← Week 3: The Onboarding Problem VISUAL ANALYSIS · WEEK 4

The Staleness Problem

Most trust centers start accurate and end misleading. A visual look at how security documentation decays — and why nobody's solving it.

Here's an exercise: go to any company's trust center and check the dates on their documents. The SOC 2 report, the pen test summary, the security policy. How old are they?

If you do this across 50 trust centers, the pattern is consistent: the average document age is 14 months. That's not a trust center — it's a time capsule.

Document Age vs. Credibility

How security evaluators perceive evidence based on age

0-3 months
Current
Trusted
3-6 months
Acceptable
Questioned
6-12 months
Follow-up required
Doubted
12+ months
Stale — request for updated evidence
Rejected

The credibility curve

Security evaluators — the people reviewing your trust center during a deal — have a clear mental model for document freshness. Here's what the data suggests about how document age affects perceived trust:

Perceived Credibility by Evidence Age

92%
0-3 mo
71%
3-6 mo
38%
6-12 mo
12%
12+ mo

The drop-off is steep. A trust center with 3-month-old evidence is nearly trusted at face value. At 12+ months, evaluators treat it as essentially unverified — they'll ask for updated documents anyway, which defeats the entire purpose.

"A 14-month-old SOC 2 on your trust center doesn't signal maturity. It signals that nobody's watching. And that's worse than having no trust center at all."

— The staleness paradox

What decays — and how fast

Not all trust center content ages at the same rate. Here's a breakdown:

SOC 2 Reports

Expires: 12 months

Annual audit cycle means your report has a hard expiration date. After that, it's not just stale — it's technically expired.

Penetration Tests

Relevant for: 6-9 months

Your codebase changes weekly. Last year's pen test reflects last year's attack surface, not today's.

Security Policies

Review cycle: 12-18 months

Policies drift as practices evolve. The written policy may no longer match how your team actually operates.

Contact Information

Stale trigger: any team change

The security email goes to someone who left. The DPO listed was a contractor. Nobody updated the page.

Why nobody maintains them

The staleness problem isn't about negligence. It's about incentive design:

Two approaches to the problem

Manual Maintenance

Automated Monitoring

The automated approach isn't magic — it's monitoring plus workflow. The key design principle: AI proposes, human approves, nothing publishes without explicit sign-off. The system watches; you decide.

The Maintenance Test

Before evaluating any trust center tool, ask: "What happens 6 months after launch? Does the product help me keep content current, or am I on my own?" The answer separates tools that solve the problem from tools that create a new one.

How We Approach This

INeedTrust was designed around the staleness problem. Every document has a tracked expiration date. The system monitors framework updates from NIST, SOC 2, and ISO 27001. When something needs attention, it surfaces a proposed update — you review and approve. The goal is that your trust center is never more than a few weeks behind reality.

Final piece in the series: turning trust into revenue.

Next: Trust centers as sales infrastructure →
Published by Anton Lissone & Howard Zev · Co-Founders, INeedTrust · Week 4 of 5 · Launch Series 2026