Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
|---|---|
Dec. 31, 2025 | |
| Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | We rely on the cybersecurity policies and procedures implemented by the Adviser. The Adviser maintains a cybersecurity risk management program designed to identify, assess and manage risks associated with the use of information systems and the processing of sensitive data. The Adviser maintains an internal technology team, led by its Director of Information Technology, and engages third-party service providers, including Abacus to support information technology operations. These third-party providers assist with the monitoring and management of the Adviser’s network and systems. The Adviser also utilizes cloud-based service providers to support various business function. The Adviser maintains a Written Information Security Manual that establishes policies and procedures designed to safeguard the confidentiality, integrity and availability of its data. The Adviser’s cybersecurity program includes ongoing monitoring, risk assessments and controls designed to mitigate cybersecurity threats associated with both internal systems and third-party service providers.
|
| Cybersecurity Risk Management Processes Integrated [Flag] | true |
| Cybersecurity Risk Management Processes Integrated [Text Block] | We rely on the cybersecurity policies and procedures implemented by the Adviser. The Adviser maintains a cybersecurity risk management program designed to identify, assess and manage risks associated with the use of information systems and the processing of sensitive data. The Adviser maintains an internal technology team, led by its Director of Information Technology, and engages third-party service providers, including Abacus to support information technology operations. These third-party providers assist with the monitoring and management of the Adviser’s network and systems. The Adviser also utilizes cloud-based service providers to support various business function. The Adviser maintains a Written Information Security Manual that establishes policies and procedures designed to safeguard the confidentiality, integrity and availability of its data. The Adviser’s cybersecurity program includes ongoing monitoring, risk assessments and controls designed to mitigate cybersecurity threats associated with both internal systems and third-party service providers.
|
| Cybersecurity Risk Management Third Party Engaged [Flag] | true |
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our cybersecurity risks and associated mitigations are evaluated by our management and the Adviser’s Director of Information Technology as needed, but no less frequently than annually. Management periodically reports to our Board on developments to the information security and cybersecurity risks we face. Reports include, among other things, an overview of Crestline’s controls and procedures related to assessing, identifying, and managing risks related to cybersecurity threats, oversight of third-party service providers and related cybersecurity threats, and management’s evaluation of cybersecurity risks material to us.
|
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our cybersecurity risks and associated mitigations are evaluated by our management and the Adviser’s Director of Information Technology as needed, but no less frequently than annually |
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our cybersecurity risks and associated mitigations are evaluated by our management and the Adviser’s Director of Information Technology as needed, but no less frequently than annually. Management periodically reports to our Board on developments to the information security and cybersecurity risks we face. Reports include, among other things, an overview of Crestline’s controls and procedures related to assessing, identifying, and managing risks related to cybersecurity threats, oversight of third-party service providers and related cybersecurity threats, and management’s evaluation of cybersecurity risks material to us.
|
| Cybersecurity Risk Role of Management [Text Block] | Management periodically reports to our Board on developments to the information security and cybersecurity risks we face. |
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
| Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | Our cybersecurity risks and associated mitigations are evaluated by our management and the Adviser’s Director of Information Technology as needed, but no less frequently than annually. Management periodically reports to our Board on developments to the information security and cybersecurity risks we face. Reports include, among other things, an overview of Crestline’s controls and procedures related to assessing, identifying, and managing risks related to cybersecurity threats, oversight of third-party service providers and related cybersecurity threats, and management’s evaluation of cybersecurity risks material to us.
|
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Our cybersecurity risks and associated mitigations are evaluated by our management and the Adviser’s Director of Information Technology as needed, but no less frequently than annually. Management periodically reports to our Board on developments to the information security and cybersecurity risks we face. Reports include, among other things, an overview of Crestline’s controls and procedures related to assessing, identifying, and managing risks related to cybersecurity threats, oversight of third-party service providers and related cybersecurity threats, and management’s evaluation of cybersecurity risks material to us.
|
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |