Security & Compliance
Customers entrust us with their workloads, and therefore with their data. We take this trust extremely seriously, and employ a multifaceted approach to ensure security and isolation.
In addition to security being at the core of our infrastructure and software, we are also audited and pentested regularly to ensure nothing slips through the cracks.
SOC 2
As part of SOC 2 certification, our compliance is continuously monitored by external security experts. The findings of these audits and our SOC 2 certification can be viewed in our Trust Center.
Trust Center
To provide transparency into our security controls and certifications, anyone can request access to our Trust Center to view our SOC 2 report, controls, and list of sub-processors.
Related topics
- Audit Logs → Track changes to your workspace with detailed audit logging.
- Private Networking → Connect instances within a workspace over a secure private network.
- IP ranges → Restrict access to traffic from Namespace’s trusted IP ranges.
- Data Residency → Control where your data lives with customizable data residency support.
- Federation → Enable secure, bidirectional access between Namespace and your cloud.