Trust · Security & Compliance

Built to be procured by enterprise.

Ceburu is engineered for the controls, audits, and contracts that regulated industries actually require. SOC 2 Type II certified. HIPAA compliant. ISO 27001 in flight. Single-tenant and on-prem deployment options. Encryption in transit and at rest. The work to make procurement painless is done — so your evaluation isn't.

I · Certifications

Audited. Compliant. Documented.

Independent third-party attestations covering the controls, data-handling, and infrastructure that enterprise procurement requires.

SOC 2 Type II

Certified

Independent audit covering security, availability, processing integrity, confidentiality, and privacy controls. Continuous monitoring across the platform.

Auditor · AICPA-aligned Report under NDA

HIPAA

Compliant

Aligned with HIPAA Security and Privacy Rules. BAA available on request. Designed for clinical infrastructure, EHR integrations, and healthcare operational data.

BAA · Available on request PHI-grade controls

ISO/IEC 27001

In progress · Expected Q3 2026

Active certification process for the international standard for information security management systems. Controls implemented; audit period underway with expected completion in Q3 2026.

Stage · Audit period Internal evidence complete
II · Security & Infrastructure

Defense in depth, by default.

Controls baked into the platform — not bolted on later. Everything below is enabled out of the box for every Ceburu deployment.

Encryption everywhere

AES-256 at rest. TLS 1.3 in transit. Customer-managed keys (BYOK) supported for enterprise tiers.

SSO, SCIM & MFA

SAML 2.0 and OIDC SSO. SCIM provisioning. MFA required for all admin actions. Okta, Azure AD, Google Workspace supported.

Role-based access control

Granular RBAC across users, teams, services, and data. Least-privilege by default. Approval workflows for sensitive operations.

Audit logs & lineage

Tamper-evident audit logs for every administrative and data action. SIEM-exportable. Retention configurable per compliance regime.

Cloud, single-tenant & on-prem

SaaS by default. Dedicated single-tenant deployments for regulated industries. Fully air-gapped on-prem available for the most sensitive environments.

Continuous testing

Annual third-party penetration testing. Continuous vulnerability scanning. Production change-management review for all critical deploys.

III · Data Privacy

Your data stays yours.

Ceburu is built to respect data residency, processing limitations, and the contractual realities of doing business across borders.

GDPR & CCPA-ready. Ceburu processes customer data as a Data Processor under GDPR and a Service Provider under CCPA/CPRA. A Data Processing Agreement (DPA) is available on request and can be executed as part of standard procurement.

Data residency. Customer data is processed in the AWS region you select. U.S. (us-east-1, us-west-2) and EU (eu-west-1, eu-central-1) regions available at GA; additional regions on the roadmap.

Minimum necessary. Ceburu collects only the telemetry needed to operate the platform. No customer end-user PII is required for product operation. Configurable data-retention windows per workspace.

Sub-processors. A current list of all third-party sub-processors, their roles, and processing regions is available below. We notify customers in advance of any material change.

Request DPA
Sub-processor Region
Amazon Web Services Cloud infrastructure & hosting US · EU
ServiceNow IT service management & workflow US
CrowdStrike Endpoint security & threat detection US

Need the SOC 2 Type II report?

We share the full SOC 2 Type II report under a standard NDA. Most security reviews are unblocked in 24 hours.

IV · Frequently Asked Questions

Common questions, answered.

The questions we hear most often from security teams, procurement, and IT leaders evaluating Ceburu.

Does Ceburu help with regulatory compliance requirements?
Yes. Ceburu provides built-in compliance monitoring and reporting features to help organizations meet industry standards such as HIPAA, GDPR, ISO 27001, and SOC 2 Type II. Our platform continuously tracks security logs, access controls, and policy adherence to ensure compliance readiness.
Can Ceburu generate compliance reports for audits?
Absolutely. Ceburu automates compliance reporting by consolidating security logs, access records, and system activity into detailed reports. These reports can be customized to align with audit requirements and regulatory frameworks, ensuring transparency and easy documentation for IT governance.
How does Ceburu handle security logs?
Ceburu collects, analyzes, and stores security logs, providing real-time insights and alerts for potential threats and anomalies.
Do you offer cloud and on-premises solutions?
Yes — Ceburu supports on-premises, cloud, and hybrid IT environments, providing flexibility to meet diverse organizational needs.
What types of assets can Ceburu monitor?
Ceburu monitors a wide range of IT assets, including servers, network devices, applications, and cloud services.
Can I set up custom alarms and triggers in Ceburu?
Yes — Ceburu allows you to configure custom alarms and triggers based on specific criteria to proactively manage your IT environment.
What support resources are available for Ceburu users?
Ceburu offers comprehensive documentation, a learning center with courses and tutorials, and a dedicated support team to assist users.
How can I get started with Ceburu?
To get started, you can request a demo or contact our sales team for more information.
V · Contact & Disclosure

Security at Ceburu has a real address.

No shared inboxes, no compliance theater. The team that owns security responds directly.