Atatus Trust Center

Monitoring starts with trust and security

Atatus protects your data, adhering to the highest security, compliance, and privacy standards.

Safeguarding Data with Information Security Program

At Atatus, we prioritize security assurance to build confidence in our customers. Our comprehensive Information Security Program (ISP) encompasses all aspects of our operations, from product development to business practices. Our ISP implements robust organizational and technical security measures to maintain a secure environment for our employees, clients, and the data we secure. By adhering to security standards and continuously enhancing our protocols, we ensure the protection and integrity of your valuable data.

SOC 2 Type 2 Compliant

SOC 2 Compliance

At Atatus, we undergo SOC 2 Type 2 audits to ensure our platform applies and maintains security controls. This audit evaluates our safeguards' effectiveness, ensuring that your data is protected with excellence. Our SOC 2 Type 2 report, based on the AICPA’s Trust Services Criteria, is available upon request and under a non-disclosure agreement. Adhering to these standards demonstrates our unwavering commitment to data security and operational integrity.

ISO 27001 Certified

ISO 27001 Certification

A certification from the Standards Institution of Israel confirms that Atatus deploys an infrastructure monitoring and observability platform compliant with ISO 27001:2022 standards. It provides assurance to stakeholders that Atatus adheres to rigorous standards in safeguarding information assets against potential risks and threats.

Certificate Issuance Date: Aug 01, 2023
Expiration Date: Aug 01, 2026

Platform Architecture and Security

At Atatus, we pride ourselves on delivering a cloud-native infrastructure monitoring and observability platform that ensures scalability, availability, and security as core principles. Designed to process information strictly within a customer’s cloud environment, our service guarantees that customer data never crosses regional boundaries; all data analysis is performed in the region where the data is initially discovered. By connecting to customer environments through cloud-native APIs, we eliminate the need for agent deployments, enhancing performance and security.

Our platform ensures that data is encrypted at all times, both at rest and in transit, using industry-leading encryption standards such as AES-256 and TLS 1.2 or higher. Our architecture is developed by seasoned cybersecurity experts who adhere to rigorous secure software development lifecycle (SSDLC) procedures. To detect and mitigate vulnerabilities, all platform code undergoes peer reviews and stringent security scans, including Static Application Security Testing (SAST) and Software Composition Analysis (SCA). Furthermore, we conduct annual third-party penetration tests and immediate remediation of critical findings.

To obtain the SOC 2 and ISO certification reports, please contact our security team at

For more information about our Terms of Service, Privacy Policy, GDPR compliance, and Data Protection Addendum (DPA), please refer to the following pages:

  1. Privacy Policy
  2. Terms of Service
  3. GDPR
  4. Data Protection Addendum (DPA)

Have security concerns? We're here to help