Trust & Security
Varonis has certification for compliance with ISO 27001, 27017, 27018, and 27701. These certifications were performed by an independent, official ISO third-party auditor.
is the best-known standard that provides requirements for an information security management system (ISMS).
gives guidelines for information security controls applicable to the provision and use of cloud services.
establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.
SOC 2 (System and Organization Controls) is a regularly refreshed report that focuses on non-financial reporting controls as they relate to security, availability, and confidentiality of a cloud service.
SOC 3 (System and Organization Controls) is a regularly refreshed report that focuses on internal controls as they relate to security, availability, and confidentiality of a cloud service.
NIAP Common Criteria Certification
Testing and validation for Varonis was completed by Acumen Security, a National Institute of Standards and Technology (NIST) accredited and NIAP-approved commercial testing laboratory, in December 2020. Common Criteria Certification is valid for two years.
We’re committed to information security at every level of our organization.
The Varonis security program is based on industry-leading best practices. Along with third-party penetration tests, Varonis uses dynamic application testing and automated scanning to continually validate our software’s security.
Our secure software development lifecycle includes:
A team of security architects within the R&D organization who specialize in software security.
Architecture design that adheres to National Institute of Standards and Technology (NIST) principles.
Identifying and tracking application security issues, threat mapping, and developing appropriate mitigations.
Application Security Verification Processes (ASVS) closely aligned with the OWASP framework with elements of the OWASP ASVS.
Each new feature goes through security architecture review which includes threat mapping, applicable controls are included in the feature design and development.