Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Bill.com, your compliance team needs documented proof they can be trusted. ThirdProof investigated Bill.com across 27 intelligence sources — here's what we found.
⚠ FedRAMP Status: Not found in the FedRAMP Marketplace. Vendors handling government data or CUI must be FedRAMP authorized.
27 sources queried. 96% confidence. Every Bill.com investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Bill.com's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 67% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q38
According to Nudge Security's security profile, Bill.com is ISO 27001 Compliant.
Q41
Not found in FedRAMP marketplace
Q42
Bill.com has a documented Data Processing Agreement (DPA) available at bill.com/legal/infosec-dpa that governs handling of Personal Information and GDPR compliance.
Q39
Nudge Security's security profile indicates Bill.com is PCI Compliant, and additional sources confirm SOC 2 and HIPAA compliance.
+ 7 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Bill.com's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Organizations with federal compliance requirements should verify this directly at marketplace.fedramp.gov.
Bill.com is not listed on the FedRAMP Marketplace.
Low Risk
Vendor Risk Assessment
Based on data availability and source coverage
27
Sources Queried
25
Sources With Data
April 17, 2026
Last Assessed
AI-generated analysis for Bill.com
Bill.com (operating as BILL Holdings, Inc.) is a financial operations platform serving businesses and accounting firms with accounts payable, accounts receivable, and spend management capabilities. ThirdProof's rule engine has assigned a Tier 4 (Low Risk) rating with 96% confidence, supported by strong independent signal coverage across 24 data sources and automated questionnaire mapping covering 66% of assessed controls. Bill.com presents a robust set of positive security signals across the domains most material to a financial software vendor:
Independence Statement
All evidence in this report was independently sourced from public registries, external threat intelligence feeds, DNS and TLS inspection, web archive data, and automated document scanning — without vendor participation, notification, or input at any stage of the assessment.
4 findings identified for Bill.com
The LEI registration for BILL HOLDINGS, INC. has status "LAPSED". This may indicate the entity no longer maintains its regulatory filings.
bill.com is missing 3 recommended security headers: Strict-Transport-Security, Content-Security-Policy, X-Frame-Options.
bill.com received a poor grade (D+) from Mozilla HTTP Observatory. Multiple security headers or configurations are missing. Note: This scan was performed on the marketing site (bill.com). The application endpoint (app.bill.com) may have different security headers. Verify the application domain separately.
An AI-specific data usage policy was not discoverable for bill.com through automated scanning of common policy paths and web search. The vendor may publish relevant data handling commitments in enterprise agreement documents (DPAs, product terms, licensing portals) that are not indexed at standard public URLs. Request the vendor's Data Protection Addendum or AI-specific terms directly.
25 positive signals verified
No Sanctions Matches Found
Sanctions & Watchlist Screening →Legal Entity Actively Registered
Business Registration →No Adverse Media Found
Adverse Media Scan →No Recent News Coverage
Adverse Media Scan (Fallback)
Firmographic Data Available
Company Intelligence →Valid SSL Certificate
Domain Analysis →1 Open Port Detected
Infrastructure Exposure →Established Domain (31+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →Minimal Tech Community Discussion
Tech Community Sentiment →Certificate Data from TLS Handshake
Certificate Transparency →Established Web Presence (27+ years)
Web Archive History →No Threat Intelligence Pulses
Threat Intelligence (OTX) →Clean IP Reputation
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →Certification Claimed: SOC 2
Trust & Compliance Page Scan →Certification Claimed: SOC 1
Trust & Compliance Page Scan →Subprocessor Page Found, No Entries Parsed
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →No Historical Adverse Media Found
Historical Media Search →HITRUST Directory Match — Manual Verification Required
Certification Registry Verification →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →Deep Document Crawler Results
Deep Document Analysis →Steps to address findings for Bill.com
Request the SOC 2 Type II report and bridge letter: contact Bill.com's security team via [bill.com/security](https://bill.com/security) and ask for the most recent Type II report under NDA, plus a bridge letter if the audit period closed more than six months ago.
Request the SOC 1 Type II report separately if your organization has internal financial control dependencies on Bill.com's AP/AR workflows.
Manually review the subprocessor disclosure page at [bill.com/privacy/data-processing-addendum](https://www.bill.com/privacy/data-processing-addendum) and request a structured list of all subprocessors from the vendor's legal team; cross-reference against OFAC and EU sanctions lists.
Request Bill.com's AI-specific data terms or DPA addendum — ask explicitly whether customer invoice data is used for AI model training, what opt-out mechanisms exist, and which third-party AI providers (if any) process customer data.
Verify HTTP security header posture on the production application domain (app.bill.com) independently via [SSL/TLS analysis service](https://www.SSL/TLS analysis service.com/ssltest/analyze.html?d=app.bill.com), and ask Bill.com's security team to confirm HSTS enforcement on the application layer.
Request confirmation of ISO 27001 certification status directly from Bill.com's security team, and ask for the certificate number and expiry date so it can be verified against the [IAF CertSearch registry](https://www.iafcertsearch.org).
Confirm HITRUST certification status directly with Bill.com or query the [HITRUST Alliance directory](https://directory.hitrustalliance.net/search?q=Bill.com) — a possible match was found but requires manual validation.
27 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Bill.com? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Bill.com on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Bill.com's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Bill.com a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Bill.com appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Bill.com's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Bill.com's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Bill.com claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Bill.com depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Bill.com appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Bill.com and every other vendor in your stack — average report time: 7 minutes. Get Bill.com's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Bill.com across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.