Estuary

UNCOMPROMISING DATA SECURITY WITH ESTUARY FLOW

Estuary Flow ensures the security of your data with a robust architecture and advanced security measures, whether in our cloud or your private environment.

Estuary Flow's data security for cloud and private setups
Estuary Cloud provider & Region
Control Plane
US Data Plane
EU Data Plane
Customer Cloud
Customer VPC
Database
Flow Storage
Internet

DEPLOYMENT MODES THAT FIT ANY ENVIRONMENT

PUBLIC DEPLOYMENT

A fully managed SaaS option for fast, low-maintenance setup. Ideal for small to mid-sized organizations with standard security needs.

Learn more

YOUR DATA IS ALWAYS SECURE

Estuary is built from the ground up to be as secure as possible.

  • Estuary never stores your data

  • GDPR, CCPA and CPRA compliant

  • SOC 2 Type II certified

  • HIPAA

Secure Your Data with Estuary Flow: Compliance and Certification

CORE SECURITY FEATURES

Immutable Infrastructure

Systems are rebuilt with every new update to ensure they remain secure and up-to-date.

Zero-Trust Network Model

All communications are secured using TLS and mutual TLS (mTLS) for internal communications.

RBAC & Centralized Access Management

Role-based access control ensures secure resource sharing, with centralized verification of authorizations.

SECURITY IN EVERY REGION & DATA PLANE MOBILITY AND CONTROL

Data is processed and stored within regional boundaries, allowing customers to control where their data is deployed to ensure compliance with local regulations and alignment with security policies.

Map showing secure data connections across global regions for compliance and control.

EXPLORE PRIVATE DEPLOYMENTS FOR ENHANCED SECURITY

Maintain full control of your data with private deployments, ensuring maximum security and compliance within your own infrastructure.

Private deployments for maximum data control and security.