Security at Immuta

"In the AI era, everyone is a data consumer—humans and AI agents alike. GenAI is driving explosive growth in data access demands, but most of that data is sensitive and must be governed. We automate the workflows that govern, provision, and audit compliant access—enabling fast, automated access to the right data while enforcing the controls needed to stay secure and audit‑ready."

Matthew Carroll, CEO at Immuta

Key Security Features

Immuta’s platform security controls, processes, and procedures are designed to meet business objectives while containing risk. Commitments relative to security controls are documented and communicated in agreements with clients and third-party service providers. Operational requirements supporting security controls are communicated in the Company’s policies and procedures, system design documentation, and contracts with clients and third-party service providers. Those security controls include, but are not limited to:

  • Formalized policies and procedures
  • System logging and monitoring
  • Vulnerability and Patch management
  • Antivirus/antimalware software
  • Identity and access (logical and physical) management
  • Multi Factor authentication
  • Secured remote access
  • Firewall and network security group management
  • Backup management
  • Incident management and response, including contracted third-party industry response experts

Compliance and Regulations

  • AICPA SOC 2 Type 2

  • ISO 27001, ISO 27701

  • A-Lign PCI DSS

Immuta SaaS Services & the GDPR

Under the GDPR, Immuta acts as both a data processor and a data controller.

Immuta Data Processing Agreement

Immuta as a Data Processor

When licensees use Immuta SaaS services to manage access to licensee personal data, Immuta acts as a data processor. Licensees may act as data controllers or data processors, and Immuta acts as a data processor or sub-processor. Immuta contractual terms incorporate Immuta’s commitments as a data processor. Our security controls are described below, and our list of sub-processors is available here.

Immuta as a Data Controller

When Immuta processes personal data and determines the purposes and means of processing that personal data, it acts as a data controller. For more information about how Immuta processes personal data as a data controller, see the Immuta Privacy Policy and SaaS Privacy Notice.

What is a Subprocessor?

A Subprocessor is a third party utilized by Immuta to deliver its SaaS Services as a data processor. Immuta engages different types of Subprocessors to perform the various services explained below.

Please see below for a list (current as of the dates mentioned below) of the names and locations of Immuta’s Subprocessors (including members of the Immuta Group and third parties).

Third Party Subprocessors

Immuta utilizes the AWS cloud service provider to host Immuta SaaS services. Licensee metadata, such as data dictionaries, policy-related data, user data, and audit logs, will thus live in an AWS environment, in the Immuta geographical region selected by Licensee, which could be Immuta APJ, Europe, or US. This list was last updated: 03/16/2026.

Entity Name Purpose Location of Processing
Abnormal AI, Inc. Email security and threat protection for corporate email services. Abnormal AI is not part of the Immuta SaaS offering. US
Amazon Web Services, Inc. Host Immuta’s SaaS services in the region elected by customers. In region
Apollo Inc. Business-to-business sales and business development activities, including prospecting, contact discovery, account research, and related outreach support. US
Datadog Inc. Manage security logs. US
Temporal Technologies, Inc. Execute background workloads In region
Megaport Inc. Transmit packets between cloud providers. In region
Google LLC Communicate with customers. US
Zoom Video Communications, Inc. Communicate with customers. US
Slack Technologies LLC Communicate with customers. US
Salesforce, Inc. Customer relationship management platform. US
FrontApp, Inc. Customer support platform. US

Immuta Group Subprocessors

Immuta works with a few third parties to support specific services within its overall SaaS offering. These providers are Subprocessors, as they may have access to personal data related to Licensee’s authorized users. This list was last updated: 03/16/2026.

Entity Name Purpose Location of Processing
Immuta Ltd Perform customer support tasks. UK
Immuta Pty Ltd Perform customer support tasks. Australia

Immuta SaaS Services & the GDPR

Infrastructure Security

Immuta is cloud-native, including all our supporting cloud computing infrastructure and our software solution (Software-as-a-Service).

Our cloud computing infrastructure is provided by Amazon Web Services (AWS). This infrastructure is built and managed not only in accordance with security best practices and standards, but also with the unique needs of the cloud in mind. AWS uses redundant and layered controls, continuous validation and testing, and substantial automation to ensure that the underlying infrastructure is monitored and protected 24×7.

We make continuous backups, which we keep for 7 days. In case of an incident, we can restore this backup immediately.

Physical Security

We rely on AWS for the physical security of our supporting cloud computing infrastructure. We also take physical security measures for our own offices (such as badge access and video surveillance).

Product Security

We have a clearly defined software development process designed to ensure that our software is well tested and ready for production.

We take security measures to protect our software solution from cyber attacks and to detect fraudulent or malicious activities. Our software is monitored and protected by an industry-leading continuous process of cloud security improvement and adaptation, which includes active defenses against known and unknown attacks. In addition, we also have periodic security measures carried out by a qualified external party (such as penetration testing).

Data Security

We take security measures to secure your data. We comply with applicable legislation relating to data protection and data privacy. We do not keep your data longer than necessary. Our DPA provides additional detail regarding our data retention practices.

Immuta offers a number of global deployment options to help meet customers’ compliance needs.

We only access your data on request or with your permission.

Attestation & Certification

We can demonstrate that we have appropriate controls in place to mitigate security, availability, confidentiality, processing integrity, or privacy risks.

Our security measures are audited annually by an independent and external party. If you need more information or if you would like to receive a copy of our SOC2 report, please make the request via your assigned account manager

Vulnerability Disclosure Program

Immuta's Vulnerability Disclosure Policy

Ready to get started?