Compliance & Certifications
Transparency is at the core of our security commitment. This page provides an overview of Phala’s compliance certifications, security controls, and data processing practices.For compliance reports, security documentation, or to schedule a security review, visit the Trust Center or contact [email protected].
Compliance Reports
Phala maintains industry-standard compliance certifications to demonstrate our commitment to security and privacy.SOC 2 Type I
SOC 2 Type I Report
Service Organization Control 2 Type I report validating our security, availability, and confidentiality controls at a specific point in time.
- Security: Protection against unauthorized access
- Availability: System availability for operation and use
- Confidentiality: Protection of confidential information
HIPAA Compliance
HIPAA Compliance
Health Insurance Portability and Accountability Act compliance certification demonstrating our commitment to protecting sensitive patient health information. Coming Soon
Security Controls Framework
Phala has implemented a comprehensive security control framework with 120+ controls across multiple security domains. All controls are actively implemented and monitored.Control Categories
Data & Customer Protection
Data & Customer Protection
- Customer data handling policies approved by management
- Least-privileged access to sensitive data
- Encryption of web-based management interfaces
- Data classification and retention policies
Access Control
Access Control
- Role-based access control (RBAC)
- Multi-factor authentication (MFA) required
- Periodic access reviews
- Unique user identities
- Access provisioning and deprovisioning procedures
- Root access restrictions
Encryption
Encryption
- Data encrypted at rest using strong cryptographic algorithms
- Data encrypted in transit (TLS 1.2+)
- Key management procedures
- Removable media encryption
- Cryptography policies and standards
Network Security
Network Security
- Network security controls limiting inbound/outbound traffic
- Web Application Firewall (WAF)
- Intrusion Detection/Prevention System (IDS/IPS)
- Remote server administration port restrictions
- Encrypted remote production access
Incident Response
Incident Response
- Documented incident response plan
- Incident response team with defined roles
- Security event tracking and evaluation
- Post-mortem reviews and lessons learned
- Breach notification procedures
- Annual incident response testing
Business Continuity & Disaster Recovery
Business Continuity & Disaster Recovery
- Documented disaster recovery plan
- Business continuity plan
- Business impact analysis
- High availability architecture
- Annual BCP/DR testing
Vulnerability Management
Vulnerability Management
- Regular vulnerability scans
- Annual third-party penetration testing
- Vulnerability management policy
- Patch management procedures
Logging & Monitoring
Logging & Monitoring
- Centralized logging system
- Real-time alerting
- Database and server monitoring
- File integrity monitoring (FIM)
- Continuous control monitoring
Personnel Security
Personnel Security
- Background checks for personnel
- Security awareness training
- Code of conduct
- Non-disclosure agreements
- Termination/offboarding procedures
Vendor Management
Vendor Management
- Vendor risk assessments
- Compliance monitoring for critical vendors
- Data processing agreements
- Subprocessor management
Subprocessors
Phala works with trusted third-party service providers to deliver our services. Below is a list of our current subprocessors and their purposes.| Subprocessor | Purpose | Jurisdiction |
|---|---|---|
| Google Cloud | Infrastructure hosting | US, EU |
| Stripe | Payment processing | US |
| PostHog | Product analytics | US/EU |
| Customer.io | Marketing & Email services | US |
| Attio | CRM | UK |
| Marketing analytics | US | |
| Fingerprint | Security analytics | US |
| GitHub | Code repository and software development | US |
Data Processing Agreement
Our commitment to protecting your data extends to our relationships with subprocessors:- All subprocessor agreements impose data protection obligations substantially similar to those in our main DPA
- We notify customers of any intended additions or replacements to the subprocessor list
- Phala remains liable for subprocessor performance in accordance with our DPA terms
Data Processing Agreement
View our full Data Processing Agreement for detailed information on data handling practices.
Privacy
Phala maintains comprehensive privacy practices:- Public Privacy Policy: Available at phala.com/privacy
- Privacy by Design: TEE technology ensures data remains encrypted even during processing
- Data Subject Rights: Users can access, correct, and delete their personal information
- Privacy Compliance Review: Quarterly executive review of privacy compliance
- HIPAA Privacy Rule: Policies for allowable use and disclosure of PHI (for covered entities)
Security Architecture
Phala Cloud’s security is built on Trusted Execution Environments (TEEs) that provide hardware-level isolation and cryptographic guarantees:Trust Center Verification
Automated verification reports for every deployment
Security Architecture
Technical security architecture and design documents
Security Audit
Independent third-party security audit by zkSecurity
Chain of Trust
Understand the cryptographic chain of trust
Regulatory Compliance
Phala Cloud helps customers meet various regulatory requirements:| Regulation | How Phala Helps |
|---|---|
| GDPR | Data encryption at rest and in transit, DPA available, subprocessor transparency |
| HIPAA | TEE-based data isolation, access controls, audit logging (BAA available upon request) |
| SOC 2 | Certified Type I report, comprehensive security controls |
| PCI DSS | Encryption, access controls, network segmentation |
Contact
For compliance inquiries, security documentation requests, or to schedule a security review:- Email: [email protected]
- Trust Center: phala.com/trust
Additional Resources
- Trust Center - Compliance reports and security documentation
- Privacy Policy - Data handling practices
- Terms of Service - Service agreement
- Data Processing Agreement - DPA for data processors

