profile_image
Complete EDI Solutions Public Trust Center
The trusted orchestration layer for AI AgentsTrusted byZero Trust by Default

Our architecture is built on Zero Trust principles and defense-in-depth strategies, with protections at every layer. Every workflow and agent action is authenticated, authorized, and auditable to keep your operations running without interruption.

Explore our security posture below.

SOC 1
SOC 2
SOC 3
PCI
NIST
IRAP
HIPAA
DORA
GDPR
NIS 2
CCPA
VAPT
ISO 27001
ISO 27701
ISO 42001
AI & Agentic Security
Agentic Platform - Agent Studio & Genies
Enterprise Model Context Protocol (MCP)
AI-Powered Development Assistants
Compliance & Governance
Auditing, Testing & Certification
Supply Chain Security
API Security & Governance
Data Protection
Data Storage & Retention
Data Encryption & Key Management
Privacy Compliance
Privacy & Legal
Privacy Policy
Subprocessors
Data Processing Addendum
Cookies
Infrastructure and Operations
Infrastructure & Hosting
High Availability & Disaster Recovery
Continuous Security Monitoring & Threat Detection
Platform Security
Authentication & Access Control
Network Security & Zero Trust
On-premise Connectivity
Documents
Bulk Download

All Documents

Documents

Advisories

Attestations

Certificates

General

Security

All Documents

Sort:

Advisory 2026: Aqua Security's Trivy Supply Chain Attack.pdf

Updated 2026-04-01

Advisory 2026: Axios NPM Distribution Supply Chain Attack.pdf

Updated 2026-04-01

Advisory 2026: Checkmarx KICS Impacted by Supply Chain Compromise.pdf

Updated 2026-04-24

Advisory 2026: litellm Supply Chain Attack.pdf

Updated 2026-04-01

Advisory 2026: OX Security MCP Protocol Vulnerability Disclosure – STDIO Remote Code Execution .pdf

Updated 2026-04-30

Advisory 2026: Telnyx PyPI Distribution Supply Chain Attack.pdf

Updated 2026-04-01

Advisory 2026: Vercel Security Incident Following Compromise of Context.ai.pdf

Updated 2026-04-28

Workato 2025 ISO 27701:2019 Certificate.pdf

Updated 2025-11-24

Workato 2025 VPAT- WCAG .pdf

Updated 2025-11-24

Workato 2025 SOC 1 Type 2 Report.pdf

Updated 2026-02-13

1-10 of 27

Our Subprocessors

Filter by:

processor
usage
location
processor-logo
Amazon Web Services Inc.
Cloud infrastructure
https://aws.amazon.com/
United States, Germany, Singapore, Japan, or Australia (at customer's option)
processor-logo
Intercom Inc.
United States
processor-logo
Stripe Inc.
Payment processing (only for payment made by credit card)
https://stripe.com/
United States
processor-logo
MessageBird USA Inc. d/b/a SparkPost
Provision of email services to customers. Only applicable for customers using “Email by Workato”. The processing for Workato EU data center customers will be under SparkPost EU.
https://messagebird.com/
United States (for SparkPost) European Union (for SparkPost EU)
View more
Questions? Get in touchWhether you're conducting vendor assessments, need clarification on our policies, or want to discuss custom security requirements, please don't hesitate to reach out. 
Powered By Responsive