Security isn't a feature we bolt on — it's the foundation everything at Skycloak is built on. From AWS infrastructure to employee access controls, every layer is designed to protect your data and meet the highest compliance standards.
We maintain rigorous third-party audits and certifications so your security and compliance teams don't have to take our word for it. All reports are available through our Trust Center.
Independently audited across all five Trust Service Criteria: Security, Availability, Confidentiality, Processing Integrity, and Privacy.
Compliant
Certified information security management system covering risk assessment, access control, encryption, incident management, and business continuity planning.
Certified
Full compliance with the EU General Data Protection Regulation. Standard Contractual Clauses (SCCs) available for international data transfers. Data Processing Agreements on request.
CompliantHealthcare data protection compliance with Business Associate Agreements (BAA) for covered entities and their business associates.
Coming SoonEvery request to your Keycloak instance passes through five distinct security layers, each independently hardened and monitored.
Cloudflare provides DDoS mitigation, Web Application Firewall (WAF) rules, and TLS termination at the edge before traffic reaches our infrastructure.
AWS VPC with private subnets, Network Access Control Lists (NACLs), and Security Groups enforce strict ingress and egress rules. No internal services are exposed to the public internet.
A dedicated service mesh enforces mutual TLS (mTLS) between all services. Every internal communication is encrypted and authenticated at the transport layer.
Keycloak runs in hardened containers with read-only filesystems, non-root processes, and resource limits. Application-level firewalls filter malicious requests.
AES-256 encryption at rest with hardware-backed key management. TLS 1.3 for all data in transit.
Your Keycloak instance runs on hardened AWS infrastructure with complete tenant isolation across dedicated compute, database, and credential boundaries.
Production and development workloads run in fully isolated AWS environments. Production infrastructure is locked down with strict IAM policies and segregated access controls.
Every customer gets dedicated compute resources, a dedicated database, and dedicated credentials. No shared database tables, no shared pods, no noisy-neighbor risk.
Deploy in the region closest to your users: US East (Ohio), EU Central (Frankfurt), Asia Pacific (Sydney), or Canada (Central). Data stays in your chosen region.
Real-time health checks, performance monitoring, and automated alerting. Self-healing mechanisms automatically replace unhealthy pods without manual intervention.
All data is encrypted in transit and at rest using industry-standard cryptographic protocols with hardware-backed key management.
As a managed Keycloak provider, we handle the infrastructure and operations so you can focus on your application. Here's exactly where the boundary lies.
You choose where your data lives. We ensure it stays there with strict controls and transparent data handling practices.
Deploy in US East (Ohio), EU Central (Frankfurt), Asia Pacific (Sydney), or Canada (Central). Your data — including backups and logs — never leaves your chosen region.
For cross-border data transfers, we rely on Standard Contractual Clauses (SCCs) as approved by the European Commission. Data Processing Agreements are available on request.
Audit logs retained up to 365 days depending on plan (90 days default). Automated database backups retained for 7 days. Upon account termination, a 60-day grace period is provided for data export, after which all data is permanently deleted.
AWS provides core infrastructure (compute, database, storage) and Cloudflare provides edge security (DDoS protection, WAF, TLS termination). We do not use third-party analytics, monitoring, or tracking services that access your customer data. Full subprocessor list available on request.
Structured disaster recovery procedures and severity-based incident response to minimize downtime and keep you informed.
All incidents are classified by severity with defined notification timelines:
The security of your data depends on the people who manage it. Every team member follows strict security practices from day one.
Regular testing by independent security firms, continuous vulnerability scanning, and transparent reporting through our Trust Center.
Annual third-party penetration testing following OWASP Testing Guide methodology. Results and remediation reports available through the Trust Center.
Continuous automated scanning of infrastructure and dependencies. Keycloak CVEs are actively tracked, and affected instances are upgraded to patched versions promptly.
All infrastructure changes undergo peer review and automated security checks before deployment. Secure SDLC practices enforced across all codebases.
We value the work of security researchers. If you believe you've found a security vulnerability in Skycloak, we want to hear from you.
Please provide detailed reproduction steps and allow us reasonable time to investigate and remediate before public disclosure. We will credit researchers who report valid findings, upon request.
Common questions from security and procurement teams.
Yes. SOC 2 Type II, ISO 27001, and penetration test reports are available through our Trust Center. Contact us if you need access to gated documents.
You choose your deployment region at cluster creation: US East (Ohio), EU Central (Frankfurt), Asia Pacific (Sydney), or Canada (Central). All data — including backups and audit logs — stays within your chosen region.
No. Every Skycloak customer receives dedicated compute resources, a dedicated database, and dedicated credentials. There are no shared database tables, no shared pods, and no shared secrets between customers.
We follow a severity-based incident response process. Critical incidents (active breaches or total outages) trigger notification within 1 hour. High-severity incidents within 4 hours. All incidents include root cause analysis and remediation documentation.
We actively track all Keycloak security advisories. When a CVE is disclosed, we assess impact and upgrade affected instances to the patched Keycloak version. Critical vulnerabilities are prioritized for immediate action. You'll be notified of any CVE that affects your instance.
Yes. Our DPA includes Standard Contractual Clauses (SCCs) for international data transfers. Contact us at sales to request one.
AWS provides core infrastructure and Cloudflare provides edge security services. We do not use third-party analytics, telemetry, or monitoring services that access customer identity data. A detailed subprocessor list is available on request.
Yes. Skycloak dashboard access supports SSO via OpenID Connect. You can use your own identity provider to authenticate your team's access to the management console.
Explore our advanced security add-ons including WAF, DDoS protection, rate limiting, geo-blocking, and more.
Our team is ready to discuss your security and compliance requirements. Request our SOC 2 report, schedule a security review, or report a concern.