Q37
Do you have a current SOC 2 Type II report?
Postmark's data center (Deft, a DuPont Fabros facility) is SOC 2 Type 2 accredited as confirmed on their support article.
Before you share customer data with Postmark, your compliance team needs documented proof they can be trusted. ThirdProof investigated Postmark across 27 intelligence sources — here's what we found.
⚠ FedRAMP Status: Not found in the FedRAMP Marketplace. Vendors handling government data or CUI must be FedRAMP authorized.
24 sources queried. 90% confidence. Every Postmark investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Postmark's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 29% complete
Q37
Postmark's data center (Deft, a DuPont Fabros facility) is SOC 2 Type 2 accredited as confirmed on their support article.
Q38
Postmark does not claim ISO 27001 certification; their DPA only references AWS compliance programs which include ISO certifications, not Postmark's own ISO 27001.
Q41
Not found in FedRAMP marketplace
Q40
Postmark explicitly states they are not HIPAA-compliant and will not sign Business Associate Agreements.
Q42
Postmark provides a Data Processing Addendum (DPA) and has detailed GDPR compliance documentation with appropriate technical and organizational measures.
+ 4 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Postmark's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Organizations with federal compliance requirements should verify this directly at marketplace.fedramp.gov.
Postmark is not listed on the FedRAMP Marketplace.
Moderate Risk
Vendor Risk Assessment
Based on data availability and source coverage
24
Sources Queried
23
Sources With Data
March 25, 2026
Last Assessed
AI-generated analysis for Postmarkapp
Postmark (postmarkapp.com) is an established transactional and marketing email delivery service with a 16-year operational history, assessed at Tier 3 (Moderate Risk) with a 90% confidence score. This rating reflects a combination of strong foundational signals alongside notable transparency gaps that warrant structured follow-up before onboarding at medium data access levels. Postmark demonstrates several meaningful positive signals:
However, the absence of independently verifiable compliance documentation and supply chain transparency places this assessment at Tier 3, requiring conditional approval with specific documentation requests prior to production use.
Independence Statement
All evidence in this report was independently sourced from external registries, threat intelligence feeds, and public data sources without vendor participation or notification.
7 findings identified for Postmarkapp
A critical data source was unavailable during this investigation. Manual verification is recommended.
postmarkapp.com is missing 2 recommended security headers: Content-Security-Policy, X-Frame-Options.
postmarkapp.com received a mediocre grade (C-). Some security headers are configured but improvements are needed.
postmarkapp.com has certificates from 24 different Certificate Authorities. This may indicate inconsistent certificate management practices.
No accessible subprocessor page was found for postmarkapp.com. GDPR Article 28 requires data processors to maintain a list of subprocessors. Vendors with mature data governance typically publish this list.
An AI-specific data usage policy was not discoverable for postmarkapp.com through automated scanning of common policy paths and web search. The vendor may publish relevant data handling commitments in enterprise agreement documents (DPAs, product terms, licensing portals) that are not indexed at standard public URLs. Request the vendor's Data Protection Addendum or AI-specific terms directly.
No accessible trust, security, or compliance page was found at common paths for postmarkapp.com. Vendors with mature security programs typically publish a trust center. Vendor should be asked to provide compliance documentation directly.
19 positive signals verified
No LEI Registry Match (Expected for Most Companies)
Business Registration →No Sanctions Matches Found
Sanctions & Watchlist Screening →Firmographic Data Available
Company Intelligence →Valid SSL Certificate
Domain Analysis →13 Open Ports Detected
Infrastructure Exposure →Established Domain (16+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →No Hacker News Mentions
Tech Community Sentiment →Certificate Transparency: 44 Subdomains
Certificate Transparency →Established Web Presence (16+ years)
Web Archive History →No Threat Intelligence Pulses
Threat Intelligence (OTX) →Clean IP Reputation
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →No Historical Adverse Media Found
Historical Media Search →HITRUST Directory Match — Manual Verification Required
Certification Registry Verification →SOC 2 Compliance Not Publicly Verifiable
Certification Registry Verification →Steps to address findings for Postmarkapp
Request Postmark's SOC 2 Type II report and bridge letter — email security@postmarkapp.com or check postmarkapp.com/legal for a trust portal link. Many email delivery vendors maintain confidential trust pages accessible via NDA. Set a 20-business-day response deadline and document receipt in your vendor risk register.
Request a signed Data Protection Addendum (DPA) and subprocessor list before go-live, particularly if EU personal data will be transmitted. Ask specifically whether AWS and any other infrastructure providers are disclosed as subprocessors, and confirm the DPA includes a 30-day advance notice commitment for subprocessor changes.
Ask Postmark's security team directly whether AI or machine learning is applied to customer email content, whether any third-party AI providers receive access to email data, and whether customer data is used in model training. Request a written response or addendum to your DPA documenting the AI data handling position.
Verify the possible HITRUST directory match manually by contacting the HITRUST Alliance directly at hitrustalliance.net or by asking Postmark's security team whether the entity listed is Postmark or its parent organization. This could represent a meaningful compliance positive if confirmed.
Flag the C- HTTP security header grade (45/100) and missing Content-Security-Policy and X-Frame-Options headers as an item for Postmark's security team to address. While this affects the marketing site rather than the sending API, it indicates room for improvement in web security hygiene. Request the vendor's roadmap for addressing these gaps within the next 6 months.
Schedule a re-assessment of this vendor in 12 months or sooner if: (a) the vendor confirms AI features are applied to email content, (b) a security incident is reported, or (c) the SOC 2 report received covers a period older than 18 months.
24 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Postmark? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Postmark on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Postmark's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Postmark a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Postmark appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Postmark's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Postmark's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Postmark claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Postmark depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Postmark appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Postmark and every other vendor in your stack — average report time: 7 minutes. Get Postmark's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Postmark across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.