Trust Center

Start your security review
View & download sensitive information
Ask for information

Overview

Sigma sits atop your existing cloud database and uses a secure connection to query your data warehouse directly. Sigma writes a query to access the data needed to answer your question and returns the result in the browser.

Sigma provides a single point of access for your data, so you can establish robust data governance, keep report sprawl to a minimum, and restrict access to sensitive information. Administrators can set permissions by team and namespace, and restrict data access directly from the database as well.

We built Sigma with security in mind, which is why we included features like immutable hosts, container checking, and threat detection. At Sigma, we make every effort to provide secure data analytics and ensure our platform is protected at every layer of the stack.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
HIPAA Logo
HIPAA
ISO 27001 Logo
ISO 27001
Privacy Shield Logo
Privacy Shield
SOC 1 Logo
SOC 1
SOC 2 Logo
SOC 2
SOC 3 Logo
SOC 3
Start your security review
View & download sensitive information
Ask for information

Sigma Computing is reviewed and trusted by

DoorDashDoorDash
BlackstoneBlackstone
US FoodsUS Foods
ExxonMobilExxonMobil
First Republic BankFirst Republic Bank
Colgate-PalmoliveColgate-Palmolive
EquinixEquinix
AMDAMD
CloverClover
Intercontinental ExchangeIntercontinental Exchange
LaceworkLacework
AutodeskAutodesk
Moffitt Cancer CenterMoffitt Cancer Center
Other Reports
HIPAA Report
Network Diagram
Pentest Report
SOC 1 Report
SOC 2 Report
SOC 3 Report
HIPAA
ISO 27001
SOC 1
SOC 2
SOC 3
CAIQ - Pre-filled Questionnaire
SIG Core - Pre-filled Questionnaire
SIG Lite - Pre-filled Questionnaire
VSA Core
Cyber Insurance
Data Processing Agreement
Service-Level Agreement
Business Continuity Policy
General Incident Response Policy
Information Security Policy
Risk Management Policy
Software Development Lifecycle

Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective12 hours
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

HIPAA Report
Network Diagram
Other Reports
View more

Self-Assessments

CAIQ - Pre-filled Questionnaire
SIG Core - Pre-filled Questionnaire
SIG Lite - Pre-filled Questionnaire
View more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Responsible Disclosure
Code Analysis
Credential Management
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
Azure
View more

Endpoint Security

DNS Filtering
Endpoint Detection & Response
Mobile Device Management
View more

Network Security

DNSSEC
Firewall
IDS/IPS
View more

Corporate Security

Email Protection
Employee Training
Incident Response
View more

Policies

Business Continuity Policy
General Incident Response Policy
Information Security Policy
View more

Trust Center Updates

Powered bySafeBase Logo