Trust Center

Enterprise-Grade Cloud Security

World-Class Security from Day One. Cube is SOC 2 Type I and Type II compliant.

Show Navigation
Overview
Overview
👤
Login
  • Compliance

    Last updated Sat, Dec 4, 2021
    • SOC 2
    • SOC 2 Type I
    • SOC 2 Type II

      Cube Planning, Inc. has successfully completed SOC 2 Type 1 & 2 examinations by Dansa D'Arata Soucia.

      Cube's security reports are available on request.

  • Product Security

    Last updated Thu, Jan 13, 2022
    • Audit Logs
    • Multi-Factor Authentication

      Text or app-based authentication can be used.

    • Role-Based Access Control (RBAC)

      Cube supports various permission levels for users. User access can also be restricted on a per dimension basis.

    • SSO

      Google and Okta SSO are currently supported.

    • Google SSO
    • SAML SSO
    • Self-Serve User Management

      Users within Cube are able to add and remove team members as needed at any time.

  • Data Security

    Last updated Fri, Jun 4, 2021
    • Data Encrypted At-Rest

      Cube's database instances use the industry standard AES-256 encryption algorithm to encrypt your data.

    • Data Encrypted In-Transit
    • Passwords Encrypted
  • Privacy

    Last updated Wed, Feb 24, 2021
  • Incident Management & Response

    Last updated Sat, Dec 4, 2021
    • Incident Response Plan (IRP)
  • Availability & Reliability

    Last updated Thu, Jan 13, 2022
  • Organizational Security

    Last updated Sat, Dec 4, 2021
    • Confidentiality Agreements
    • Employee Background Checks
    • Employee Security Training

      All Cube employees undergo security training when first hired at Cube as well as on an annual basis.

    • Employee Workstations Automatically Locked
    • Employee Workstations Encrypted
    • Limited Employee Access (Principle of Least Privilege)
    • Personnel Screening
    • Secure Remote Network Access
  • Business Continuity

    Last updated Sat, Dec 4, 2021
  • Infrastructure

    Last updated Thu, Jan 13, 2022
  • Threat Management

    Last updated Sat, Dec 4, 2021
    • Penetration Testing
    • Vulnerability Scanning
  • Subprocessors

    Last updated Sat, Nov 13, 2021
    • Name
      Purpose
      Location
      Amazon Web Services
      Hosting and infrastructure
      United States
      Canny
      Product feedback
      United States
      Datadog
      Error logging and analytics
      United States
      Flatfile
      Processing CSV uploads
      United States
      Hotjar
      User experience improvements
      Jira
      Ticket management
      Australia, United States
      Mixpanel
      Analytics
      United States
      Sentry
      Error monitoring
      United States
      Slack
      Error logging and internal chat functionality
      United States
      Tableau
      Analytics
      Twilio
      2FA functionality
      United States