Enterprise data security

Osmos comes with security, reliability, and permissioning built in. Fully SOC II Type 2, HIPAA, GDPR, and CCPA compliant with authentication and credentials fully managed by Osmos.

The highest standards for security and privacy

At Osmos, security and privacy are top priorities. We ensure security in every step of our product development and implementation processes as well as with our employee protocol.

Have a security question? Contact us anytime at security@osmos.io

osmos security compliance

Our Commitment to Security

data encryption icon

Data Encryption

All data, both in transit and at rest, is encrypted utilizing the 256 key bit Advanced Encryption Standard (AES).

data protection icon

Data Protection

Osmos customers own their data, and we commit to keeping customer data strictly confidential. Data stored or accessed by Osmos is only stored/accessed for the purposes of providing services Osmos is contracted to provide.

Architecture Security icon

Architecture Security

Osmos utilizes Google Cloud Platform as its web security and web application firewall provider, Osmos benefits from GCP data centers and a network architected to protect your information, identities, applications, and devices.

Solution Infrastructure Icon

Solution Infrastructure

Our infrastructure is developed primarily in the Rust Programming Language. This provides memory safety (like Java) while providing the performance of C/C++. High-risk data transformations are done inside Web Assembly sandboxes to provide additional security.

Application Password Policy

Application Password Policy

Passwords are stored with the user identity in the control database. All passwords are stored as salted BCrypt hashes in accordance with OWASP’s recommendation for keyed functions. Customers also have the option of utilizing SSO via SAML.

Communications Security

Communications Security

User access to the application is always via HTTPS, where we support TLS v1.2 or above. All access to our infrastructure is via HTTPS or SSH with key based two factor authentication

Trusted by 100s of CTOs

Harman logo
Netflix logo
Quartzy Logo
Crexi logo
Vendr logo
Quartzy Logo
Crexi logo
Vendr logo
Vendr logo
Trailstone Logo

Learn how to scale your data ingestion today

Take the first step in streamlining your process today.
Book Demo