Join our newsletter

#noSpamWePromise
By subscribing to our newsletter you agree with Keboola Czech s.r.o. Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
cross-icon

Run your data operations on a single, unified platform.

  • Easy setup, no data storage required
  • Free forever for core features
  • Simple expansion with additional credits
cross-icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Enterprise-level security for every business

Last updated: 15th March 2020
Last reviewed: March 30th, 2023
Focus on data insights and leave data security to us. Our products are developed with security at their core, guaranteeing compliance with all the latest standards and certifications.

Internal Security

Your data is encrypted with the latest security policies of AWS and Azure, encryption keys are also managed by AWS Key Management Service. In transit, all transport channels go through the HTTPS protocol. We use SSL encryption for all connections calling REST APIs.

Keboola runs in our cloud providers’ highly secure data centers, which utilize state-of-the-art electronic surveillance and multi-factor access control systems. Environmental systems in the datacenters are designed to remain resilient in the face of most failure modes, including natural disasters or system failures.

We use Snowflake’s time travel to maintain the ability of data rollback. In Amazon Redshift a snapshot is taken several times a day, which allows you to restore your data even if everything else fails.

Certifications

Keboola's security and privacy is based on industry-standard frameworks, and we maintain a comprehensive suite of certifications to demonstrate our commitment to security and privacy.

GDPR icon
GDPR
HIPAA icon
HIPAA
Soc2 icon
SOC 2
Product Security

Multi-level access control

For your data security, different users within your organization can have different access privileges. Additionally, with the full audit trail, it’s easy to monitor and trace all the data changes. Access to data is granted/restricted by the organization’s administrator to the level of a single bucket (set of data) allowing for the fine granularity of access control. The administrator can create short-lived tokens, which lower the possibility of oversight errors for historically granted and now outdated access credentials

Password management

We enforce a minimum of 8 characters long password rule, and it must be user-defined. Passwords are hashed with the CRYPT_BLOWDISH algorithm. And 10 wrong attempts within 5 minutes triggers CAPTCHA. Alternatively, you can use Google Authentication or SAML integration with other systems such as Active Directory.

Multi-Factor Authentication

Keboola supports MFA either via phone app or via hardware keys. Users can choose to use MFA, and organization admins can enforce MFA (so only users with MFA enabled are allowed to log in).

Responsible Disclosure

If you believe you have discovered a vulnerability within Keboola, please submit a report to us by emailing security@keboola.com.

Close Cookie Preference Manager
Cookie Settings
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage and assist in our marketing efforts. More info
Strictly Necessary (Always Active)
Cookies required to enable basic website functionality.
Made by Flinch 77
Oops! Something went wrong while submitting the form.