We Handle Your Data Responsibly

Treasure Data is committed to protecting the security of customer data. We recognize the importance of appropriate industry-standard information security policies and procedures to protect customer data. These are just a few of the security controls we implemented to protect the confidentiality, integrity, and availability of our customers’ data.

Use of Encryption

Treasure Data uses TLS/SSL sessions to secure its data transmissions by default. The default certificates for these sessions have RSA-2048 keys, use SHA-256 digests, and facilitate AES-256 symmetric key encryption.

Application Security

Treasure Data manages the security lifecycle of the application supporting its service and all other in-house developed software in order to prevent, detect, and correct security weaknesses.

24/7/365 Continuous Monitoring

In-House Monitoring

Every day, our in-house systems collects all system logs, flags, and reports anomalies automatically to ensure 99.99% uptime

Vulnerability Testing

Every day, our in-house systems collects all system logs, flags, and reports anomalies automatically to ensure 99.99% uptime

Real-Time Audit Log

Every day, our in-house systems collects all system logs, flags, and reports anomalies automatically to ensure 99.99% uptime

3rd Party Security

Data Center Security

Treasure Data is committed to protecting the security of customer data. We recognize the importance of appropriate industry-standard information security policies and procedures to protect customer data. These are just a few of the security controls we implemented to protect the confidentiality, integrity, and availability of our customers’ data.

Network Security

We host customer data at scalable, high-performance, and high-resilience data centers operated by our infrastructure business partners. Our data center business partners have security certifications under assessment frameworks such as ISO 27001 and Service Organization Control (SOC) 2. These data centers maintain our customers’ data in secured zones that protects against physical intrusion, loss, theft, damage, and reasonably anticipated natural disasters, such as floods and storms. Their high availability and business continuity services provide assurances of continued reliability of our service. Our business partners operate multiple data centers, and customer data is replicated across data centers to enhance reliability.

Data Segregation

Although we provide our services on a centralized basis to allow our customers to share our infrastructure, the Treasure Data service keeps each customer’s data separate from the data of every other customer by our implemented access control policies. In turn, our data center partners use security controls to segregate the Treasure Data service from their other customers’ data by maintaining the service in its own protected environment and establishing robust, industry standard access control rules and best practices. Our security access controls provide assurances against unauthorized access to your account, whether by those who do not use the service or other Treasure Data customers.