SOC 2 Type 2
Independent audit of security, availability, and confidentiality controls. Report available under NDA.
Security & compliance
Etlworks runs on SOC 2 Type 2 controls, supports HIPAA with a BAA, and complies with GDPR. Customer data is not persisted by default — most flows stream rows through memory in microseconds. The security posture is identical across cloud, hybrid, and on-prem.
Need a questionnaire filled out? We do that free of charge — email security@etlworks.com.
Compliance & certifications
Independent audit of security, availability, and confidentiality controls. Report available under NDA.
BAA available for enterprise customers. Privacy and information-security controls support HIPAA compliance.
Compliant with GDPR. DPA executed on request as part of any enterprise contract.
Public summary of our SOC 2 controls. Free to download — no NDA required.
Etlworks runs on AWS, Azure, and GCP — all of which carry SOC 1 / 2 / 3 and ISO/IEC 27001 certifications that we inherit at the infrastructure layer.
By default, Etlworks does not persist customer data. Most integration flows stream rows through memory in microseconds — what we keep is configuration, metadata, and the credentials needed to run your flows.
Why this matters: most iPaaS tools persist customer data by default for caching, replay, or analytics. Etlworks does not. This narrows your data-residency footprint and reduces breach blast radius.
Etlworks runs in a Virtual Private Cloud across AWS, Azure, and GCP. Networks are segregated by security level. Only port 443 (HTTPS) is open inbound. Customer-managed deployments inherit the same architecture.
JWT-based stateless authentication, optional 2FA, SSO via SAML, and role-based access control with six roles. Tag-based artifact access lets you scope teams to specific flows, environments, or projects.
Six roles · least-privilege by default
SuperAdmin
Unrestricted system access
Administrator
Full data control · manages users, flows, connections, formats
Editor
Same as admin without user management
Operator
View and run flows · view execution stats
Viewer
Read-only access to flows, schedules, stats
API user
Authenticates calls to user-defined API endpoints · sees only its own messages
Industry-standard encryption at rest and in transit. Customer-managed PGP for files. SSH tunneling and IP allowlisting for source/destination connections.
In transit
At rest
Credentials
Automated and manual security testing across multiple cadences. Independent third-party audits of applications and infrastructure. Static code analysis on every build.
Vulnerability and penetration scans via Intruder.io. Additional scans triggered when new threats emerge. Reports available on request.
Static code analysis runs against application code and third-party libraries. Findings block release until addressed.
Independent third-party audits of applications and infrastructure. Findings prioritized for remediation.
Documented incident response plan with timely customer notification. Application, system, and data access logs monitored for anomalies. To date, Etlworks has not experienced a security breach.
We welcome reports of suspected security issues from independent researchers. We do not run a paid bug bounty, but we acknowledge contributions on this page.
Modifying or destroying data · degrading service for customers · denial-of-service attacks · accessing other users’ accounts or data · violating any applicable law.
Send reports to security@etlworks.com.
Our Security & Compliance team answers questionnaires free of charge. Reach out at security@etlworks.com — or grab the artifacts below directly.