ShieldPage
← All articles
Guides · · 9 min read

How to Create a Professional Security Page for Your Website

A security page tells prospects, customers, and security researchers how you protect their data. Learn what to include, what to avoid, and how to publish one quickly.

A security page is one of the highest-value, lowest-effort pages a company can publish. It answers the questions your security-conscious prospects are already asking, it gives your sales team a resource to share in enterprise deals, and it demonstrates to regulators that you take data protection seriously. Yet most websites either do not have one or have a page that is too vague to be useful.

This guide covers what a professional security page should contain, how real companies structure theirs, and how to get yours live without a significant time investment.

Why a security page matters

  • Procurement teams and security reviewers at enterprise prospects who need to complete vendor risk assessments before signing a contract.
  • Existing customers who want reassurance after a data breach makes the news — even if it was not your breach.
  • Security researchers looking for your vulnerability disclosure policy before they report a finding.
  • Regulators and auditors who want to understand your security posture during an audit or incident investigation.
  • Journalists and analysts researching your security practices for a story or report.

NIS2 — the EU's updated network and information security directive — explicitly requires covered entities to demonstrate security practices to supervisory authorities. A security page is not a substitute for actual compliance, but it is part of showing your work.

What to include: the essential sections

### Infrastructure and hosting security

Describe where your infrastructure runs and what baseline protections are in place. This does not need to be a technical deep-dive — a clear summary is enough:

  • Cloud provider and region(s) (e.g., AWS EU-West-1, Frankfurt)
  • Encryption in transit (TLS 1.2 minimum, 1.3 preferred)
  • Encryption at rest (AES-256 or equivalent)
  • Network isolation and firewall configuration at a high level
  • DDoS protection (e.g., Cloudflare, AWS Shield)

### Access controls

Explain how you control who has access to production systems and customer data:

  • Multi-factor authentication requirement for all team members with production access
  • Principle of least privilege — staff only have access to what their role requires
  • Privileged access management for admin-level access
  • Access reviews and offboarding process

### Data handling

This section bridges your security page and your privacy policy:

  • Where customer data is stored (region, cloud provider)
  • How long data is retained
  • Data deletion process (especially relevant for GDPR Article 17 right-to-erasure requests)
  • Backup frequency and retention

### Certifications and audits

  • SOC 2 Type II (the most recognised in North America and increasingly in Europe)
  • ISO 27001
  • PCI DSS (for payment processing)
  • CSA STAR

If you have not yet achieved formal certification, be honest about it. "We are currently working toward SOC 2 Type II certification, expected Q3 2026" is better than silence or vague claims.

### Vulnerability disclosure policy

A vulnerability disclosure policy (VDP) tells security researchers what to do if they discover a vulnerability in your systems. Without one, researchers do not know whether to contact you, and some will simply publish their findings publicly or sell them to bad actors.

  • Scope: Which domains, apps, and systems are in scope for security research?
  • Out of scope: What should researchers not test (e.g., denial-of-service, social engineering of employees)?
  • Safe harbour: A statement that you will not take legal action against researchers who follow the policy.
  • How to report: A dedicated email address (security@yourdomain.com) or a form.
  • Response commitment: How quickly will you acknowledge a report? (48 hours is a common target.)

### Incident response

Briefly describe your incident response process — not the internal playbook details, but enough to give customers confidence:

  • How you monitor for security incidents
  • Your notification commitment to affected customers (e.g., within 72 hours for significant breaches, which aligns with GDPR Article 33)
  • Your status page or communication channel during incidents

### Security contact

Make it trivially easy for anyone — customers, researchers, regulators — to reach your security team. A dedicated security@yourdomain.com email address is standard. Some larger companies use a PGP key for encrypted reports. Include your response time commitment.

What to avoid

  • Vague claims without substance: "We take security seriously" on its own means nothing. Back every claim with specifics.
  • Outdated content: A security page that lists a certificate that expired two years ago, or references an old cloud provider, actively damages trust. Assign someone to review it quarterly.
  • Marketing language: Security pages are read by sceptical technical reviewers. Jargon-free factual prose beats superlatives.
  • Listing every CVE you have ever patched: A vulnerability history is appropriate for a changelog, not a security page. Focus on your current posture and ongoing practices.
  • Burying it: A security page that takes four clicks to find is not useful. Link to it from your footer, your pricing page, and your documentation.

Examples from real companies

Most well-known SaaS companies have solid security pages worth studying. Stripe's security page is frequently cited as a good model — it covers infrastructure, compliance certifications, data handling, and a clear vulnerability disclosure process in a structured, readable format. Cloudflare's security page goes into more technical depth, appropriate for their audience. Notion and Linear have security pages pitched at a more general business audience.

The common thread: specific, honest, updated, and easy to navigate.

How ShieldPage trust centers include a security page

Building a security page from scratch — writing the content, designing a layout, hosting it, keeping it updated — takes more time than most teams want to spend. ShieldPage's trust center product includes a security page as one of several structured sections alongside your privacy policy, accessibility statement, and compliance documentation.

  • Single destination: Instead of directing security reviewers to /security, privacy teams to /privacy, and accessibility reviewers to /accessibility-statement, you have one URL that covers all of these.
  • Structured sections: ShieldPage's template follows the sections outlined above, so you fill in your specifics rather than building the structure from scratch.
  • Shareable: You can share a public link during a vendor assessment or sales process, or generate a password-protected version for sensitive disclosures.
  • Updatable: Editing a ShieldPage trust center takes minutes, so the "assign someone to update it quarterly" task becomes realistic.

Trust centers are available on the Starter plan ($49/month) and above — Professional ($149/month) and Business ($349/month, unlimited sites).

Getting started

Write a first draft of your security page this week. Use the sections above as your outline. If you have SOC 2 or ISO 27001, upload the report or certificate. If you do not yet have certifications, be clear about where you are and where you are heading. Publish it at /security or as part of a trust center. Link to it from your footer and your pricing page.

A genuine, honest security page — even one that acknowledges work in progress — is more credible than silence or polished marketing language with no substance. Your security-conscious prospects will notice the difference.