Your security taken seriously
We manage the security features, compliance, and penetration testing so you can focus on building the best product for your users.


Is Trigger.dev SOC2 compliant?
Yes, Trigger.dev is SOC 2 Type II compliant. Visit our Security Portal for more information. Our latest report is available upon request for our Enterprise customers.
Is Trigger.dev GDPR compliant?
Yes, Trigger.dev is GDPR compliant. Visit our Security Portal for more information, or contact us to request data deletion.
Does Trigger.dev get penetration tested?
Yes, Trigger.dev is regularly penetration tested by an independent third-party security company.
Can I access your penetration test reports?
Our latest penetration test report is available upon request for our Enterprise customers.
Where can I find your list of sub-processors?
You can find our list of our active sub-processors on our Sub-processors page.
Does Trigger.dev encrypt my data?
Yes, your data is encrypted at rest usingAES-256 encryption, and in-transit using HTTPS/TLS encryption.
Can I enable Multi-Factor Authentication on my account?
Yes, you can enable Multi-Factor Authentication (MFA) on your account, adding an extra layer of authentication security for your team.
Can I view Trigger.dev's Data Processing Schedule?
Yes, our Data Processing Schedule is part of our Terms of Service and applies automatically upon sign-up.
