Welcome to Celigo's Trust Center. As a Gartner Magic Quadrant™ recognized Integration Platform as a Service (iPaaS) provider operating globally, we take a proactive, risk-based approach to protecting your data and ensuring operational resilience.
Our commitment to data privacy and security is embedded in every part of our business. Use this Celigo Trust Center to learn about our security controls, regulatory compliance, internal governance, and request access to our security documentation.
Documents
Subprocessors
Subprocessors
- How does Celigo securely delete customer data?
- How does Celigo manage cryptographic keys and protect customer data at rest and in transit?
- How does Celigo manage and review firewall and network security rules?
- Describe the process to monitor hardware and software for vendor supported versions and EOL.
- How does Celigo implement Data Loss Prevention (DLP) controls?
2025 SOC 2 Type 2 Report Now Available
We’re excited to share that our 2025 SOC 2 Type 2 Report for the Celigo Platform is now available in the Celigo Trust Center.
The report is accessible to authorized users under NDA.
👉 Visit https://trust.celigo.com/
to request access, view, or download the report.

