background-image
Start your security review
View & download sensitive information
Ask for information
ControlK

Overview

Welcome to BlevinsTrust, the Security & Trust Center for Blevins Holdings and its subsidiaries. As a diversified enterprise operating across aviation, corporate services, financial management, healthcare, research, defense, and public-sector–aligned initiatives, Blevins Holdings manages high-value information assets and mission-critical operations that require disciplined governance, precise controls, and transparent oversight. Our organization supports environments with elevated assurance obligations, including those shaped by financial-sector expectations, defense-adjacent compliance requirements, and enterprise-scale operational risk standards.

This Trust Center provides a consolidated, authoritative view of our security, privacy, and governance posture. It outlines the control frameworks, operational safeguards, risk-management structures, monitoring capabilities, and policy requirements that guide how we protect sensitive data and maintain the confidentiality, integrity, and availability of systems across the Blevins corporate ecosystem. Stakeholders will find detailed descriptions of our enterprise control environment and may request access to formal documentation, security assessments, and evidence packages under appropriate confidentiality protections.

Blevins Holdings maintains alignment with internationally recognized frameworks, including SOC 2, ISO 27001, NIST 800-53, and the NIST Cybersecurity Framework. As part of our formal roadmap, we are actively pursuing SOC 2 and ISO 27001 certifications to further strengthen our assurance program and provide verified, third-party attestation of our controls. Our governance model incorporates periodic internal assessments, structured evidence cycles, continuous improvement processes, and enterprise-level oversight to ensure our control environment remains effective, resilient, and responsive to evolving risks.

Through this Trust Center, we reaffirm our commitment to transparent, accountable, and high-integrity security practices that meet the expectations of financial institutions, public-sector partners, and defense-oriented stakeholders.

Lucid Motors-company-logoLucid Motors
Apple-company-logoApple
Cushman & Wakefield-company-logoCushman & Wakefield
CBRE-company-logoCBRE
IQHQ-company-logoIQHQ
Maryland Democratic Party-company-logoMaryland Democratic Party
Audi-company-logoAudi
Mazda Motor Corp.-company-logoMazda Motor Corp.
Disneyland Resort-company-logoDisneyland Resort
The Walt Disney Company-company-logoThe Walt Disney Company
San Diego County Regional Airport Authority-company-logoSan Diego County Regional Airport Authority
Los Rios Colleges-company-logoLos Rios Colleges
State Of Maryland-company-logoState Of Maryland
Cargill-company-logoCargill
Glencore-company-logoGlencore
Vitol-company-logoVitol
United Airlines-company-logoUnited Airlines
Sharp HealthCare-company-logoSharp HealthCare
The American Cancer Society-company-logoThe American Cancer Society
Jefferies Financial Group-company-logoJefferies Financial Group
Lockheed Martin-company-logoLockheed Martin
U.S. Department of Energy-company-logoU.S. Department of Energy
Kamala Harris-company-logoKamala Harris
United Parks & Resorts-company-logoUnited Parks & Resorts
Vanguard-company-logoVanguard
Wells Fargo-company-logoWells Fargo
DCCC-company-logoDCCC
Intuit-company-logoIntuit
Gretchen Whitmer-company-logoGretchen Whitmer
Wes Moore-company-logoWes Moore
Gavin Newsom-company-logoGavin Newsom
California State-company-logoCalifornia State
Marriott Bonvoy-company-logoMarriott Bonvoy
Grossmont-Cuyamaca Community College District-company-logoGrossmont-Cuyamaca Community College District
Los Angeles Community College District-company-logoLos Angeles Community College District
Zoom-company-logoZoom
Booking Holdings-company-logoBooking Holdings
SanDiegoCounty-company-logoSanDiegoCounty
Airbus-company-logoAirbus

Documents

APP SECURITYApplication Penetration Testing

Reports

Upon verification and execution of suitable confidentiality agreements, Blevins Holdings may provide security-related documentation, including assessment summaries, penetration test overviews, control descriptions, and responses to structured security questionnaires. The scope of shared artifacts is determined by the nature of the engagement and the sensitivity of the information requested.

Self-Assessments

We conduct periodic internal security and risk self-assessments to evaluate the design, maturity, and effectiveness of our controls. These evaluations inform remediation efforts, risk treatment priorities, and program improvements. When required by institutional partners, we may provide completed questionnaires or standardized assessments under confidentiality.

Security Grades

We monitor third-party security ratings and external signals related to our public-facing assets as one component of our broader security program. While external security scores provide useful context, they are considered alongside internal telemetry, assessments, and testing. High-level trends or validated results may be shared with partners when appropriate.

Risk Management

Risk management at Blevins Holdings follows a structured process of identifying, assessing, prioritizing, and monitoring risks across security, operational, regulatory, and strategic domains. Risk outcomes guide control design, remediation planning, resource allocation, and governance reporting, ensuring alignment with business objectives and stakeholder expectations.

BC/DR

Blevins Holdings maintains business continuity and disaster recovery capabilities to support essential operations during disruptive events. These capabilities include backup and restoration processes, tested recovery strategies, identification of critical dependencies, and continuous improvement through validation and review.

Training

All employees receive security awareness training covering responsible data handling, threat recognition, incident reporting, and adherence to security policies. Personnel in high-privilege or specialized roles receive additional training relevant to system administration, development, and incident response expectations.

Physical & Environment

Facilities and data center providers supporting Blevins Holdings must maintain appropriate physical and environmental controls, including secure access, surveillance, intrusion detection, environmental safeguards, and compliant equipment handling practices. These protections help ensure the physical integrity and resilience of the systems supporting our operations.

Knowledge Base (FAQ)
  • Does the Company require MFA for all privileged users?
  • Does the Company provide annual security awareness training to all employees?
  • Does the Company maintain vulnerability management processes, including patch timelines?
  • Does the Company maintain a current list of third-party subprocessors?
  • Does the Company log administrative access to production systems?
View more
If you need help using this Trust Center, please contact us.
Contact support
If you think you may have discovered a vulnerability, please send us a note.
Report issue