Loading

Trust us to protect and secure your data

The world's largest organizations trust us to protect and secure their data. With our built-in AI-powered threat detection, Zero Trust principles, and integrations with leading security partners, you can trust us with your data too.

Trust Center

Our AI-powered data security platform helps you strengthen your cyber resilience and unlock insights from your data.

Cohesity maintains rigorous product security standards and inspects adoption across every phase of its product lifecycle. Cohesity follows industry best practices and through these security practices as well as the inclusion of security features and functionality, Cohesity delivers secure, highly functional products and services to its customers.

Secure By Design

Cohesity follows fundamental security principles including but not limited to: secure by default, secure failure, and secure implementations of cryptographic algorithms. To ensure the targeted security posture, compliance, and certification of its products as new features are developed, Cohesity aligns the product design with current security best practices.

Secure Development

Development teams at Cohesity engage with a dedicated Product Security team during the design and planning stages of the development lifecycle. Cohesity's Product Security team makes recommendations for the adoption of secure design patterns, performs threat modeling, defines applicable security standards, and sets security requirements.

Expand All

Threat Modeling

Cohesity has adopted the STRIDE framework in its design practices to meet security objectives in design and reduce risk, including the identification of threats, attacks, vulnerabilities, and countermeasures that could affect an application or system. Cohesity regularly updates the product threat model based on new features and changes in threats.

Identifying and Setting Security Requirements

Cohesity’s Product Security, Information Security, and product management teams define applicable security standards and mandate security requirements across Cohesity’s entire product and service portfolio.

Security Assurance

Cohesity’s platform and infrastructure are regularly subjected to security testing and hardening to enhance security. The OS and components are specifically configured to meet security hardening requirements including Center for Internet Security (CIS) benchmarks and US Department of Defense Security Technical Implementation Guide (STIG) configuration standards.

Expand All

Static Application Security Testing

Cohesity conducts static and binary source code analysis to ensure security hygiene in the application.

Dynamic Application Security Testing

Dynamic application security testing scanners are integrated into the Cohesity development pipeline to scan all significant development branches. Any vulnerabilities found are mitigated per the vulnerability management policy.

Open Source Software Security Scanning

Cohesity performs regular scanning of Cohesity-developed and third-party code and binaries in its repositories to identify usage of open source software (OSS). Both identified security vulnerabilities as well as incorrect usage of OSS are remediated as per Cohesity’s policies.

Penetration Testing

Cohesity conducts internal penetration testing continuously using various automated techniques integrated into the release cycle. Cohesity also conducts regular external third-party penetration testing. Vulnerabilities found in penetration testing are mitigated per Cohesity’s vulnerability management policy.

Cohesity REDLab

Cohesity rigorously validates the real-world resilience of our products using live malware, advanced exploits, and modern attack techniques in an air-gapped environment designed to allow threat testing while protecting Cohesity infrastructure. Learn more about Cohesity REDLab.

Vulnerability Management

Cohesity performs regular vulnerability assessments across its products and internal operations environments. Vulnerability discovery is conducted regularly and results are fed back into the development and deployment to remediate risks. Cohesity remediates vulnerabilities per its vulnerability management policy.

Software Supply Chain Validation

All third-party components integrated into the Cohesity code base, including (but not limited to) open source and commercially licensed packages, source code, binaries, libraries, as well as OEM firmware, are tested regularly for vulnerabilities and other security risks. Risk mitigation practices and third-party vulnerability patching follows Cohesity’s vulnerability management policy.

Engineering infrastructure tools are kept up-to-date with security protections configured. Security checks and options for the compilers and linkers are enforced.

App Ecosystem and Marketplace Security

Cohesity employs multiple controls and practices to ensure the integrity of customer data and the security of apps within the Cohesity Marketplace. These controls include:

  • Prior to onboarding, all developers and ISVs seeking to develop apps for the Cohesity Marketplace first pass vetting by Cohesity.
  • Cohesity qualifies all apps before they’re published to the Cohesity Marketplace, including design and vulnerability scanning.
  • All Marketplace apps intended for use on the Cohesity platform are digitally signed by Cohesity. The Cohesity platform will not execute unsigned or improperly signed apps. Cohesity does not distribute digitally signed Marketplace apps through channels other than its Marketplace.
  • Use of apps on the Cohesity platform is disabled by default. Explicit opt-in is required.
  • Apps always execute with multiple degrees of isolation at the network, storage, and microservices levels on the Cohesity platform.
  • Different apps running on the Cohesity platform cannot communicate or interact with each other by default.
  • Apps execute within the role-based access control framework on the Cohesity platform.
Security Standards and Programs

Cohesity aligns to industry-standard frameworks for vulnerability management, secure product development lifecycle management, and incident response.

Expand All

Common Vulnerability Scoring System and Common Vulnerabilities and Exposures

Cohesity rates and prioritizes confirmed vulnerabilities using Common Vulnerability Scoring System (CVSS) version 3. Cohesity will assign a Common Vulnerabilities and Exposures (CVE) identifier to confirmed security vulnerabilities.

Multi-practice Secure Product Development Lifecycle

Cohesity follows a secure product development lifecycle to deliver and maintain security throughout each product’s lifecycle. Cohesity follows the following six practices:

  • Security Training
  • Security in Design
  • Threat Model
  • Vulnerability Management
  • Secure Software Release
  • Product Security Response

Security Incident Response Services Framework

Cohesity implements a security incident response program designed to quickly and effectively detect, respond to, and recover from security incidents and events. Security events are reported to the Information Security office where issues are tracked and monitored until resolved. On-call response teams manage security and availability events through regularly tested response playbooks and procedures.

Product Incident Response

Cohesity employs a product incident response plan that supports analysis, mitigation, and remediation of vulnerabilities in its products. The plan also covers responsible disclosure from third-party researchers and customers.

Security Training

Cohesity provides its developers, architects, development managers, release managers, QA engineers, and product managers with security training and resources to incorporate security practices throughout the product development lifecycle. Cohesity conducts quarterly secure coding training covering security best practices in product development that is mandatory for all engineers.

Responsible Disclosure Standards

Cohesity follows industry best practices to discover, investigate, and address vulnerabilities through the product lifecycle using a risk-based approach. Cohesity's dedicated Product Security team promptly investigates and responds to all reports of potential security vulnerabilities, and Cohesity's product incident response plan supports analysis, mitigation, and remediation of vulnerabilities in its products. The plan also covers responsible disclosure processes when issues are reported by third-party researchers, customers, or partners.

Expand All

Rating and Prioritizing Confirmed Vulnerabilities

Cohesity rates and prioritizes confirmed vulnerabilities using Common Vulnerability Scoring System (CVSS) version 3 and maintains a response SLAs for each severity class.

Resolving Security Vulnerabilities

Cohesity’s remediation of identified vulnerabilities are resolved on a timeframe based on their criticality and impact (as per Cohesity’s vulnerability management policy).

Identifying Confirmed Vulnerabilities

Cohesity will assign a Common Vulnerabilities and Exposures (CVE) identifier to confirmed security vulnerabilities.

Resolving Vulnerabilities in Supported Product Versions

Vulnerabilities identified in all supported product versions will be resolved as per Cohesity’s vulnerability management policy.

Cumulative Vulnerability Fixes

At a minimum, major, minor, and long-term support (LTS) releases of Cohesity products will incorporate cumulative vulnerability fixes from previous releases.

Expedited Maintenance Releases for Critical, High-Impact Vulnerabilities

Cohesity may periodically expedite maintenance releases or patches of supported versions of its products faster than the established SLA in Cohesity’s vulnerability management policy for critical risk, high-impact vulnerabilities.

Notifying Customers of Vulnerabilities

Cohesity will proactively inform customers of vulnerabilities via Support Portal alerts, emails, and/or Field Notices. Knowledgebase articles are published to document the impact of specific vulnerabilities and outline any required actions.

Reporting Issues

Customers, partners, and third-party researchers may report vulnerabilities in Cohesity products and services by contacting Cohesity Security.

Cohesity maintains rigorous security, privacy, and resiliency standards for its Cohesity-managed cloud services and software as a service (SaaS) offerings. Learn about the key practices that Cohesity follows to keep the Helios platform, services, and customer data secure and available at all times.

Helios Administration

Customers may administer the cloud-based Helios platform that provides centralized management and analytics for customers’ self-managed products and services (Helios management service).

Depending on the Cohesity product or service deployed, usage of the Helios management service will be either mandatory or optional for the customer.

Expand All

Management Service

The Helios management service, operated by Cohesity, provides customers with centralized management and analytics of their self-managed Cohesity products and Cohesity-managed data management services. It is not mandatory for customers to register self-managed products with the Helios management service

If customers do opt to register, the customer’s products will communicate with the Helios management service to provide product telemetry necessary to provide service as well as provide cloud-based centralized management and analytics. For more details about the Helios management service, please refer to the Helios SaaS Security Brief found on the Cohesity documentation portal.

Data Management Services

Cohesity-managed data management services are a family of SaaS offerings that allows customers to store, manage, and secure their data in Cohesity’s cloud-based infrastructure. Customers must manage these services through the Helios management service. Cohesity’s data management services are available to customers on a subscription basis.

SaaS Connector

As part of some Cohesity data management services, Cohesity may require customers to deploy the Helios SaaS connector. This SaaS connector is an on-premises VM deployed in the customer data center and establishes a secure channel for connecting on-premises data sources with Cohesity’s data management services.

Security Architecture and Tenant Isolation

The Helios data management environments are logically segregated with the management and data services from one another.

The Cohesity-managed Helios services are natively multitenant, where each tenant is implemented as a unique organization. Organizations are logically segregated and the organization’s resources, such as data, policies, administrators, etc. are restricted to the organization to which they belong.

Dedicated tenant data repositories ensure customer data is isolated from other customers.

Cloud Infrastructure

Cohesity ensures logical security by deploying access control based on Zero Trust principles to prevent unauthorized access or compromise of its cloud infrastructure, including the Helios management service and Cohesity-managed data management services.

Customer Authentication and Access Control

The Helios management service provides customers a broad set of controls to manage user accounts and their assigned access in accordance with strong security standards and their own security policy. In every tenant organization, an admin user manages the other users in that organization. Organization admins can add and manage users through role-based access controls (RBAC). Applying principles of least privilege and separation of duties can be achieved with fine-grained control over standard and custom defined roles. Tenant admins can also integrate the Helios management service with existing identity providers. This enables each organization to apply its specific authentication controls for password policy, multifactor authentication (MFA), and more.

Employee Authentication and Access Control

Cohesity maintains a highly restrictive approach to internal access to Helios management services. Access is based on a strict need-to-know basis related to the job responsibility for managing and maintaining the system. Cohesity adheres to the principles of least privilege and separation of duties, and applies internal access and authorization controls. Before a user can log in to a particular role, they must meet established qualification criteria and obtain documented management approval beforehand in every case. A unique user ID and multifactor authentication are required for all Cohesity users.

Data Isolation

For the Helios management service, each tenant's data and metadata are logically segregated and isolated from that belonging to other tenants. For the Cohesity-managed data management services, unique storage repositories are allocated to each tenant, ensuring that content from one tenant is never shareable with or accessible by other tenants.

Data Resiliency and Availability

The Helios management service maintains an availability rate of 99.9% (three 9s), not inclusive of scheduled or emergency maintenance windows. Helios data management services rely on Amazon Web Services (AWS) S3 service in customer-defined regions spanning across a minimum of three availability zones, each separated by many miles within the same AWS region. The AWS S3 service guarantees 99.999999999% (eleven 9s) of data durability. In the event of a disaster scenario, the Helios management service can recreate data stored in the data management service using just the data stored in S3.

Data Encryption

All customer data—both metadata in the Helios management service and data in the data management services themselves—is encrypted at rest and in flight using strong, industry-standard encryption algorithms, and protocols.

Expand All

In Transit

All customer data flowing to and from the Helios management service and data management services is encrypted in flight to ensure utmost confidentiality as well as prevent authorized disclosure or modification. Cohesity utilizes the TLS 1.2 and mTLS protocols for transport layer security with only FIPS-approved cipher suites with Perfect Forward Secrecy (PFS) protection.

At Rest

All customer data in the Helios management service and data management services is encrypted at rest using AES-256 encryption. All encryption keys are securely stored in an external key management system (KMS). Additionally, customers using a Cohesity-managed data management service have multiple options for securely managing their encryption keys—either relying on Cohesity’s managed Key Management Service (KMS) or managing their own keys via Amazon Web Services KMS.

Infrastructure Attack Defenses

Cohesity has several measures in place to address distributed denial of service (DDOS), intrusions, and malware attacks. These safeguards are built into the monitoring infrastructure that we have implemented to manage the Helios environment. Cohesity uses firewalls to monitor connections constantly and detect anomalies. As anomalies are detected, Cohesity blocks and evaluates the connection into the Helios control plane environment. The servers, containers, and infrastructure within the Helios control plane environment are monitored for vulnerabilities with remediation occurring on a regular basis.

Data Center Security

Cohesity’s Helios management service and data management services are hosted in Amazon Web Services (AWS). For more information about AWS data center security controls, please visit https://aws.amazon.com/compliance/data-center/controls/.

Business Continuity and Disaster Recovery

Cohesity maintains a business continuity plan covering business operations and disaster recovery response. We regularly assess risks to the business and apply appropriate treatment plans to bring risks within acceptable levels. The plan identifies critical business processes, documents threats that could cause business disruption, and addresses recovering connectivity and supporting systems to ensure Cohesity’s obligations to its customers can be met.

Vulnerability Management

Cohesity has a threat and vulnerability management program to continuously monitor for vulnerabilities that are acknowledged by vendors, reported by researchers or discovered internally through vulnerability scans, penetration testing or identification by Cohesity personnel. Threats are ranked based on severity level and assigned for remediation as needed.

Monitoring and Alerting

Helios implements continuous monitoring for both the security and availability of the service.

Monitoring is a function of every service, with key performance indicators and metrics built in from the start. Dashboards and metrics are tracked by the monitoring and response teams. Alerts are designed in the development process. Alerts are reviewed by the cloud operations team and the development teams to ensure that thresholds are set and monitored while deploying to production.

Cohesity's corporate security practices demonstrate our commitment to ensuring the security, safety, and compliance of Cohesity and customer assets. Cohesity takes the security of our customers’ information very seriously and the execution of the controls outlined here demonstrate how we establish trust with our customers, partners, and others.

Information Security Organization

Led by Cohesity's CISO and overseen by the Cohesity Security Council, Cohesity Information Security is a dedicated team of professionals with the mission of ensuring the security, safety, and compliance of Cohesity systems, processes, data, and personnel as well as the assets entrusted to us by our customers.

Information Security Policies

Cohesity's Information Security policy suite covers the organization, its personnel, and information assets. The policies are aligned with industry standards and include domains such as security organization, acceptable use of assets, access controls, and information classification and handling. Policies are reviewed regularly by Cohesity Information Security and updated as appropriate.

Security Awareness Training

Cohesity Information Security is responsible for establishing information security training requirements and ensuring that all personnel complete training and understand their responsibilities. Information security training is built into our new-hire onboarding experience and annual retraining is required. Training is augmented with regular presentations, communications, and learning sessions on particular topics. Where appropriate, business units will receive specialized training for their roles and job responsibilities, such as members of the engineering team receiving regular training covering security principles and secure development practices.

Cyber Risk Management

Cohesity leverages a Cyber Risk Management Program to identify, prioritize, and manage risks to its IT assets, including system infrastructure, networks, endpoints, data, and intellectual property. Through its Cyber Risk Management Program, Cohesity identifies internal and external cyber risks, the likelihood of them occurring, and their potential impact. Cohesity collaborates with risk owners to mitigate and remediate risks, in accordance with Cohesity’s risk appetite.

Vendor Risk Management

Cohesity’s Vendor Risk Management Program reviews and validates the security posture of its third-party vendors prior to onboarding and conducts follow-up assessments in accordance with the established vendor tier. Cohesity manages and monitors vendor security risks through its risk management program in alignment with Cohesity’s security posture, customer commitments, and applicable regulatory requirements.

Threat Intelligence and Vulnerability Management

Cohesity Information Security maintains a Vulnerability Management Program which identifies and partners with control owners to remediate vulnerabilities to help reduce threats to Cohesity’s products and infrastructure. In addition, penetration testing is conducted against applicable Cohesity assets, and remediation is prioritized to optimize Cohesity’s security posture.

Incident Response

Cohesity Information Security maintains an Incident Management Policy with procedures that provide the structure and guidance for our response operations. The incident response procedures of this policy provide the steps to be followed by Cohesity personnel to ensure the quick detection of security events and vulnerabilities as well as to promote rapid response to security incidents, including identifying, assessing, containing, mitigating, and recovering from incidents.

Personnel Security

Upon employment, background checks are conducted. Personnel also receive and acknowledge the company Code of Conduct, policies, and non-disclosure agreements.

Physical Security

Cohesity office locations are physically secured with guards or lobby personnel. Badged access controls are centrally managed and maintained. Access to secured areas requires escalated privileges. Camera systems are in place. All locations have 24x7x365 gated and guarded entry, employ camera and lighting systems, and require badged access for named individuals. Cohesity is SOC 2 certified and can be provided upon request.

Cohesity follows personal data confidentiality guidelines and processes personal data in accordance with applicable data protection laws and regulations. All personal data remains the property of the customer. Information on Cohesity’s security compliance and certifications can be found here. Moreover, our Data Processing Addendum (available at www.cohesity.com/agreements) specifies numerous legal, technical, and organizational protections which apply to our customers where applicable.

Privacy Policy

Our privacy policy is available at www.cohesity.com/agreements.

Processing Locations

Cohesity may process personal data outside of the European Economic Area (EEA). An example of this processing may be the provision of 24/7 support services if the customer chooses to share personal data with Cohesity. The legal mechanisms used to allow for such data transfers are the standard contractual clauses (SCC), as further detailed in Cohesity’s Data Processing Addendum available at www.cohesity.com/agreements.

Support Locations

Cohesity currently has support centers in the USA, Ireland, India, Canada, and Japan.

Cross-border Data Transfer

Cross-border data transfers are addressed in detail in our Data Processing Addendum available at www.cohesity.com/agreements.

Compliance with International Regulations

Cohesity processes personal data in accordance with all applicable data protection laws and regulations, including laws and regulations of the European Union (GDPR), the European Economic Area and their member states, Switzerland and the United Kingdom, the California Consumer Privacy Act (CCPA), and the Personal Information Protection and Electronic Documents Act (Canada) in each case as and to the extent applicable to Cohesity as a matter of law with respect to the processing of personal data. More information may be found in our Data Processing Addendum available at www.cohesity.com/agreements.

Expand All

GDPR

Under applicable data protection laws and regulations, such as the GDPR, when a customer uses Cohesity’s products and services and shares personal data with Cohesity, the customer is generally considered the data controller and appoints Cohesity to act as a data processor.

CCPA

California Consumer Privacy Act (CCPA) compliance is addressed in detail in our Data Processing Addendum available at www.cohesity.com/agreements.

Data Processing Agreement

Cohesity’s Data Processing Addendum is available at www.cohesity.com/agreements. It applies automatically to all customers using Helios SaaS and is incorporated into Cohesity’s Helios SaaS Terms of Service (also available at www.cohesity.com/agreements). If a customer believes that the Data Processing Addendum should apply to other activities, please contact Cohesity Legal.

Cohesity maintains a comprehensive security certification program designed to protect our customers’ data confidentiality, integrity, and availability in accordance with industry, US government, and international standards. Cohesity's products and services have also been certified by independent third-party auditors to meet various security standards. Access Cohesity’s Security & Due Diligence Center here.

SOC 2 Type II Report

The Cohesity Helios SaaS platform undergoes annual Service Organization Controls 2 (SOC 2) Type II audits to evaluate its information security system controls as they relate to the security, availability, and confidentiality of the Trust Services Criteria.

ISO27001

The information security management system (ISMS) supporting the Cohesity cloud services is ISO/IEC 27001:2022 certified.

HIPAA

Cohesity's products and services adhere to the security benchmarks and requirements that are aligned with Health Insurance Portability and Accountability Act (HIPAA) guidelines.

Trade Agreements Act Compliance

Cohesity complies with the Trade Agreements Act (TAA) and hardware ships from San Jose, California. Cohesity white label systems are manufactured and assembled in designated countries that are TAA-compliant.

National Defense Authorization Act of 2019

Cohesity complies with Section 889 of the National Defense Authorization Act of 2019.

US Department of Defense Information Network Approved Products List

The Cohesity platform has been certified by the Defense Information Systems Agency (DISA), an agency within the US Department of Defense (DoD), for inclusion on the DoD Information Network (DoDIN) Approved Products List (APL). The DoDIN APL is a single, consolidated list of products that have met stringent cybersecurity and interoperation certification requirements for deployment on DoD networks.

FedRAMP

FedRAMP is a government-wide program that promotes the adoption of secure cloud services across the federal government by providing a standardized approach to security and risk assessment for cloud technologies and federal agencies.

Cohesity is FedRAMP Moderate Authorized.

GovRAMP

GovRAMP is a registered 501(c)(6) nonprofit membership organization comprised of service providers offering IaaS, PaaS, and/or SaaS solutions, third-party assessment organizations, and government officials. Founded in 2020, StateRAMP (dba GovRAMP) was born from the clear need for a standardized approach to the cybersecurity standards required from service providers offering solutions to state and local governments.

Cohesity is GovRAMP Authorized.

Authorization to Operate

Cohesity maintains ATOs for its products to operate within highly classified US Department of Defense (DoD) agency networks, US Department of Energy (DoE) networks, and US intelligence community networks. Security Technical Information Guides (STIG) are available for Cohesity products for deployment on DoD Top Secret networks.

Common Criteria EAL2+

The Cohesity platform is Common Criteria certified at EAL2+ ALC_FLR.1. Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria) is an international standard (ISO/IEC 15408) for computer security certification.

More details can be found here.

NIST FIPS 140-2 Cryptographic Module Validation

The cryptographic module employed within Cohesity's products has been validated by the United States National Institute of Standards and Technology (NIST) at the Federal Information Processing Standards (FIPS) 140-2 Level 1 standard. FIPS 140-2 is a US government standard for cryptographic modules providing assurances that the module design and implementation of cryptographic algorithms are secure and correct.

More details can be found here.

IPv6

The Cohesity platform has been certified by the University of New Hampshire-InterOperability Lab (UNH-IOL) as USGv6 compliant as part of the USGv6 test program.

More details can be found at https://www.iol.unh.edu/registry/usgv6-2008?name=cohesity.

SEC 17a‐4(f), FINRA Rule 4511(c), and CFTC Regulation 1.31(c)-(d)

The Cohesity platform has in-built support for write-once, read-many (WORM) functionality. Its WORM implementation has been assessed as compliant with SEC 17a‐4(f), FINRA Rule 4511(c), and CFTC Regulation 1.31(c)-(d) rules by Cohasset Associates.

More details can be found here.

The following resources provide Cohesity customers and partners with more details about Cohesity's security and privacy practices across its products and services.

Data Protection Addendum

Cohesity offers a Data Processing Addendum (DPA) for customer GDPR or CCPA compliance needs.

Subprocessor List

Cohesity may use third-parties as (sub)processors of personal data in order to provide our services.

Products and Services Documentation

The Cohesity documentation portal may be accessed from MyCohesity.

Helios SaaS Security Brief

The Helios SaaS Security Brief may be found on the Cohesity documentation portal.

DataPlatform Security Whitepaper

The DataPlatform Security white paper may be found on the Cohesity documentation portal.

DataPlatform Security Hardening Guide

The DataPlatform Security Hardening Guide may be found on the Cohesity documentation portal.

Cohesity Ransomware Protection – Prepare and Recover

The Cohesity Ransomware Protection – Prepare and Recover white paper may be found on the Cohesity documentation portal.

Loading