Highlights

  • TX-RAMP Level 2 Certified
  • Completed HECVAT available for institutional review
  • Independent security testing
  • Documented security policies and procedures
  • Architecture documentation available upon request

CleryEdge is designed to support higher education institutions that operate within structured regulatory, security, and procurement environments. Our platform incorporates documented security controls, independent assessments, and compliance documentation to support institutional review and due diligence processes.

The materials summarized below are available to assist institutions evaluating CleryEdge for operational, security, and procurement readiness.

TX-RAMP Certification

CleryEdge is TX-RAMP Level 2 certified, demonstrating that the platform has undergone an independent security review aligned with the Texas Risk and Authorization Management Program for cloud services. TX-RAMP establishes rigorous security standards for cloud systems used by public institutions and state agencies. Certification confirms that CleryEdge maintains documented security controls, formal policies, and ongoing monitoring practices consistent with recognized government cloud security frameworks.

Security Documentation

To support institutional security reviews, we maintain a comprehensive set of security and architecture documentation. These materials provide transparency into how the platform protects institutional data and maintains operational security. Available documentation includes:

  • Governing Security Policy
  • System Boundary Flow Diagram
  • System Data Flow Diagram
  • Security testing summaries
  • Policies and procedures supporting operational security
These materials are made available to institutions as part of formal system evaluations.

HECVAT Documentation

CleryEdge maintains a completed Higher Education Community Vendor Assessment Toolkit (HECVAT) to support security reviews conducted by institutional IT departments. The HECVAT provides detailed responses regarding:

  • Application architecture
  • Data protection practices
  • Access control mechanisms
  • Infrastructure security
  • Operational policies and procedures
Our HECVAT is made available to institutions conducting security or procurement evaluations upon request during the proposal process.

Security Testing & Continuous Monitoring

CleryEdge undergoes regular security testing and monitoring to identify and remediate potential vulnerabilities. These activities are part of our broader operational security program and help ensure the platform continues to meet evolving security expectations. Our security practices include:

  • Internal and external vulnerability assessments
  • Independent penetration testing
  • Continuous monitoring of system activity
  • Prioritized remediation of identified issues

Insurance & Operational Documentation

To support institutional procurement requirements, CleryEdge maintains additional operational documentation, including:

  • Cyber Liability insurance documentation
  • W-9 and vendor information
  • Accessibility documentation, including VPAT
  • Service Level Agreement (SLA)
These materials are available upon request during institutional evaluation or procurement processes.

Documentation for Institutional Review

Institutions that request a proposal for CleryEdge are provided access to our security and compliance documentation package, which includes materials commonly required during IT security and procurement reviews. These materials are shared as part of the proposal and evaluation process to support institutional due diligence. Please contact us if your institution would like to request a proposal and receive access to these materials.