Trust Center

Start your security review
View & download sensitive information
Search items
ControlK
Welcome to Orca Security's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.
AWS Qualified Software Logo
AWS Qualified Software
CSA STAR Logo
CSA STAR
FedRAMP Moderate Logo
FedRAMP Moderate
GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
ISO 27017 Logo
ISO 27017
ISO 27018 Logo
ISO 27018
PCI DSS Logo
PCI DSS
SOC 2 Logo
SOC 2
StateRAMP Logo
StateRAMP
IRAP Logo
IRAP
Unity-company-logoUnity
SAP-company-logoSAP
Digital Turbine-company-logoDigital Turbine
Autodesk-company-logoAutodesk
Wix-company-logoWix
Gannett-company-logoGannett
Lemonade-company-logoLemonade
Wiley-company-logoWiley
Vercel-company-logoVercel
Sisense-company-logoSisense
Docebo-company-logoDocebo
FourKites-company-logoFourKites

Documents

Featured Documents

REPORTSNetwork Diagram
Trust Center Updates

Vulnerability in Apache Parquet’s Java library CVE-2025-30065

Vulnerabilities
Copy link

Orca is unaffected by the vulnerability,
A critical security vulnerability (CVE-2025-30065) has been identified in the parquet-avro module of Apache Parquet's Java library. Applications and services utilizing Apache Parquet Java library versions 1.15.0 and earlier, including those reading or importing Parquet files from external or untrusted sources through big-data frameworks (e.g., Hadoop, Spark, Flink) or custom applications incorporating the Parquet Java code, are potentially vulnerable.

Published at N/A

Oracle Cloud Breach

Vulnerabilities
Copy link

Per the recent Oracle Cloud breach we want to assure you that Orca Security's security team has taken immediate and comprehensive action to protect our systems and data. Although Orca Security is listed among Oracle's tenants, we promptly investigated the incident and implemented all recommended remediation steps provided by the vendor.

Preventative Actions Taken:

  • We have rotated all relevant passwords, tokens, and secrets to ensure the security of our systems.
  • Our team thoroughly reviewed logs and activities to identify any potential issues and confirm that no unauthorized access occurred.

If you are an Orca customer affected by this breach, we encourage you to review our detailed analysis and guidance on the Oracle Cloud breach, available on our blog: https://orca.security/resources/blog/oracle-cloud-breach-exploiting-cve-2021-35587/. Additionally, you can utilize the Orca Platform to investigate and remediate any potential impacts.

We remain committed to maintaining the highest standards of security and transparency. If you have any questions or concerns, please do not hesitate to reach out to our compliance team or your AE.

Thank you for your trust in Orca Security.

Published at N/A

CrowdStrike outage

Vulnerabilities
Copy link

We are aware of the ongoing CrowdStrike outage and want to reassure our customers that Orca remains unaffected. Our security measures and protocols continue to operate without interruption, ensuring that your data remains secure.

Published at N/A

Snowflake

Vulnerabilities
Copy link

We are aware of recent reports related to a potential compromise of certain Snowflake accounts. Orca remains unaffected; no Snowflake accounts managed by Orca were targeted or compromised in this incident. Snowflake has also confirmed to us that they have no indicators of compromise for any of our accounts. As well we continued with further due diligence to ensure our data security.

Published at N/A

Critical XZ Utils Supply Chain Compromise Affects Multiple Linux Distributions (CVE-2024-3094)

Vulnerabilities
Copy link

Our company remains unaffected by the CVE-2024-3094 vulnerability; A malicious backdoor has been discovered in the XZ Utils package, a popular data compression library used in major Linux distributions, affecting XZ Utils versions 5.6.0 and 5.6.1. The vulnerability could allow an attacker to gain unauthorized access to the system and is being tracked as CVE-2024-3094 with a CVSS score of 10 – the highest possible score.

Sincerely, Orca Security team.

Published at N/A*

If you need help using this Trust Center, please contact us.

Contact Support

If you think you may have discovered a vulnerability, please send us a note.

Built onSafeBase by Drata Logo