Wasabi Trust Center
Security and Data Protection You Can Trust
Explore the hub for our most-accessed security, compliance, and legal resources.
Data Management
Classify, retain, and delete data appropriately.
Identity & Access Management (IAM)
Define user roles and permissions; use IAM policies instead of root credentials.
Multi-Factor Authentication (MFA)
Require a second factor for login to strengthen access security.
Multi-User Authentication (MUA)
Require multiple approvals for sensitive actions (e.g., Object Lock changes).
Single Sign - On (SSO)
Connect Wasabi to your enterprise identity provider.
Object Lock (Immutability)
Prevent tampering with Write Once, Read Many (WORM) protection to defend against ransomware.
Encryption Options
Client-Side Encryption: Encrypt before upload with your own keys.
SSE-C: Use Wasabi’s server-side encryption with your keys.
Bucket & Object Policies
Define access controls, versioning, and lifecycle rules.
Network Security
Use HTTPS for all transfers, secure API keys, and configure firewalls/VPNs.
Wasabi ensures that the foundation of the storage platform is always secure and reliable.
Automatic AES-256 encryption at rest
11x9s (99.999999999%) data durability with redundancy and repair
Secure compute, storage, database, and networking infrastructure
Global data centers with redundant power, cooling, and 24/7 monitoring
Owned and managed hardware stack (servers, storage, networking)
Compliance with SOC 2 Type II, ISO 27001, HIPAA readiness, GDPR/UK GDPR, SEC
Have questions?
For any additional questions, just send us a message and we'll be happy to assist.