Enterprise Security
Your code and data never leave your infrastructure. SOC 2 Type II certified, GDPR compliant, HIPAA ready. Meet the strictest compliance standards with granular access controls.
Hybrid architecture
Separation of orchestration and execution means Prefect Cloud coordinates workflows without ever accessing your code or data. Workers poll via outbound-only connections—no inbound access to your network required.
No code or data egress from your environment
Deploy on Kubernetes, ECS, Docker, or serverless
Workers poll for work—no inbound network access
Prefect Cloud hosts the Control Plane & Metadata. You host execution & data.
Access controls
Control who can access what with role-based access control, team management, and directory sync. Secure your workflows while keeping code and data in your infrastructure.
Object-level permissions for fine-grained control
Service accounts for automation
Multi-factor authentication required
Infrastructure security
All data encrypted in transit and at rest with industry best-practice algorithms. High availability configuration across multiple availability zones with annual penetration testing and disaster recovery simulations.
Annual third-party penetration testing
Continuous vulnerability monitoring
Annual disaster recovery simulations
Choose the deployment pattern that fits your security requirements
Prefect Cloud coordinates workflows while execution happens in your infrastructure. No code or data leaves your environment.
Prefect Cloud provisions infrastructure on-demand in your cloud account with limited service account permissions.
Prefect Cloud executes workflows on managed infrastructure. Requires providing workflow source code.
Complete transparency on data handling
Required for orchestration coordination
Prefect Cloud never accesses
Built for regulated industries
Independently audited security controls proving commitment to data protection and operational excellence.
TLS 1.2+ for data in transit. Industry-standard encryption for data at rest with workspace-unique keys.
Object-level permissions and role-based access control. Control exactly who can access what.
GDPR compliant and HIPAA ready. Designed for healthcare, finance, and regulated industries.
Complete audit trail of all actions with configurable retention. Track who did what and when.
SAML 2.0 and OIDC single sign-on. Automatic user provisioning with SCIM directory sync.
Continuous security improvement
Documentation and policies
Our security team is here to help. Contact us about enterprise security requirements, compliance documentation, or to request our SOC 2 Type II report.