Skip to main content
Traversal maintains robust controls across access, data handling, and system operations. Security is a core design principle, not an add-on.

Security certifications

Traversal maintains a SOC 2 Type II attestation, aligns with GDPR and HIPAA requirements, and undergoes regular third-party penetration testing.

Traversal Trust Center

Request compliance reports, review security documentation, and find more information about Traversal’s certifications.

Security-first architecture

Traversal is built from the ground up with security as a core design principle.
Traversal deploys no sidecars or background processes in your environment. There is nothing running in your infrastructure on Traversal’s behalf.
Traversal cannot modify your systems or data. All integrations require read-only access only — no write privileges to your data stores or code.
Traversal does not rely on brittle integrations or sensitive structural dependencies. There is no schema configuration required.
Traversal avoids hard-coded prompts or hidden logic that can introduce risk or unpredictable behavior.

Data privacy

Customer data is not used for cross-customer training, model improvement, or service optimization. Any data processing is limited to in-context use for the originating customer only. All customer data is protected through strict isolation, access controls, and privacy safeguards. For more detail, see the Data privacy page.

Contact security

For detailed security documentation, compliance reports, or to discuss your specific requirements, contact the Traversal security team at security@traversal.com.