Security and Compliance

Security and Compliance across clusters and regions

Security and Compliance across clusters and regions

Last update: January 30, 2026

Akuity is a secure, compliance-validated platform designed for enterprises running regulated and mission-critical delivery infrastructure. Akuity maintains SOC 2 Type II, ISO 27001:2022, PCI DSS 4.0.1, and HIPAA-aligned controls, with regional data residency options in the United States and European Union.

Security, privacy, and compliance are foundational to how Akuity builds and operates its platform. Customers trust Akuity to manage critical delivery infrastructure, and we design our systems to meet the expectations of security-conscious and regulated organizations.

This page provides a comprehensive overview of how we protect customer data, how our platform is secured, and how our practices are validated through independent audits and certifications.

Security Certifications and Compliance Frameworks


Akuity maintains independent validation against widely recognized security and compliance frameworks:

  • SOC 2 Type II

    Independently audited controls covering the Security Trust Service Criteria, with operational effectiveness validated over time.


  • ISO/IEC 27001:2022

    Certified Information Security Management System (ISMS) aligned with international best practices for risk management and governance.


  • PCI DSS v4.0.1 (Service Provider)

    Report on Compliance (ROC) completed, validating platform and operational controls against the latest PCI standard.


  • HIPAA

    Administrative, technical, and operational safeguards aligned with HIPAA requirements.


  • CSA STAR Level 1

    Public self-assessment aligned with the Cloud Controls Matrix (CCM).


  • GDPR Alignment

    Platform and operational practices designed to support data protection and privacy principles under GDPR.


    Audit reports and supporting documentation are available in our Trust Center: https://trust.akuity.io

Security Philosophy

Akuity follows a security-by-design and privacy-by-design approach. Security is embedded throughout the lifecycle of our platform, from design and development to deployment and operations.

Our program emphasizes least privilege, defense in depth, continuous monitoring, independent validation, and continuous improvement.

Shared Responsibility Model

Akuity is responsible for securing the Akuity Platform, including the managed control plane, supporting infrastructure, and internal operations.

Customers are responsible for securing their own environments, credentials, configurations, and workloads managed through the platform. This shared responsibility model aligns with standard cloud security practices and is consistent with SOC, ISO, PCI, and HIPAA frameworks.

Cloud Infrastructure and Platform Security

The Akuity Platform is hosted on Amazon Web Services, leveraging AWS physical, environmental, and infrastructure security controls.


Environment Isolation

  • Separate environments for production, staging, and development

  • Segmented networks and access boundaries

  • Logical isolation between customer environments

Network Security

  • All external communication encrypted using TLS 1.2 or higher

  • Strictly controlled network access

  • Web application firewall and DDoS protection

Data Residency and Regional Architecture

Akuity operates multiple regions to support data residency and regulatory requirements.

United States Region

  • Designed for US-based customers

  • Deployed across multiple availability zones


European Union Region

  • Fully self-contained EU region

  • Primary region in Frankfurt, Germany with a secondary backup region in Ireland

  • Customer data, including logs and telemetry, remains within the EU

Customers select the region that best aligns with their regulatory and operational needs.

Data Security, Encryption and Key Management

Encryption

  • In transit: TLS 1.2 or higher

  • At rest: AES-256 encryption for databases, object storage, and backups


Key Management

  • Encryption keys managed using AWS Key Management Service (KMS)

  • Separation of duties enforced

  • No shared or hard-coded encryption keys

Customer Data Usage and Access

Akuity does not sell customer data and does not use customer data for advertising or marketing purposes.

Access to customer data is limited to authorized personnel on a need-to-know basis, is time-bound when required, and is logged and audited in accordance with internal policies and compliance requirements.

Customer data is used solely to provide and support the Akuity Platform.

Support Access Controls

When access to customer environments is required for support purposes, Akuity follows controlled access procedures:

  • Access is limited, approved, and time-bound

  • All access is logged and monitored

  • Access is revoked once the support activity is complete

These controls align with least-privilege and auditability requirements across all compliance frameworks.

Secure Software Development Practices

Akuity follows disciplined secure software development practices:

  • Mandatory peer review for all code changes

  • Version-controlled change management

  • Automated testing and security checks in CI/CD pipelines

  • Dependency scanning and vulnerability detection

  • Separation of duties between development and production access


Logging, Monitoring, and Incident Response

Monitoring and Logging

  • Centralized logging across infrastructure and applications

  • Audit logging for administrative and access activities

  • Continuous monitoring for anomalous behavior

Incident Response and Notification

  • Documented incident response plan

  • Defined escalation and communication procedures

  • Customers are notified of security incidents in accordance with contractual and regulatory obligations

Vulnerability Management

  • Regular vulnerability scanning of public-facing assets

  • Risk-based remediation timelines

  • Periodic third-party penetration testing

  • Verification and tracking of remediation efforts

Business Continuity and Disaster Recovery

  • Continuous backups of customer data

  • Backups stored in a secondary region

  • Documented disaster recovery procedures

  • Regular testing of recovery processes

Data Retention and Deletion

Akuity maintains documented data retention and deletion policies aligned with contractual and regulatory requirements.

Upon contract termination or customer request, customer data is securely deleted within defined timeframes. Confirmation of deletion can be provided upon request.

Employee Security

  • Background checks conducted prior to granting access

  • Mandatory security and privacy training

  • Additional secure coding training for engineers

  • Confidentiality and acceptable use policies enforced

Third-Party Risk Management

  • Risk-based vendor assessment process

  • Review of third-party security attestations

  • Least-privilege access for vendors

  • Contractual security and data protection requirements

AI and Data Usage

Akuity does not use customer data to train machine learning or AI models without explicit customer consent.

Akuity’s approach to AI is security-first: it uses platform context (live logs/events/manifests and deployment history) to make AI outputs accurate, and it can take controlled, auditable actions (like runbook-driven changes) with least-privilege and approvals where needed—while not using customer data to train AI models without explicit consent.

Akuity Intelligence adds AI-powered GitOps to Argo CD by summarizing what changed and the risk of a promotion (so teams aren’t deploying “blind”), and by accelerating troubleshooting with natural-language guidance grounded in the cluster’s real state.

For deploy, debug, and remediation, it closes the loop: AI detects common failure patterns, proposes or executes predefined runbooks (e.g., adjust resources, restart safely, patch configs), then re-checks health—shrinking MTTR from “wake up + investigate” to minutes.

Compliance Scope Clarification

  • PCI DSS: Akuity is assessed as a service provider and does not store, process, or transmit cardholder data on behalf of customers.

  • HIPAA: Akuity supports HIPAA-regulated workloads through aligned safeguards but is not a covered entity.

  • CSA STAR: Level 1 self-assessment based on publicly available documentation.

Responsible Disclosure and Security Contact

Akuity encourages responsible disclosure of security vulnerabilities.

  • Security contact: security@akuity.io

  • Reported issues are reviewed, triaged, and addressed according to internal procedures.

Compliance Roadmap

Akuity continuously evaluates additional security and compliance frameworks based on customer needs, regulatory developments, and industry best practices.

Learn More

Akuity Pro or Akuity Enterprise?

See a feature-by-feature comparison.

Sign Up for Akuity Updates

Practical guidance on MTTR reduction, GitOps at scale, and safe automation, with product updates from the Argo CD and Kargo team.

@2026 Akuity Inc. All rights reserved.

Akuity Inc. 440 N. Wolfe Road, Sunnyvale, CA 94085-3869 US +1-510-771-7837

SOC2 Type 2 Compliant

Sign Up for Akuity Updates

Practical guidance on MTTR reduction, GitOps at scale, and safe automation, with product updates from the Argo CD and Kargo team.

@2026 Akuity Inc. All rights reserved.

Akuity Inc. 440 N. Wolfe Road, Sunnyvale, CA 94085-3869 US +1-510-771-7837

SOC2 Type 2 Compliant

Sign Up for Akuity Updates

Practical guidance on MTTR reduction, GitOps at scale, and safe automation, with product updates from the Argo CD and Kargo team.

@2026 Akuity Inc. All rights reserved.

Akuity Inc. 440 N. Wolfe Road, Sunnyvale, CA 94085-3869 US +1-510-771-7837

SOC2 Type 2 Compliant