Trust
Security & compliance
We build and operate Kymata with security and customer trust in mind. This page summarizes our program at a glance; for audit reports, questionnaires, subprocessors, and detailed materials, use our Trust Center.
Program
Security at a glance
These themes map to how we run the platform and align with what buyers and auditors expect to see in a SOC 2 program.
Governance & accountability
We maintain security policies, risk management practices, and clear ownership so controls stay aligned with how we build and run the platform.
Access & identity
We apply least-privilege access, authentication requirements, and ongoing access practices appropriate to a cloud service handling customer data.
Data protection
We protect data in transit and at rest using industry-accepted practices, with architecture and operations designed for confidentiality and integrity.
Monitoring & operations
We use logging, monitoring, and change management so we can detect issues, respond to events, and keep the service reliable.
Vendors & subprocessors
We evaluate third parties that process data on our behalf and maintain transparency about subprocessors through our Trust Center and customer agreements.
Certifications
SOC 2
Kymata undergoes independent SOC 2 examinations of controls relevant to our services. Reports are issued by a qualified CPA firm under the AICPA's Trust Services Criteria (Security is required; additional criteria may apply depending on audit scope).
The SOC for Service Organizations logo is used under AICPA guidelines; select it to open the official SOC program page.
Marketing descriptions are not a substitute for the SOC report. For control objectives, testing period, and scope of services covered, rely on the report and your agreement with Kymata.
Transparency
Operations & availability
We publish live status for service health. Subprocessor lists and similar disclosures are maintained for customers and prospects through the Trust Center so they stay current as our service providers change.
- Status page — incidents, uptime, and scheduled maintenance.
- Trust Center — subprocessor transparency, questionnaires, and request flows for security documentation.
Trust Center
Audit reports (under NDA where applicable), policies, questionnaires, and updates—so procurement and security teams can self-serve without waiting on ad-hoc email threads.
Procurement
Security reviews & questionnaires
Start with the Trust Center for the fastest path. If you need a tailored review, contact us and reference your vendor intake or deal stage.
- Request SOC reports and security documentation through the Trust Center (NDA may apply).
- Use CAIQ, SIG, or custom questionnaires—coordinate via Trust Center or your Kymata contact.
- General inquiries: contact@kymata.ai.
Security FAQs
Legal
