Skip to content

Wasabi Trust Center

Security and Data Protection You Can Trust

Explore the hub for our most-accessed security, compliance, and legal resources.

Security

Our approach to security is deep and multi-faceted, designed to protect your data, your storage account, and your business. Visit our security page to learn more, view Wasabi Academy's Knowledge Base articles about compliance and security, or use the information below to find what you need.

Learn More

Wasabi is secure by default and all data stored in Wasabi hot cloud storage is always encrypted at rest (even if the data is already encrypted by the storage application prior to sending it to Wasabi). Wasabi follows industry-best security models and security design practices. Read more

We have compiled recommended security best practices for users of the Wasabi cloud storage service. While it is not an exhaustive list of security measures, it covers the fundamentals that will help ensure the Confidentiality, Integrity, and Availability of your cloud data. Topics covered include encryption, authentication, data replication, immutability, logging, and security policies. Read more

Wasabi storage regions are deployed in fully secure and redundant data centers that are SOC-2 compliant and certified for ISO 27001, and PCI-DSS. Wasabi users have full control over where your data is stored by selecting the region-specific bucket. Read more

Wasabi takes the security of your credit card information very seriously. Wasabi operates in data centers certified for the Payment Card Industry Data Security Standard (PCI-DSS), an important standard for protecting payment information. Read more

Wasabi implements the technical and organizational measures, designed to secure your stored Content, identified here.

Customer

Classify, retain, and delete data appropriately.

Define user roles and permissions; use IAM policies instead of root credentials.

Require a second factor for login to strengthen access security.

Require multiple approvals for sensitive actions (e.g., Object Lock changes).

Connect Wasabi to your enterprise identity provider.

Prevent tampering with Write Once, Read Many (WORM) protection to defend against ransomware.

  • Client-Side Encryption: Encrypt before upload with your own keys.

  • SSE-C: Use Wasabi’s server-side encryption with your keys.

Define access controls, versioning, and lifecycle rules.

Use HTTPS for all transfers, secure API keys, and configure firewalls/VPNs.

Wasabis Role

Wasabi ensures that the foundation of the storage platform is always secure and reliable.

  • Automatic AES-256 encryption at rest

  • 11x9s (99.999999999%) data durability with redundancy and repair

  • Secure compute, storage, database, and networking infrastructure

  • Global data centers with redundant power, cooling, and 24/7 monitoring

  • Owned and managed hardware stack (servers, storage, networking)

  • Compliance with SOC 2 Type II, ISO 27001, HIPAA readiness, GDPR/UK GDPR, SEC

Have questions?

For any additional questions, just send us a message and we'll be happy to assist.

Privacy Inquiries