
Keboola is designed for teams that operate critical data pipelines across finance, IT operations, and business analytics.

Granular Role-based Access Control
Multi-layered Network Security Architecture
Logical & Physical Environment Isolation
Active Metadata
& full audit trail

Choose the deployment model that best fits your security and compliance needs.



All deployment options include enterprise-grade security, 24/7 monitoring, and dedicated support.
Our defense-in-depth approach to protecting your data across every layer.
Deep dive into our policies and technical documentation
Keboola provides comprehensive audit capabilities:
Learn more at keboola.com/product/security
Keboola provides multi-region deployment options across three major cloud providers:
Available regions:
For EU data protection, sub-processors (AWS EMEA SARL, Microsoft Ireland Operations, Google Cloud EMEA Ltd.) are contractually bound to EU processing.
BYODB deployments give customers direct control over data residency since data resides in customer-owned databases.
Learn more at keboola.com/dpa | security.keboola.com
Keboola implements multi-layered access controls:
Learn more at keboola.com/product/security
Keboola's security architecture adapts to three deployment models:
All deployment models maintain full audit logging and Docker containerization ensuring components run in isolated environments.
Learn more at help.keboola.com/storage/byodb
Keboola implements defense-in-depth encryption at multiple layers:
Data at rest:
Data in transit:
Application-level encryption:
Learn more at developers.keboola.com/overview/encryption
Keboola maintains enterprise-grade security certifications:
Cloud infrastructure partners (AWS, Azure, GCP) maintain ISO 27001, CSA STAR, and other certifications. Sub-processors are contractually bound to process data only in approved regions.
The Trust Center provides access to compliance documentation, vulnerability disclosure policies, and bug bounty program.
Learn more at security.keboola.com