Welcome to Celigo's Trust Center. As a Gartner Magic Quadrant™ recognized Integration Platform as a Service (iPaaS) provider operating globally, we take a proactive, risk-based approach to protecting your data and ensuring operational resilience.
Our commitment to data privacy and security is embedded in every part of our business. Use this Celigo Trust Center to learn about our security controls, regulatory compliance, internal governance, and request access to our security documentation.
Documents
Subprocessors
Subprocessors
- Has Celigo implemented a Data Subject Access Rights Procedure?
- Does the solution support configuring audit log on the application level - whenever personal data is access or changed together with unique identification of user/employee that has perform the action.
- How does Celigo securely delete customer data?
- How does Celigo manage cryptographic keys and protect customer data at rest and in transit?
- How does Celigo manage and review firewall and network security rules?
2025 SOC 2 Type 2 Report Now Available
We’re excited to share that our 2025 SOC 2 Type 2 Report for the Celigo Platform is now available in the Celigo Trust Center.
The report is accessible to authorized users under NDA.
👉 Visit https://trust.celigo.com/
to request access, view, or download the report.

