At Coralogix our customers’ data security comes first. We believe that excellence as a full-stack observability platform must be based on rock-solid security and compliance.
Below is a list of our security and compliance certifications along with the industry standard best practices that we follow for securing the Coralogix platform.
Our platform and services process data in a framework that ensures the privacy and security of our customers’ data.
Certification of our compliance with requirements of ISO/IEC 27001:2013.
Certification of our compliance with requirements of ISO/IEC 27701:2019.
Certification of our compliance with requirements of ISO/IEC 27017:2015.
Certification of our compliance with requirements of ISO/IEC 27018:2019.
Payment Card Industry (PCI) Data Security Standard Self-Assessment
Compliance with applicable rules and regulations of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 as a Business Associate.
In the event of a disaster which interferes with Coralogix’s ability to provide its services, this plan is to be used by the responsible individuals to coordinate the business recovery of their respective areas and/or departments.
An integral part of our Service Agreement
The Incident Management process is a component of Coralogix’s Information security program.
This policy sets forth the framework for Coralogix’s compliance with the Security Rule of HIPAA and PCI DSS.
This policy establishes a policy for mitigating the risks from physical security and environmental threats through the establishment of an effective physical security and environmental controls program.
The purpose of this document is to define the methodology for assessment and treatment of information risks in Coralogix, and to define the acceptable level of risk according to security laws, regulations and standards including HIPAA and PCI-DSS.
Service audit conducted by BDO based on the SOC framework
Coralogix security and availability overview presentation
Document Development Life Cycle (DDLC)
Coralogix’s procedures for the allocation of user access rights to information systems and services
Our policy outlining a user’s access to information or information systems used to deliver Coralogix’s business
List of authorized Sub Processors