Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Reclaim access anytime
Had access before? Reclaim access

Overview

More information available about ICE and its line of businesses available here: https://www.ice.com/index

ICE ensures the physical and digital security of its markets, clearing houses, mortgage technology, and data through industry-leading security technology and processes. ICE’s Information Security Department consists of diverse and skilled teams that work to protect confidential data from unauthorized access, misuse, disclosure, destruction, modification or disruption.

Our security team has four distinct functions:

  • IS Cybersecurity
  • IS Red Team
  • IS Application Security
  • IS Governance, Risk, and Compliance

Due to the number of requests received from regulators, members, customers of subsidiaries, and other stakeholders, ICE does not respond to individual inquiries or questionnaires from customers regarding the security of ICE systems. Further, to protect the security and integrity of ICE environments, it is company policy that we do not share information related to internal policies and procedures with third parties. We understand that our customers, as part of their internal vendor management procedures, request information related to security process and posture from their vendors from time to time. As such, ICE shares SOC reports with our customers that independently validate our internal information security controls through this Security Portal.

Through this portal you can request documents for our general ICE business unit.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
SOC 2 Logo
SOC 2
Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Reclaim access anytime
Had access before? Reclaim access

Documents

9 Documents
SOC 2
SIG Lite
Cyber Insurance
Business Continuity Policy
Other Policies
BC/DR

Product Security

Audit Logging
Data Security
Integrations
See more

Reports

Pentest Report

Self-Assessments

SIG Lite

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
BC/DR
Data Center
See more

Endpoint Security

Disk Encryption
DNS Filtering
Endpoint Detection & Response
See more

Network Security

Data Loss Prevention
Firewall
IDS/IPS
See more

Corporate Security

Email Protection
Employee Training
HR Security
See more

Policies

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
See more

Security Grades

Qualys SSL Labs
ice.com
A

Trust Center Updates

Welcome to the ICE Security Trust Center

Published at 05/24/2022, 8:53 PM

As a provider of global financial services and critical economic infrastructure, ICE is committed to cyber-resiliency internally and via third-party relationships - we are excited to announce the official launch of the ICE Security Trust Center. By using this portal, you can request access to our compliance documents, review our standardized questionnaires such as the SIG and gain a general understanding of our security posture.

Over time, our team will be making changes to this portal as we implement new tools and processes in our environment. You can use the Subscribe button to receive email notifications for when our team has an important update, such as if we have an updated compliance report or if we have a status update regarding a major security vulnerability that has been recently discovered.

-The ICE Third Party Due Diligence Team

If you think you may have discovered a vulnerability, please send us a note.