Wasabi Trust Center

Security and Data Protection You Can Trust

Explore the hub for our most-accessed security, compliance, and legal resources.

Customer

Classify, retain, and delete data appropriately.

Define user roles and permissions; use IAM policies instead of root credentials.

Require a second factor for login to strengthen access security.

Require multiple approvals for sensitive actions (e.g., Object Lock changes).

Connect Wasabi to your enterprise identity provider.

Prevent tampering with Write Once, Read Many (WORM) protection to defend against ransomware.

  • Client-Side Encryption: Encrypt before upload with your own keys.

  • SSE-C: Use Wasabi’s server-side encryption with your keys.

Define access controls, versioning, and lifecycle rules.

Use HTTPS for all transfers, secure API keys, and configure firewalls/VPNs.

Wasabis Role

Wasabi ensures that the foundation of the storage platform is always secure and reliable.

  • Automatic AES-256 encryption at rest

  • 11x9s (99.999999999%) data durability with redundancy and repair

  • Secure compute, storage, database, and networking infrastructure

  • Global data centers with redundant power, cooling, and 24/7 monitoring

  • Owned and managed hardware stack (servers, storage, networking)

  • Compliance with SOC 2 Type II, ISO 27001, HIPAA readiness, GDPR/UK GDPR, SEC

Have questions?

For any additional questions, just send us a message and we'll be happy to assist.

Privacy Inquiries