Welcome to Palmer’s Trust Portal which provides detailed information on how privacy and security are embedded into our systems, processes, and governance from the outset, forming the foundation of how we operate.
We align with:
GDPR Article 25 – Privacy by Design: Data protection is considered at design stage and throughout the lifecycle of our services.
EBA ICT Risk Management Guidelines: Our ICT controls ensure resilience, integrity, and protection against cyber threats.
DORA (when acting as delegate to AIFMs): Our operational resilience framework aligns with DORA and CSSF Circulars 22/804, 22/806 and 25/881.
Secure Cloud-Native Architecture: Layered security and encryption protect data in transit, at rest, and during processing.
This is our Privacy by Design approach; embedded, continuous, and proactive.
- Does the organization log and audit logs for the following events: unsuccessful login attempts, successful login attempts, privilege escalation, account creation, password changes, and unrecognized processes? If not all event types are logged, please elaborate.
- Does your organization have a Backup Policy?
- Name the organization's Cloud Service Provider (CSP).
- Does your organization have a TOS?
- Describe certificate-based authentication used by the organization.
Document Availability Update
We are pleased to be able to share our report on the Luxembourg BCP site recovery testing completed in 2025. Please request access if you require a copy of this.
Palmer Website Update
We are pleased to announce the update to www.palmerfs.com with a new Trust Security and Privacy section which provides information on our approach to data privacy and security. https://www.palmerfs.com/trust-security-privacy/
Security Essentials Accreditation
We are excited to announce that Palmer has received a Security Essentials Certificate, available for public viewing at trust.palmerfs.com under "Documents."
Cyber Essentials is a UK government-backed certification scheme, overseen by the NCSC and delivered via IASME, that helps organisations protect against common cyber threats. It sets a baseline security standard through five technical controls—firewalls, secure configuration, access control, malware protection, and patch management. Certification demonstrates a commitment to cyber security, can be required for certain UK government contracts, and provides assurance to clients and stakeholders that the organisation has key defences in place.



