You're two weeks from closing a six-figure deal. The champion loves your product. The budget is approved. Then procurement sends an email: "Please complete the attached security assessment before we can proceed."
What follows is usually 3–6 weeks of scrambling — pulling your CTO off product work, digging through DNS records, writing policy pages that should have existed months ago, and answering questions you've never seen before.
This guide is the checklist enterprise buyers actually use. Not the theoretical SOC 2 framework. The practical list of things procurement teams check before they even talk to your sales team.
What Buyers Check Before the First Call
Most SaaS founders don't realize this: procurement teams evaluate your company before you know they exist. A security analyst visits your website, checks a few things, and either adds you to the shortlist or flags you as a risk.
Here's what they look at, in order of how fast it kills a deal:
1. SSL/TLS Configuration 5 min fix
Every page must load over HTTPS. No mixed content warnings. HSTS headers enabled with a reasonable max-age (at least 6 months). Preload directive is a bonus that signals maturity.
This takes 5 minutes to fix. There's no excuse for getting this wrong in 2026.
2. Email Authentication (SPF, DKIM, DMARC) 15 min fix
Buyers check if your domain can be spoofed. If someone can send emails pretending to be you, that's a risk to everyone in your supply chain.
- SPF — tells email servers which IPs can send mail from your domain
- DKIM — cryptographically signs your emails so they can't be tampered with
- DMARC — tells receiving servers what to do with emails that fail SPF/DKIM checks
The 15-minute fix: Most companies are missing DMARC. It's a single DNS TXT record: v=DMARC1; p=quarantine; rua=mailto:dmarc@yourdomain.com. Add it to your DNS provider and you've eliminated one of the top 3 procurement blockers.
3. Security Page 2-3 hr fix
90% of SaaS companies that sell to enterprise don't have a /security page. This is the single most impactful page you can create for deal acceleration.
What it should cover:
- Encryption at rest and in transit
- Access controls and authentication
- Data center and infrastructure provider
- Incident response process
- Employee security training
- Vulnerability management
- Compliance frameworks (if applicable)
It doesn't need to be long. A single well-structured page that answers the top 10 questions procurement teams ask saves weeks of back-and-forth.
4. Privacy Policy 3-4 hr fix
Every buyer reads your privacy policy. Not the whole thing — they scan for what data you collect, how long you retain it, who you share it with, and how users can request deletion.
The most common failure: privacy policies so dense and jargon-heavy they're unreadable. If a Flesch readability score falls below 30, procurement flags it as "potentially hiding unfavorable terms."
5. Subprocessor List 1 hr fix
If you process customer data, buyers need to know who else touches it. AWS, Stripe, Mixpanel, Sentry — every third-party service that handles your customers' data should be listed on a public /subprocessors page.
This catches most SaaS companies off guard. Required for GDPR and increasingly expected by US enterprise buyers. 90% of SaaS companies don't have one.
Security Headers Procurement Teams Check
HTTP response headers your web server sends with every page. Procurement security tools scan for them automatically:
- Content-Security-Policy (CSP) — prevents cross-site scripting. Missing on 47% of SaaS sites.
- X-Content-Type-Options — prevents MIME-type sniffing. One line:
nosniff - X-Frame-Options — prevents clickjacking. Set to
DENYorSAMEORIGIN - Referrer-Policy — controls what URL info is shared with other sites
- Permissions-Policy — restricts browser features your site can use
Adding all five takes about 20 minutes. Most frameworks support a security headers middleware.
The Complete Checklist
Infrastructure
- HTTPS on all pages with HSTS enabled
- Valid SSL certificate (not expired, not self-signed)
- DNSSEC enabled
- CAA DNS records restricting certificate issuance
- All five security headers present
Email Security
- SPF record configured
- DKIM signing enabled
- DMARC record published (at minimum p=quarantine)
Policy Pages
- Privacy policy (readable, covers data collection/retention/deletion)
- Terms of service
- Security page (encryption, access controls, incident response)
- Subprocessor list
- Refund/cancellation policy
- Public status page (uptime monitoring)
Trust Evidence
- No unverified compliance claims (don't say "SOC 2" without a report)
- No contradictions between marketing claims and actual configuration
- Contact information for security inquiries
- Public pricing (builds trust)
See exactly what enterprise buyers see when they evaluate your company.
Free scan. No signup required. 60 seconds.
Scan Your Site on TrustSignal.techThe companies that close enterprise deals fastest aren't the ones with the best product — they're the ones where procurement finds nothing to flag.