagrams, NSG configurations, and component specifications - is available to clients and prospects in the Client Portal.
Access the Client PortalEncryption
Data protection standards
Identity & access
Access management
Data governance
Data handling & residency
Connectivity
Integrations & interoperability
The Peopletree platform integrates with any data source via REST API, SFTP, or direct database connection. Named integrations below are pre-built and tested; custom integrations are scoped during implementation.
Compliance
Certifications & audits
Peopletree Group undergoes independent third-party audits on an annual basis. Full reports are available to prospective customers and IT teams under NDA.
Independent audit confirming controls for security and confidentiality were suitably designed and operated effectively throughout the audit period. Full report available under NDA.
Annual gray-box penetration test conducted by an independent security firm. All identified findings are remediated and validated before the report is closed. Executive summary available under NDA.

Audited by Laika Compliance LLC under AICPA Trust Services Criteria. The audit confirmed that Peopletree Group's controls for security and confidentiality were suitably designed and operated effectively throughout the audit period. The full report is available to prospective customers and business partners under NDA.
Operational controls
Security procedures

Need the full security documentation?
The full SOC 2 Type 2 report, penetration test executive summary, and data processing agreements are available to prospective customers and IT teams under NDA.