Cloud Storage built to secure the world’s data

Protect your enterprise’s most critical data assets with the full capabilities of the Wasabi storage infrastructure.

 

Wasabi Cloud Storage Pillars

Account Security

Accessing data in a secure and simplified way should always be paramount in any storage infrastructure. Utilizing Multi-Factor Authentication (MFA), Multi-User Authentication (MUA), unique Identity & Access Management (IAM) policies and Enterprise level single sign-on (SSO) options, your cloud storage infrastructure is prepared for anything.

Physical Security

Wasabi storage regions are deployed in top tier data centers that are SOC 2 compliant and certified for ISO 27001 and PCI-DSS.

Data Security

Wasabi's enhanced security posture supports server-side encryption (SSE-C) that’s automatically applied on top of the original ingest object state.

Payment Security

In conjunction with Stripe, Wasabi’s payment processor, all payments are PCI DSS certified and deliver detailed invoices with full usage metrics. Find more information on Stripe here.

Security is obviously always on our mind. Data security is such a high-value need because schools are being targeted for things like ransomware now more than ever. It's not really ‘if’ an attack happens anymore, it's ‘when.’

Kevin Warenda

Director of Information Technology Services at The Hotchkiss School

Advanced Account Security Protocols with MUA

Multi-User Authentication (MUA) is a first of it’s kind security feature in the cloud storage space. When enabled, this feature requires that multiple root users sign off on an account deletion. This prevents bad actors or malicious individuals who have gained control of the account to delete the entire account at will.

Learn more about MUA
 

 

Top Security Features Breakdown

Object Lock

Wasabi Object Lock maintains a write once, read many (WORM) archiving structure that prevents data from being edited or deleted due to ransomware, bad actors, accidental deletions and other threats over a set period. Object Lock is the ultimate in data protection.

Replication

Take advantage of intracontinental cloud replication between storage locations, creating multiple copies of your files and enabling your organization to replicate or copy your data between Wasabi regions to protect against ransomware attacks, malicious data manipulation, natural disasters, or even accidental deletion. Automatic failover, if primary storage is offline, allows for optimized data access and reduced latency when accessing from different regions for seamless business continuity.

Multi-Factor Authentication & Single Sign-On

Accounts accessed through passwords can be easily compromised , leaving your organization’s data open to a host of threats. Multi-Factor Authentication (MFA) and Single Sign-On (SSO) tack on additional security measures to login credentials, stopping would-be hackers from wreaking havoc before they can even get in.

Encryption

The Wasabi Cloud Storage platform is encrypted at rest and in transmission. Wasabi supports the HTTPS protocol for encryption during transmission of data to and from Wasabi.

Wasabi supports Server-side encryption with customer-provided encryption keys (SSE-C) that allow you to set your own encryption keys. With the encryption key you provide as part of your request, Wasabi manages the encryption as it writes to disks and decryption when you access your objects. Therefore, you don’t need to maintain any code to perform data encryption and decryption. The only thing you do is manage the encryption keys you provide.

Learn more about Wasabi’s security best practices

Vulnerability and Suspicious Activity Reporting

Spot a vulnerability?

Wasabi investigates all reported vulnerabilities.  If you would like to report a vulnerability, please contact us at [email protected].  When you contact us, please include any supporting material that would help us understand the problem. We are happy to take any input from customers, but at this time, we do not offer a bug bounty program.

Find any suspicious activity?

If you believe that Wasabi storage resources are being used for questionable purposes (for example, a Wasabi storage bucket being used for suspicious activity), or if you have additional system security questions beyond what is available for reference in the Wasabi Knowledge Base, please contact us at [email protected] or for privacy related matters, please contact [email protected].

CONTACT SALES

What if you could store ALL of your data in the cloud affordably?

NOW YOU CAN. Wasabi is here to guide you through your migration to the enterprise cloud and to work with you to determine which cloud storage strategy is right for your organization.