Kraken Trust Centre

At Kraken, your trust and security are our top priorities. We are committed to maintaining the highest standards of data protection, privacy, and compliance. Our Trust Center is designed to provide you with transparent and comprehensive information about our security practices, policies, and compliance efforts.

We regularly monitor and assess our security program to meet and exceed compliance and regulatory requirements.

DATA SECURITY

Creating an advanced operating system and cutting edge connections for utilities wouldn’t be possible without investing in the security and privacy of our systems, protecting our clients’ data and our business operations.

Kraken has in place security controls to protect our platform, organisation and data, with key security measures including:

  • Infrastructure security for our Kraken Platform, based on Amazon Web Services security capabilities and industry leading cybersecurity products

  • Secure Software Development Practices integrated into our Continuous Integration and Continuous Delivery (or Deployment) (“CI/CD”) workflow, with security testing and vulnerability analysis performed before, during and after deployment

  • Embedded operational security capabilities leveraging automation and machine learning to respond to incidents

Encryption

Our platforms have been designed with confidentiality in mind, and Kraken encrypts  client’s data at rest (using Advanced Encryption Software (“AES”) -256) and in transit (using Known secure TLS 1.2 cipher suites and TLS 1.3).

Kraken Customer Platform Isolation

Kraken Customer Platform is single-tenant by-default, which allows our clients to benefit from isolated network virtualisation and a dedicated set of security controls limiting the risk of threat proliferation. It also enables us to feed Kraken Customer Platform logs directly into client Security Information and Event Management (“SIEM”) tooling if needed.

Automated Patching

Kraken’s continuous deployment model allows us to deploy over 100 times a day, which means we can quickly deploy patches to client environments to keep packages up-to-date.

Automation and Standardisation as an Enabler

In order to reach the scale needed to support Kraken’s mission to create a smarter, greener energy network, we align our security tooling and operational approach with how we build our platform. We deploy infrastructure as code, including security controls and configurations for everything from web application firewalls to monitoring technologies. We deploy centralised monitoring throughout our infrastructure (endpoints and cloud container hosts) for containment and rapid response to potential Indicators of Compromise (IOCs) as and when necessary.

Compliance and Certifications

Kraken’s Customer and Kraken Flex products maintain SOC 1® Type 2 and SOC 2® Type 2 attestations with reports available for our clients’ (and prospective clients’) assurance purposes. These reports are published on a twice-annual basis to enable our clients with various reporting schedules to meet their necessary assurance needs.

Kraken holds ISO/IEC 27001:2022 certification and uses ISO27001 as the basis for our Information Security Management System. Our set of organisational policies and standards has been developed and maintained with ISO27001 in mind.

Certifications
  • ISO/IEC 27001:2022 - Our Information Security Management System (ISMS) certification demonstrates our commitment to international best practices in security management

  • SOC 1® Type 2 and SOC 2® Type 2 attestations - Published twice annually to provide comprehensive assurance of our controls effectiveness across Security, Availability, and Confidentiality

Preventative Security Controls
  • AWS infrastructure security with isolated network virtualisation and dedicated client environments for Kraken Customer Platform

  • Secure Software Development Lifecycle integrated into CI/CD workflow with automated security testing and vulnerability analysis before, during, and after deployment

  • Code analysis e.g. Static Application Security Testing and Software Composition Analysis as part of every build

  • Continuous deployment model enabling >100 deployments daily with automated security checks, regular updates and patching

Data Measures

Kraken implements data protection measures including:

  • AES-256 encryption of client’s data at rest, in Kraken’s databases and for any other data stored (e.g. in S3 buckets)

  • Mandatory TLS 1.2+ encryption of client’s data in transit across our network

  • Single-tenant architecture ensuring data segregation between clients

  • Role-based data access control with regular privileged access permission audits

Authentication & Access Control

Our authentication framework provides:

  • OAuth/OpenID Connect-based secure token authentication with JWT validation

  • Multi-factor authentication support across Kraken access points Permission controls with customisable roles and access levels

  • Integration with client identity providers (“IdPs”) supporting open authorisation (“OAuth”) /Security Assertion Markup Language (“SAML”) for Kraken Customer Platform

Security Operations

Our security operations include:

  • Continuous security monitoring 

  • Threat detection with leading security products and automation

  • Regular security assessments

  • Incident response procedures and a dedicated security operations team

  • Disaster recovery capabilities

DATA PROTECTION

Kraken takes the protection of your data extremely seriously. We understand the importance of safeguarding your personal information and are committed to maintaining the highest standards of data security and privacy. 

We implement data protection frameworks and minimisation principles, limit personal data processing to essential identifiers and implement redaction for sensitive information before any third-party processing where appropriate.

At Kraken, compliance with applicable data protection laws and regulations is of paramount importance—not only to meet legal requirements but also to provide for additional protection and security of our clients' and their end-customers' personal information. Our clients may choose to deploy Kraken services from any region supported by Kraken or, where applicable, a collection of regions. Kraken will not relocate a client’s workspace from the selected region or geography without the client’s prior consent. 

We align with General Data Protection Regulation (GDPR) and take this as the standard across the business. We also include an additional layer of compliance by factoring in other applicable modern data protection laws, such as the California Consumer Privacy Act (CCPA), where required and appropriate. We continuously review and update our data protection policies and standards to rigorously align with data and privacy laws in the territories we operate.

Kraken does not sell client data or use it for advertising purposes. 

Privacy Notice

Kraken’s Privacy Notice can be found here: https://kraken.tech/privacy-notice

Cookies Notice

Kraken’s Cookies Notice can be found here: https://kraken.tech/cookies-notice

Data Processing Agreement

Kraken’s current Data Processing Agreement can be found here: https://kraken.tech/DPA

For Data Processing Agreements entered into on or before March 1, 2025, please contact us at privacy@kraken.tech

Subprocessors

Kraken’s current subprocessor list (and the ability to subscribe to subprocessor changes notification) can be found here: https://kraken.tech/subprocessors. The list of subprocessors may vary depending on the specific product or service selected, as well as the contractual agreements in place with our clients. Kraken reserves the right to update this list periodically.

Kraken and its affiliates engage third-party subprocessors to help us provide services to our clients. A subprocessor is a third-party processor engaged by Kraken or in some cases, a Kraken affiliate, who receives data from Kraken and processes personal data on behalf of our clients.The location of a subprocessor may vary depending on the location of our client.

As a condition for allowing a subprocessor to process personal data, Kraken and its affiliates (as applicable) will enter into a written agreement with each subprocessor. This agreement will include data protection obligations that are at least as stringent as Kraken’s own technical and organizational measures to safeguard client personal data against accidental or unlawful destruction, loss, alteration, or unauthorized disclosure or access.

Data Protection Officer

Kraken has formally appointed a Data Protection Officer (“DPO”). To reach our DPO, please contact dpo@kraken.tech

Employee Training and Compliance

We maintain security and privacy standards through employee training and verification processes.

Training completion and verification are prerequisites for system access, confirming employees understand their responsibilities in maintaining Kraken's security and privacy standards.

Examples of our training, controls and verification are as follows:

Security and Privacy Training
  • Employees must complete mandatory security awareness training

  • Training covers essential topics including:

    • Data protection principles and GDPR compliance

    • Information classification and handling

    • Incident response procedures

    • Security best practices and acceptable use policies

  • Refresher training is required annually for continued awareness of security and privacy requirements

  • Additional role-specific security training is provided based on job function and access levels

Access Control and Authentication
  • Every employee is assigned unique credentials for accessing Kraken systems and applications

  • Multi-factor authentication is mandatory for system access, whether working remotely or in office

  • Access rights are granted based on role requirements and privileged access is regularly reviewed

  • Strict password policies and security controls are enforced across our products, platforms and tools 

Training Verification

Completion of security and privacy training is tracked and documented

Training materials are regularly updated to reflect current threats and compliance requirements

Regular audits maintain ongoing compliance with training requirements

Personal Data Breach 

Our policies and procedures are established to notify clients about personal data breaches in accordance with our contractual obligations set out in our Data Processing Agreement and applicable laws.

We prioritise the security and privacy of personal data. Our approach to handling personal data breaches is structured to implement swift and effective action, outlined below:

  • Activate response procedure

  • Involve Legal, Privacy and Security teams

  • Perform breach assessment and reinforce containment

  • Assess risk to data subjects and notify clients and regulators (as necessary) 

  • Perform post-incident review and record management 

  • Update security measures (as necessary)

Data Role of Kraken 

Kraken acts as a data processor when providing services to its clients. In this role, Kraken processes personal data on behalf of its clients, who are the data controllers. The data processing activities are carried out in accordance with the instructions provided by Kraken’s clients and applicable data protection laws.

As a data processor, we:

  • Process data  according to our clients' instructions and purposes;

  • Cannot dictate or choose the lawful basis for processing - this is the client's; responsibility;

  • Must follow client’s instructions for data processing, including retention periods and data subject rights requests; and

  • Maintain comprehensive records of processing activities.

We take our responsibilities as a data processor seriously. We are committed to the highest standards of data protection and privacy across our products and services. 

Transfer Impact Assessments

As a data processor handling personal data across multiple territories, we conduct Transfer Impact Assessments (TIAs) to implement secure and compliant data transfers.

For extracts or copies of our TIAs (where appropriate), please contact privacy@kraken.tech

COMPLIANCE FRAMEWORK

Our security and compliance policies and standards are developed and maintained in alignment with international best practices and regulatory requirements. Regular audits are conducted for continued compliance with our commitments.

Client Requests 

We understand the importance of transparency in security assurance. Clients may request access to our security audit reports and certifications through their account representative. Available documentation includes:

  • Latest SOC 1 Type II and SOC 2 Type II reports and Bridging letters (where necessary)

  • Kraken’s ISO 27001 certificate and statement of applicability

Executive summaries of penetration test results

To request copies of our security audit reports or certifications, please contact your KrakenTech account representative. 

Prospect Requests 

You can request access to the documents in this Trust Centre by contacting your Kraken Sales Representative. Access will be granted once we confirm a valid Non-Disclosure Agreement (NDA) is in place.