Security at SingleStoreoverview

Security at SingleStore

At SingleStore we understand that we want to protect your data and the data of those we care about. From development to delivery we ensure that security is considered, designed, reviewed and implemented to ensure the data of our customers, and their customers, is looked after as if it was our own.

Security Certifications

SingleStore is committed to protecting our customers and their data and put security at the heart of all we do. We have secured industry-leading security certifications including ISO/IEC 27001, SOC 2 Type 2 and Privacy Shield. SingleStore is also fully compliant to the requirements of HIPAA, CCPA and GDPR.

GDPR ReadyHIPAA CompliantISO 27001 CertifiedAICPA SOC

Database Securityfeatures

We have built security into all our products, both those hosted by customers on their own infrastructure and those we host on our customers’ behalf. Encryption, authentication, access and monitoring are all things we worry about for you, so you can focus on the data and the value it can add. Learn how to implement these features. View Docs

Access Authentication

SingleStore empowers the user to select a secure method of authentication that suits their enterprise.


Data encryption is supported at time of ingest and when delivered across nodes using SSL and TLS 1.2. Easy to integrate third party encryption for data at rest.

Audit Logging

Configurable database logging writes all activities to a secure external location to support information security tasks such as tracking user access, investigating suspicious activities and validating access control policies.

Enterprise Grade

SingleStore provides enterprise grade security features to ensure your systems, your users & your data is adequately protected.

Only Available on SingleStore Managed Service

Workload Isolation

Ensuring clusters are isolated from each other and guaranteeing both confidentiality and integrity of your data.


End to end encryption both for data in transit and data at rest.


Ensure only devices you trust and have given access to, can access your cluster or your data.


We advocate transparency so have included below policies and documentation relevant to the security posture of SingleStore and its products.

For further questions and clarification, please contact us.