Security Compliance

We Value Your Data Security

Treasure Data is committed to achieving and maintaining the trust of our customers. Treasure Data complies with a range of industry-standard certifications and attestations. For more information on our security profile, please visit our Security Page.

SOC 2

The American Institute of Certified Public Accountants (AICPA) Service Organization Controls (SOC) reports give assurance over control environments as they relate to the retrieval, storage, processing, and transfer of data. The SOC 2 reports cover controls around security, availability, and confidentiality of customer data. Additional information can be found at AICPA.

Executive Summary of Latest Penetration Report

We hunt for security gaps in our software using continuous Static and Dynamic Application Security Testing tools.  Annually independent third-party, external vulnerability testing is conducted. The results are reviewed carefully and remediation plans are developed accordingly.

If you need a copy of our reports, please complete this form. This information can assist customers and prospects in reviewing, evaluating and documenting a complete control and governance framework. We will review your request as soon as possible and will provide appropriate documents and artifacts to you.

ISO/IEC 27001:2013

ISO/IEC 27001:2013 is a security management standard that specifies security management best practices and security controls following the ISO/IEC 27002 best practice guidance. The basis of this certification is the development and implementation of a security program, which includes the development and implementation of an Information Security Management System (ISMS) which defines how Treasure Data manages security. Treasure Data uses auditors that are accredited through ANSI-ASQ National Accreditation Board (ANAB).

Please fill out this form and make a request for the reports you would like to review. We will review your request and get back to you after verifications.