Committed to security and compliance
Information Security Program
Security is fundamental to how Cognism operates - across our product, our data, and our customers.
Cognism maintains a comprehensive information security program aligned with ISO 27001 and SOC 2 frameworks, supported by dedicated security and compliance teams.
Data security and protection
Our security controls are designed to meet recognised industry standards and support enterprise requirements.
Cognism has dedicated security and compliance teams. Incident management is owned and operated by our security team.
-
Encryption:
Data is encrypted in transit and at rest. HTTPS is enforced using TLS 1.2 and TLS 1.3. Data at rest is protected using AES-256. AWS Key Management Service is used to manage encryption keys.
-
Segmentation:
Customer data is logically segregated across Cognism products.
-
Backup and Recovery:
Backups are automated, with recovery procedures tested quarterly. Recovery point and recovery time objectives are set to 24 hours.
-
Retention and Deletion:
Customer data is retained only as long as necessary and deleted following contract termination.
Cognism follows a structured Software Development Life Cycle (SDLC) with security integrated throughout.
- Secure Development:
Code coverage, security testing, code quality, dependency tracking, and SAST.
- Secure Build:
Automated build processes with dependency tracking.
- Secure Deploy:
Controlled change management with multiple approvers.
- Secure Runtime:
Infrastructure monitoring, alerting, reporting, and use of IDS and IPS tooling.
Cognism maintains separate environments for testing, staging, and production.
Access is granted based on least privilege and need-to-know principles.
-
Background Checks:
Background checks are conducted prior to employment, in line with local laws and regulations.
-
Workforce Training:
All employees complete security training during onboarding, with annual refresher training.
Role-specific technical training is provided where required.
-
Penetration testing:
Independent third-party penetration testing is conducted at least annually across products and infrastructure.
Cognism maintains infrastructure and processes to support service availability and resilience:
- Public status page for system transparency
- AWS-hosted infrastructure
- Cloudflare DDoS protection and WAF
- Industry-standard disaster recovery and business continuity practices
Cognism maintains cyber security insurance covering data, crisis containment, property, and liability.
Privacy Policy
Your data remains yours.
Details on data collection, usage, and opt-out are available below:
Certifications, Regulations and Standards
Cognism holds the following certifications and attestations:
- ISO 27001
- ISO 27701
- SOC 2 Type II (Security and Availability)

%20(1).png?width=1000&height=1000&name=ISO-TMP-07-20250909-v2.0-27701-2019%20(1)%20(1).png)


Cognism proves its ongoing commitment to data privacy and compliance with new ISO 27701 certification.
Enterprise-grade compliance and security
Built for organisations operating in regulated markets, with compliance-first data practices and independently audited controls.
Fully aligned with EU data protection regulations and privacy-first data handling.
Compliant with US state-level privacy laws including California regulations.
Automatic suppression against global Do-Not-Call and TPS lists.
Certified information security and privacy management frameworks.
Independently audited controls for data security and operational integrity.