99.99%
Uptime SLA
0
Data Breaches
AES-256
Encryption
24/7
Security Monitoring

Your Data Rights & Controls

You own your data. We provide the tools and transparency to exercise your rights.

Data Export

Export all your data at any time in standard formats (JSON, CSV). Full data portability with no vendor lock-in. Exports include all metrics, configurations, and historical data.

Right to Deletion

Request complete deletion of your account and all associated data. We process deletion requests within 30 days and provide a deletion certificate for your records.

Access Your Data

Request a complete copy of all personal data we hold about you. Includes account information, usage logs, and any automated decisions made about your account.

Rectification

Correct any inaccurate personal data we hold. Update your profile directly in the dashboard or contact us for corrections to data you cannot modify yourself.

Opt-Out Controls

Control marketing communications, analytics, and optional data collection. Manage your preferences directly from your account settings or unsubscribe from any email.

Data Residency

Choose your data region at signup β€” EU, US, or Asia-Pacific. Data residency is available on all plans and cannot be changed after your organisation is created.

Data Collection Transparency

Complete transparency about what data we collect and why. No hidden data collection.

Data Type Purpose Collection Retention Shared With
Server Metrics
CPU, memory, disk, network
Core monitoring functionality Required Based on plan (7-365 days) Not shared externally
Network Connections
IP addresses, ports, protocols
Topology mapping & troubleshooting Required Based on plan (7-365 days) Not shared externally
Process Information
Process names, PIDs, resource usage
Application performance monitoring Required Based on plan (7-365 days) Not shared externally
Account Information
Email, name, company
Account management & communication Required Account lifetime + 30 days Payment processor (billing only)
Usage Analytics
Feature usage, page views, cookies
Product improvement & user experience Optional 26 months (Google Analytics) Google Analytics
Application Payloads
HTTP bodies, SQL queries
Not collected Never Collected N/A N/A
Passwords/Credentials
User passwords, API secrets
Not collected from agents Never Collected N/A N/A
File Contents
Document contents, source code
Not collected Never Collected N/A N/A

Data Retention Policies

Clear retention periods with automatic deletion. You can request earlier deletion at any time.

Plan Metrics Retention Logs Retention Alert History Audit Logs
Solo ($5/mo) 7 days 3 days 30 days 30 days
Pro 30 days 14 days 90 days 1 year
Enterprise Custom (up to 2 years) Custom (up to 1 year) Custom (up to 2 years) Custom (up to 7 years)
Data Collection
Encrypted in transit (TLS 1.3)
Active Storage
Encrypted at rest (AES-256)
Retention Period
Based on your plan tier
Secure Deletion
Cryptographic erasure

Sub-processors & Third Parties

Complete list of third parties who may process your data on our behalf. All sub-processors are bound by strict data protection agreements.

Amazon Web Services (AWS)

Infrastructure hosting, data storage, and compute services

πŸ‡ΊπŸ‡Έ πŸ‡ͺπŸ‡Ί πŸ‡¦πŸ‡Ί
Multi-region

Stripe

Payment processing and billing management

πŸ‡ΊπŸ‡Έ
United States

Brevo

Transactional email delivery (alerts, notifications) and customer support chat

πŸ‡«πŸ‡·
France (EU)

Google Analytics

Website analytics and usage tracking

πŸ‡ΊπŸ‡Έ
United States

Last updated: January 2026. We notify customers 30 days before adding new sub-processors.

Security Standards & Compliance

We align our security controls with SOC 2 and ISO 27001 frameworks, and host on certified infrastructure to ensure your data is protected at every layer.

SOC 2 & ISO 27001 Aligned

OnePAM's security controls, policies, and procedures are built to meet SOC 2 and ISO 27001 standards. We follow these frameworks as our security baseline to ensure enterprise-grade data protection by design.

Certified Hosting Partners

Our hosting providers are independently certified ISO 27001:2022 and BSI C5. Their certifications ensure that the data centers housing your data meet rigorous international standards for information security management and cloud security.

GDPR Compliant

We fully comply with the EU General Data Protection Regulation. We provide data processing agreements, support data subject rights, and maintain transparent data practices for all European customers.

CCPA Ready

We support California Consumer Privacy Act requirements, including the right to know, delete, and opt-out. Our privacy controls help you meet your CCPA obligations for California residents.

HIPAA Eligible

Enterprise customers can sign a Business Associate Agreement (BAA) for HIPAA compliance. We implement appropriate safeguards for protected health information (PHI) in healthcare environments.

DPA Available

We provide comprehensive Data Processing Agreements that outline our responsibilities as a data processor. Standard contractual clauses are available for international data transfers.

Security Controls

Comprehensive technical and organizational measures to protect your data.

Infrastructure Security

  • Multi-layered firewall protection with intrusion detection and prevention systems (IDS/IPS)
  • DDoS protection with automatic traffic scrubbing and rate limiting
  • Network segmentation isolating production, staging, and development environments
  • Regular vulnerability scanning and continuous automated security monitoring

Access Control

  • Role-based access control (RBAC) with principle of least privilege
  • Multi-factor authentication required for all employee and admin access
  • SSO integration with Google (all plans), SAML/OIDC with any IDP (Pro/Enterprise)
  • Domain-based user provisioning with DNS verification (Pro/Enterprise)
  • Comprehensive audit logging of all access and administrative actions

Data Protection

  • AES-256 encryption for data at rest with customer-managed key options
  • TLS 1.3 encryption for all data in transit with perfect forward secrecy
  • Automated daily backups with geo-redundant storage and tested recovery procedures
  • Data isolation between tenants with logical and physical separation

Organizational Security

  • Background checks for all employees with access to customer data
  • Annual security awareness training and phishing simulations
  • Documented security policies reviewed and updated quarterly
  • Vendor security assessments for all third-party integrations

Gateway & Secrets Security

Full control over how access flows through your infrastructure and where secrets are stored.

Customer-Managed Gateways

  • Deploy in your infrastructure β€” Install a OnePAM gateway directly within your network perimeter. The gateway handles all access protocols (SSH, RDP, VNC, database, web apps) without exposing internal resources to the internet.
  • Restrict access to your gateway only β€” Business and Enterprise customers can enforce that all access to their resources must flow exclusively through their own customer-managed gateway. No traffic routes through OnePAM-hosted infrastructure.
  • Managed by default β€” By default, gateways are managed by OnePAM with automatic failover. Customers who require full control can self-host and manage their own gateway instances.
  • mTLS agent communication β€” All communication between agents and gateways uses mutual TLS (mTLS) with certificate pinning, ensuring no man-in-the-middle interception is possible.

Secret Isolation

  • Gateway-side secret resolution β€” Credentials, SSH keys, and database passwords are resolved and used within the gateway. No secrets are transmitted to or stored on the OnePAM control plane.
  • Local encrypted secret storage (Business+) β€” Business and Enterprise customers can store secrets locally within an AES-256 encrypted database on the agent. Secrets are encrypted at rest and inaccessible to the OnePAM control plane.
  • Zero-knowledge architecture β€” OnePAM has no ability to read, decrypt, or access customer secrets stored in local vaults. Encryption keys are derived locally and never transmitted.
  • Vault integration support β€” Enterprise customers can integrate with external secret managers (HashiCorp Vault, AWS Secrets Manager) for centralized secret lifecycle management while maintaining gateway-side resolution.
Security Capability Solo & Team Business Enterprise
Customer-managed gateway
Install gateway in your infrastructure
OnePAM-managed gateway
Fully managed by OnePAM
Gateway restriction
Restrict to your own gateways only
Gateway-side secret resolution
Credentials resolved within your infrastructure
Local encrypted secret storage
AES-256 encrypted local vault on agent
External vault integration
HashiCorp Vault, AWS Secrets Manager

Global Data Centers

Your data is hosted in world-class facilities with enterprise-grade security.

πŸ‡ΊπŸ‡Έ

US East

Virginia, USA

ISO 27001:2022
πŸ‡ΊπŸ‡Έ

US West

Oregon, USA

ISO 27001:2022
πŸ‡ͺπŸ‡Ί

EU Central

Frankfurt, Germany

ISO 27001:2022 BSI C5
πŸ‡¦πŸ‡Ί

Asia Pacific

Sydney, Australia

ISO 27001:2022

Incident Response

Our rapid response process ensures minimal impact from security incidents.

Within 15 minutes

Detection & Alerting

Our monitoring systems detect anomalies and automatically alert the security team. Initial triage begins immediately to assess severity and scope.

Within 1 hour

Containment

The incident response team implements containment measures to prevent further impact. Affected systems are isolated while maintaining service availability where possible.

Within 24 hours

Customer Notification

For incidents affecting customer data, we provide transparent communication within 24 hours. Status updates are posted to our status page and sent directly to affected customers.

Within 72 hours

Root Cause Analysis

A comprehensive post-incident review identifies root causes and lessons learned. We implement preventive measures and share relevant findings with customers.

Frequently Asked Questions

Common questions about our security practices and data handling.

Can I restrict access to flow only through my own gateway?

Yes. Business and Enterprise customers can install a OnePAM gateway within their own infrastructure and enforce that all access to their resources flows exclusively through that gateway. This means no traffic routes through OnePAM-hosted infrastructure. By default, gateways are managed by OnePAM, but you have full control to restrict access to your own gateway instances only.

Where are my secrets stored? Can OnePAM access them?

Secrets (credentials, SSH keys, database passwords) are never accessed outside of the gateway. They are resolved and used exclusively within the gateway at connection time. Business and Enterprise customers can go further by storing secrets locally within an AES-256 encrypted database on the agent itself β€” no component outside the agent can access these secrets, not even OnePAM. Encryption keys are derived locally and never transmitted. OnePAM operates on a zero-knowledge architecture for customer secrets.

How is my data protected at rest?

All data at rest is encrypted using AES-256 encryption. Encryption keys are managed through AWS KMS (or equivalent) with automatic key rotation. Enterprise customers can use their own customer-managed keys (CMK) for additional control.

Can I choose where my data is stored?

EU is the default data region for all plans. US and Australia regions are available for Business and Enterprise plans. Solo and Team plans use EU data residency only. Enterprise customers with Private Cloud deployment can request dedicated, isolated infrastructure.

How long does it take to process a data deletion request?

Data deletion requests are processed within 30 days. Upon request, we delete all customer data from production systems and backups. A deletion certificate can be provided upon request for compliance documentation purposes.

Does OnePAM sell my data to third parties?

Absolutely not. We never sell, rent, or trade your data to third parties. Your data is only used to provide our monitoring services. We only share data with sub-processors necessary to operate our service (listed above), and never for advertising or marketing purposes.

What happens to my data if I cancel my account?

When you cancel your account, we retain your data for 30 days in case you change your mind. After 30 days, all data is permanently deleted using cryptographic erasure. You can request immediate deletion at any time. Before cancellation, you can export all your data using our data export feature.

How can I report a security vulnerability?

We welcome responsible disclosure from security researchers. Please report vulnerabilities to [email protected]. We respond to all reports within 24 hours and work with researchers to address issues promptly. We do not pursue legal action against researchers who act in good faith.

What is your uptime SLA?

We maintain a 99.9% uptime SLA for all paid plans, with 99.99% available for Enterprise customers. Our infrastructure is designed with automatic failover, redundant components, and multi-region disaster recovery capabilities.

Have Security or Privacy Questions?

Our security and privacy teams are available to discuss your specific requirements, provide compliance documentation, or answer any questions about how we protect your data.