Security that Surpasses Traditional Platforms

StarfishETL is an iPaaS (integration Platform as a Service). Unlike traditional integration platforms, an iPaaS is managed by the cloud provider. The provider keeps security protocols current via timely maintenance and updates. They can also enable advanced security controls like data encryption, threat detection, and access controls while offering more compliance certifications than a traditional platform. StarfishETL security features meet regulatory requirements, help avoid threats, and ensure compliance. Read on for additional information.

GDPR Compliance

GDPR is a data protection and privacy regulation that governs how the personal data of individuals in the EU and EEA is processed. StarfishETL is GDPR compliant, allowing customers to easily request their personal data related to StarfishETL processes.

Learn More About StarfishETL GDPR
gdpr transparent background

SOC2 Compliance

Organizations that adhere to SOC2 compliance implement policies and procedures that ensure the security, availability, processing integrity, confidentiality, and privacy of customer data. StarfishETL is in the process of undergoing a third-party audit to assess its adherence to SOC2 principles and streamline data management and security to meet these thresholds.

soc2 compliance

StarfishETL's Additional Safeguards

Threat Detection

StarfishETL hosts its servers on AWS, which continuously monitors to identify threats within the cloud environment. StarfishETL’s Cartographer Operations team also monitors activities using documented procedures.

Access Controls

Access control methods ensure only authorized users can access sensitive data. StarfishETL provides multi-factor authentication and role-based access control.


StarfishETL does not store any data. The platform uses industry-standard SSL encryption algorithms and secure AES 224-bit encryption to protect data at rest and in-transit. Passwords and maps are stored in an encrypted database.

Safe Local Connections

The StarfishETL Ray tool allows clients with on-premises or in-house solutions to access data without disabling their firewall protections, thereby eliminating the risk of exposing data during a project.

Infrastructure Protection

StarfishETL iPaaS servers are hosted on AWS in the Eastern US. AWS data centers and networks are architected to protect information, identities, applications, and devices. The StarfishETL Cartographer Operations team follows documented procedures when accessing these servers to ensure secure access.

Audit Trails

StarfishETL maintains an audit trail of all data activities to identify risks and mitigate security concerns. These activities include information about who accessed data, when data was accessed, and the changes that were made.


StarfishETL uses checksums to prevent man-in-the-middle attacks. Checksums are used to verify that data hasn't been altered or corrupted by comparing the generated checksum with the original one.

Your Role in Data Security

Whitelist StarfishETL's iPaaS
Train Employees on security best practices
Perform regular data backups
Perform regular data audits
Limit your access controls
Implement a disaster recovery plan