{"id":194777,"date":"2021-07-20T10:55:36","date_gmt":"2021-07-20T14:55:36","guid":{"rendered":"https:\/\/www.cyberark.com\/trust\/compliance\/"},"modified":"2025-01-31T17:11:01","modified_gmt":"2025-01-31T22:11:01","slug":"compliance","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/zh-hant\/trust\/compliance\/","title":{"rendered":"Compliance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=&#8221;cybv2 int-hero-noimg&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/zh-hant\/trust\/\">Back to Trust Center<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Compliance at CyberArk<\/h1>\n<h2>CyberArk is committed to leading compliance and regulatory measures designed to ensure that our business is compliant and your data is safe.<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221; css=&#8221;.vc_custom_1625851060095{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-md-center heading&#8221; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3>Compliance program<\/h3>\n<p>CyberArk has obtained the following accreditations to provide independent assurance that our programs, products and services meet industry standards for security:[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181904 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png\" alt=\"ISO 27001\" width=\"190\" height=\"190\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png 190w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001-100x100.png 100w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>ISO 27001<\/h4>\n<p>International standard for managing information security. ISO details requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS).[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box btn-arrow&#8221; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-140385\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc2-1.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc2-1.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc2-1-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc2-1-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>SOC 2 Type 2<\/h4>\n<p>These reports help our customers and their auditors understand the controls CyberArk has established to support operations and compliance. CyberArk has achieved SOC 2 Type 2 certifications for many of our SaaS products.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221; css=&#8221;.vc_custom_1625851182196{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<table style=\"border-collapse: collapse; width: 270px; height: 60px;\" border=\"0\" width=\"128\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr style=\"height: 14.4pt;\">\n<td style=\"height: 14.4pt; width: 48pt;\" width=\"64\" height=\"19\"><a href=\"https:\/\/cloudsecurityalliance.org\/star\/registry\/cyberark\/services\/endpoint-privilege-manager\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-139340\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/csa-star-certification-150x150.png\" alt=\"CSA STAR Certification\" width=\"190\" height=\"190\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/csa-star-certification-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/csa-star-certification-300x300.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/csa-star-certification-100x100.png 100w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/01\/csa-star-certification.png 584w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/a><\/td>\n<td style=\"width: 48pt;\" width=\"64\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-199505 size-thumbnail\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/Trusted-Cloud-Provider-Logo-150x150.png\" alt=\"Trusted cloud provider\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/Trusted-Cloud-Provider-Logo-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/Trusted-Cloud-Provider-Logo-300x300.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/Trusted-Cloud-Provider-Logo-768x768.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/Trusted-Cloud-Provider-Logo-100x100.png 100w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/11\/Trusted-Cloud-Provider-Logo.png 800w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>CSA STAR Certification<\/h4>\n<p>Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best practices.<\/p>\n<p>CyberArk has earned the Trusted Cloud Provider trustmark from CSA, demonstrating CyberArk\u2019s extended commitment to holistic security through training, education, and contributing to the community through volunteering and cloud security evangelism.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;cta-box btn-arrow&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-140393 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc3-1.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc3-1.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc3-1-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/02\/aicpa-soc3-1-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>SOC 3 Reports<\/h4>\n<p>A public facing report demonstrating CyberArk has met the AICPA Trust Services Security, Availability, and Confidentiality Criteria.[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"#pdf-links\">View Reports<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221; css=&#8221;.vc_custom_1625851182196{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181931 size-medium\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27017-2015-300x300.png\" alt=\"ISO 27017\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27017-2015-300x300.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27017-2015-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27017-2015-100x100.png 100w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27017-2015.png 481w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>ISO 27017:2015<\/h4>\n<p>International standard for managing information security for cloud services, supplementing guidance from the ISO 27001 standard with specific guidelines for security controls in a cloud environment.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;cta-box btn-arrow&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181940 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27018-2019.png\" alt=\"ISO 27018\" width=\"250\" height=\"250\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27018-2019.png 250w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27018-2019-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/ISO-27018-2019-100x100.png 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/>[\/vc_column_text][vc_column_text]<\/p>\n<h4>ISO 27018:2019<\/h4>\n<p>International standard for managing the security and privacy of Personally Identifiable Information (PII) within a cloud environment. This standard outlines how cloud service providers can assess risk and implement controls protecting PII.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221; css=&#8221;.vc_custom_1625851182196{background-color: #f7f7f7 !important;}&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189097 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/wacg-logo.png\" alt=\"WACG logo\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/wacg-logo.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/wacg-logo-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/wacg-logo-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>WCAG 2.1 compliance<\/h4>\n<p>CyberArk is committed to following <a href=\"https:\/\/www.w3.org\/WAI\/WCAG22\/quickref\/?versions=2.1#top\" target=\"_blank\" rel=\"noopener\">Web Content Accessibility Guidelines<\/a> (WCAG) standards to ensure our products are accessible to all users. Our continuous efforts to uphold WCAG compliance demonstrate our dedication to inclusivity and ensuring equal access to information and services for everyone. For more information, please visit our PAM Self-Hosted <a href=\"https:\/\/docs.cyberark.com\/pam-self-hosted\/Latest\/en\/Content\/Release%20Notes\/RN-WhatsNew.htm?tocpath=Get%20Started%7CWhat%E2%80%99s%20New%7C_____0#Enhancementstoaccessibilityinourmoderninterface\">documentation<\/a>.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;cta-box btn-arrow&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189106 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dodin-logo.png\" alt=\"DoDIN logo\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dodin-logo.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dodin-logo-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/dodin-logo-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>DoD Information Network Approved Product List (DoDIN APL)<\/h4>\n<p>CyberArk Privileged Access Manager Self-Hosted version 14.2 has been officially listed as a trusted solution for Department of Defense (DoD) customers. CyberArk PAM Self-Hosted version 14.2 can be found on the DoD Information Network Approved Product List (DoDIN APL), meeting specifications for the DoD. For more information, see <a href=\"https:\/\/aplits.disa.mil\/processAPList.action\" target=\"_blank\" rel=\"noopener\"><strong>DoDIN APL<\/strong><\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1724914431411{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-196627\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/08\/common-criteria-logo-v2.png\" alt=\"common criteria\" width=\"253\" height=\"252\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/08\/common-criteria-logo-v2.png 253w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/08\/common-criteria-logo-v2-150x150.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/08\/common-criteria-logo-v2-100x100.png 100w\" sizes=\"auto, (max-width: 253px) 100vw, 253px\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>PAM Self-Hosted Receives Common Criteria NSCIB and NIAP Scheme Certifications<\/h4>\n<div class=\"ndl-GridItem ndl-GridItem--alignLeft \" data-size=\"full\">\n<div class=\"ndl-RichText wr-FieldValue-description\">\n<p>CyberArk PAM Self-Hosted main modules, Vault, PSM, PSMP, CPM and PVWA are Common Criteria certified for the Dutch Scheme (NSCIB) and the American Scheme (NIAP), supporting federal agencies.<\/p>\n<p>The certification was done based on the tested operating systems, split into 3 packages: the Vault, the Win based components (PVWA, PSM, CPM) and the Linux based PSMP.<\/p>\n<p>Certifications details can be found on the <a href=\"https:\/\/www.commoncriteriaportal.org\/products\/index.cfm\" target=\"_blank\" rel=\"noopener\">Common Criteria site<\/a> and the <a href=\"https:\/\/www.niap-ccevs.org\/products\" target=\"_blank\" rel=\"noopener\">NIAP site<\/a>.<\/p>\n<p>We are listed on the Trust CB site:\u00a0<a href=\"https:\/\/trustcb.com\/common-criteria\/nscib\/nscib-certificates\/\" target=\"_blank\" rel=\"noopener\">https:\/\/trustcb.com\/common-criteria\/nscib\/nscib-certificates\/<\/a><\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-189851\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-273x300.png\" alt=\"FedRAMP High Authorization\" width=\"100\" height=\"110\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-273x300.png 273w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp-150x165.png 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/04\/fed-ramp.png 767w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>FedRAMP High Authorization<\/h4>\n<div class=\"ndl-GridItem ndl-GridItem--alignLeft \" data-size=\"full\">\n<div class=\"ndl-RichText wr-FieldValue-description\">\n<p>CyberArk&#8217;s leading SaaS offerings, CyberArk Endpoint Privilege Manager and CyberArk Workforce Identity, achieve FedRAMP High Authorization, enhancing security for federal agencies in line with Zero Trust principles.<\/p>\n<\/div>\n<\/div>\n<div class=\"ndl-GridItem ndl-GridItem--alignLeft \" data-size=\"full\"><\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1724914431411{background-color: #f7f7f7 !important;}&#8221; el_class=&#8221;cybv2 cybv2-pad-top overview-icons&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text css=&#8221;&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-198746 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/FIDO-certified-passkey-FIDO2-green.png\" alt=\"FIDO logo\" width=\"249\" height=\"122\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/FIDO-certified-passkey-FIDO2-green.png 249w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/FIDO-certified-passkey-FIDO2-green-150x73.png 150w\" sizes=\"auto, (max-width: 249px) 100vw, 249px\" \/>[\/vc_column_text][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4>FIDO2 Certification<\/h4>\n<div class=\"ndl-GridItem ndl-GridItem--alignLeft \" data-size=\"full\">\n<div class=\"ndl-RichText wr-FieldValue-description\">\n<p>CyberArk Workforce Identity has achieved FIDO2 certification by the FIDO Alliance. CyberArk continues to advance its offering to eliminate password-based authentication vulnerabilities and meet industry standards for secure, phishing-resistant sign-ins and device attestation. Through open standards and passkeys, FIDO offers stronger, more secure alternatives to passwords and SMS OTPs, significantly reducing the risk of credential theft.<\/p>\n<\/div>\n<\/div>\n<div class=\"ndl-GridItem ndl-GridItem--alignLeft \" data-size=\"full\"><\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cybv2-pad-top&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>CyberGRX<\/h4>\n<p>CyberGRX operates the world\u2019s largest cyber risk exchange with over 250,000 participants. CyberArk participates in the CyberGRX Global Risk Exchange via an annual validated assessment. CyberArk customers can leverage our CyberGRX report to reduce their supplier due-diligence burden. CyberGRX assessments apply a dynamic and comprehensive approach to third party risk assessment, replacing outdated static spreadsheets as well as the need to repetitively request access to CyberArk\u2019s assessment each year. The latest report can be accessed through CyberGRX\u2019s Exchange Portal.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-181967 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/cybergrx_logo.png\" alt=\"Cybergrx\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/cybergrx_logo.png 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/cybergrx_logo-300x201.png 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/cybergrx_logo-768x514.png 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/cybergrx_logo-150x100.png 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120483\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-supply-chain-compliance-seesaw.jpeg\" alt=\"Supply Chain Compliance\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-supply-chain-compliance-seesaw.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-supply-chain-compliance-seesaw-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-supply-chain-compliance-seesaw-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-supply-chain-compliance-seesaw-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Supply chain security program<\/h4>\n<p>CyberArk policies are designed to ensure that engagements with third parties are, where applicable, subject to a review and approval process by CyberArk, continuously monitored, and required to comply with security requirements as a condition of their engagement.[\/vc_column_text][vc_btn title=&#8221;Sub-Processors&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fsub-processors%2F&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Internal &amp; external audit<\/h4>\n<p>CyberArk performs comprehensive security audits in partnership with leading audit firms on an annual basis. Additional risk-based internal audits are performed and reported to the Audit Committee as needed. All outputs are fed into a continuous improvement work plan which helps CyberArk continue sharpen our greater security program.[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-120491\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-Internal-audit-compliance-seesaw.jpeg\" alt=\"Internal and External Audit Compliance\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-Internal-audit-compliance-seesaw.jpeg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-Internal-audit-compliance-seesaw-300x201.jpeg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-Internal-audit-compliance-seesaw-768x514.jpeg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Trust-center-Internal-audit-compliance-seesaw-150x100.jpeg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 dark cybv2-pad-top cyb-pad-btm text-center&#8221;][vc_column][vc_column_text]<\/p>\n<h4>&gt;72% of the Top 25 Fortune 500 Companies<br \/>\nChoose CyberArk across all industries<\/h4>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 chart-dnut justify-content-around dark text-center&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;chart-box&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0JTIyJTIwd2lkdGglM0QlMjI0MDAlMjIlMjBoZWlnaHQlM0QlMjI0MDAlMjIlM0UlM0MlMkZjYW52YXMlM0U=[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-107772\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Insurance.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Insurance<\/strong><\/p>\n<h5>80%<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;chart-box&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0MiUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107820 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Financial.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Financial<\/strong><\/p>\n<h5>92%<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;chart-box&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0MyUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107828 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Medical.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Pharmaceutical<\/strong><\/p>\n<h5>72%<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4&#8243; el_class=&#8221;chart-box&#8221;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0NCUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107836 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Energy.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Energy<\/strong><\/p>\n<h5>84%<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4&#8243; el_class=&#8221;chart-box&#8221;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0NSUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107844 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufacturing.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Manufacturing<\/strong><\/p>\n<h5>84%<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4&#8243; el_class=&#8221;chart-box&#8221;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0NiUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107852 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Telecom<\/strong><\/p>\n<h5>80%<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; disable_element=&#8221;yes&#8221; el_class=&#8221;cybv2 chart-dnut justify-content-around dark text-center&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;chart-box&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0NCUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107836 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Energy.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Energy<\/strong><\/p>\n<h5>84%<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;chart-box&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0NSUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107844 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Manufacturing.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Manufacturing<\/strong><\/p>\n<h5>84%<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;chart-box&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_raw_html el_class=&#8221;chart-width&#8221;]JTNDY2FudmFzJTIwaWQlM0QlMjJteUNoYXJ0NiUyMiUyMHdpZHRoJTNEJTIyNDAwJTIyJTIwaGVpZ2h0JTNEJTIyNDAwJTIyJTNFJTNDJTJGY2FudmFzJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;chart-text&#8221;]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-107852 size-full\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/01\/Telecom.svg\" alt=\"\" width=\"55\" height=\"55\" \/><\/p>\n<p class=\"bold\"><strong>Telecom<\/strong><\/p>\n<h5>80%<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZjZG5qcy5jbG91ZGZsYXJlLmNvbSUyRmFqYXglMkZsaWJzJTJGQ2hhcnQuanMlMkYyLjguMCUyRkNoYXJ0LmJ1bmRsZS5taW4uanMlMjIlM0UlM0MlMkZzY3JpcHQlM0UlMEE=[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]JTNDc2NyaXB0JTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZjZG4uanNkZWxpdnIubmV0JTJGbnBtJTJGY2hhcnRqcy1wbHVnaW4tZGVmZXJyZWQlNDAxJTIyJTNFJTBBJTNDJTJGc2NyaXB0JTNF[\/vc_raw_js][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_js]%3Cscript%3E%0A%2F%2F%20Doughnut%20chart%201%0Avar%20ctx%20%3D%20document.getElementById%28%27myChart%27%29.getContext%28%272d%27%29%3B%0Avar%20myChart%20%3D%20new%20Chart%28ctx%2C%20%7B%0A%20%20%20%20type%3A%20%27doughnut%27%2C%0A%20%20%20%20data%3A%20%7B%0A%20%20%20%20%20%20%20%20datasets%3A%20%5B%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20data%3A%20%5B80%2C%2020%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20backgroundColor%3A%20%5B%27%230061A9%27%2C%20%27%2305253e%27%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20borderWidth%3A%200%0A%20%20%20%20%20%20%20%20%7D%5D%0A%20%20%20%20%7D%2C%0A%20%20%20%20options%3A%20%7B%0A%20%20%20%20%20%20%20%20tooltips%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20enabled%3A%20false%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20cutoutPercentage%3A%2075%2C%0A%20%20%20%20%20%20%20%20rotation%3A%20.75%2C%0A%0A%20%20%20%20%20%20%20%20plugins%3A%20%7B%0A%20%20%20%20%20%20%09%09%22deferred%22%3A%20%7B%20%0A%20%20%20%20%20%20%09%09%09yOffset%3A%20300%20%0A%09%09%09%7D%0A%20%20%20%20%09%7D%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%7D%0A%7D%29%3B%0A%0A%2F%2F%20Doughnut%20chart%202%0Avar%20ctx%20%3D%20document.getElementById%28%27myChart2%27%29.getContext%28%272d%27%29%3B%0Avar%20myChart%20%3D%20new%20Chart%28ctx%2C%20%7B%0A%20%20%20%20type%3A%20%27doughnut%27%2C%0A%20%20%20%20data%3A%20%7B%0A%20%20%20%20%20%20%20%20datasets%3A%20%5B%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20data%3A%20%5B92%2C%208%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20backgroundColor%3A%20%5B%27%230061A9%27%2C%20%27%2305253e%27%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20borderWidth%3A%200%0A%20%20%20%20%20%20%20%20%7D%5D%0A%20%20%20%20%7D%2C%0A%20%20%20%20options%3A%20%7B%0A%20%20%20%20%20%20%20%20tooltips%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20enabled%3A%20false%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20cutoutPercentage%3A%2075%2C%0A%20%20%20%20%20%20%20%20rotation%3A%20.75%2C%0A%0A%20%20%20%20%20%20%20%20plugins%3A%20%7B%0A%20%20%20%20%20%20%09%09%22deferred%22%3A%20%7B%20%0A%20%20%20%20%20%20%09%09%09yOffset%3A%20300%20%0A%09%09%09%7D%0A%20%20%20%20%09%7D%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%7D%0A%7D%29%3B%0A%0A%2F%2F%20Doughnut%20chart%203%0Avar%20ctx%20%3D%20document.getElementById%28%27myChart3%27%29.getContext%28%272d%27%29%3B%0Avar%20myChart%20%3D%20new%20Chart%28ctx%2C%20%7B%0A%20%20%20%20type%3A%20%27doughnut%27%2C%0A%20%20%20%20data%3A%20%7B%0A%20%20%20%20%20%20%20%20datasets%3A%20%5B%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20data%3A%20%5B72%2C%2028%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20backgroundColor%3A%20%5B%27%230061A9%27%2C%20%27%2305253e%27%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20borderWidth%3A%200%0A%20%20%20%20%20%20%20%20%7D%5D%0A%20%20%20%20%7D%2C%0A%20%20%20%20options%3A%20%7B%0A%20%20%20%20%20%20%20%20tooltips%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20enabled%3A%20false%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20cutoutPercentage%3A%2075%2C%0A%20%20%20%20%20%20%20%20rotation%3A%20.75%2C%0A%0A%20%20%20%20%20%20%20%20plugins%3A%20%7B%0A%20%20%20%20%20%20%09%09%22deferred%22%3A%20%7B%20%0A%20%20%20%20%20%20%09%09%09yOffset%3A%20300%20%0A%09%09%09%7D%0A%20%20%20%20%09%7D%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%7D%0A%7D%29%3B%0A%0A%2F%2F%20Doughnut%20chart%204%0Avar%20ctx%20%3D%20document.getElementById%28%27myChart4%27%29.getContext%28%272d%27%29%3B%0Avar%20myChart%20%3D%20new%20Chart%28ctx%2C%20%7B%0A%20%20%20%20type%3A%20%27doughnut%27%2C%0A%20%20%20%20data%3A%20%7B%0A%20%20%20%20%20%20%20%20datasets%3A%20%5B%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20data%3A%20%5B84%2C%2016%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20backgroundColor%3A%20%5B%27%230061A9%27%2C%20%27%2305253e%27%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20borderWidth%3A%200%0A%20%20%20%20%20%20%20%20%7D%5D%0A%20%20%20%20%7D%2C%0A%20%20%20%20options%3A%20%7B%0A%20%20%20%20%20%20%20%20tooltips%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20enabled%3A%20false%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20cutoutPercentage%3A%2075%2C%0A%20%20%20%20%20%20%20%20rotation%3A%20.75%2C%0A%0A%20%20%20%20%20%20%20%20plugins%3A%20%7B%0A%20%20%20%20%20%20%09%09%22deferred%22%3A%20%7B%20%0A%20%20%20%20%20%20%09%09%09yOffset%3A%20300%20%0A%09%09%09%7D%0A%20%20%20%20%09%7D%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%7D%0A%7D%29%3B%0A%0A%2F%2F%20Doughnut%20chart%205%0Avar%20ctx%20%3D%20document.getElementById%28%27myChart5%27%29.getContext%28%272d%27%29%3B%0Avar%20myChart%20%3D%20new%20Chart%28ctx%2C%20%7B%0A%20%20%20%20type%3A%20%27doughnut%27%2C%0A%20%20%20%20data%3A%20%7B%0A%20%20%20%20%20%20%20%20datasets%3A%20%5B%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20data%3A%20%5B84%2C%2016%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20backgroundColor%3A%20%5B%27%230061A9%27%2C%20%27%2305253e%27%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20borderWidth%3A%200%0A%20%20%20%20%20%20%20%20%7D%5D%0A%20%20%20%20%7D%2C%0A%20%20%20%20options%3A%20%7B%0A%20%20%20%20%20%20%20%20tooltips%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20enabled%3A%20false%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20cutoutPercentage%3A%2075%2C%0A%20%20%20%20%20%20%20%20rotation%3A%20.75%2C%0A%0A%20%20%20%20%20%20%20%20plugins%3A%20%7B%0A%20%20%20%20%20%20%09%09%22deferred%22%3A%20%7B%20%0A%20%20%20%20%20%20%09%09%09yOffset%3A%20300%20%0A%09%09%09%7D%0A%20%20%20%20%09%7D%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%7D%0A%7D%29%3B%0A%0A%2F%2F%20Doughnut%20chart%206%0Avar%20ctx%20%3D%20document.getElementById%28%27myChart6%27%29.getContext%28%272d%27%29%3B%0Avar%20myChart%20%3D%20new%20Chart%28ctx%2C%20%7B%0A%20%20%20%20type%3A%20%27doughnut%27%2C%0A%20%20%20%20data%3A%20%7B%0A%20%20%20%20%20%20%20%20datasets%3A%20%5B%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20data%3A%20%5B80%2C%2020%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20backgroundColor%3A%20%5B%27%230061A9%27%2C%20%27%2305253e%27%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20borderWidth%3A%200%0A%20%20%20%20%20%20%20%20%7D%5D%0A%20%20%20%20%7D%2C%0A%20%20%20%20options%3A%20%7B%0A%20%20%20%20%20%20%20%20tooltips%3A%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20enabled%3A%20false%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20cutoutPercentage%3A%2075%2C%0A%20%20%20%20%20%20%20%20rotation%3A%20.75%2C%0A%0A%20%20%20%20%20%20%20%20plugins%3A%20%7B%0A%20%20%20%20%20%20%09%09%22deferred%22%3A%20%7B%20%0A%20%20%20%20%20%20%09%09%09yOffset%3A%20300%20%0A%09%09%09%7D%0A%20%20%20%20%09%7D%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%7D%0A%7D%29%3B%0A%3C%2Fscript%3E[\/vc_raw_js][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-top overview-hz&#8221;][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;head-box&#8221;][vc_column_text]<\/p>\n<h3>Still have security questions?<\/h3>\n<p>Learn more with supporting resources.[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_row_inner equal_height=&#8221;yes&#8221;][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;5\/12&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120351\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/ContactSupport-technicalcommunity.svg\" alt=\"CyberArk Technical Support\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1625776592918{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Technology Support Community<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/customer-support\/\">Technology Support<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; width=&#8221;5\/12&#8243; offset=&#8221;vc_col-sm-offset-1&#8243;][vc_column_text]<img decoding=\"async\" class=\"alignnone size-full wp-image-120359\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/07\/Product-Documentation.svg\" alt=\"CyberArk Technical Documentation\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1625776637942{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4>Additional Documentation<\/h4>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/docs.cyberark.com\/\" target=\"_blank\" rel=\"noopener\">CyberArk Docs<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]JTNDYSUyMGNsYXNzJTNEJTIyYW5jaG9yJTIyJTIwbmFtZSUzRCUyMnBkZi1saW5rcyUyMiUzRSUzQyUyRmElM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 dark cybv2-pad fw-pr-links&#8221;][vc_column offset=&#8221;vc_col-lg-2&#8243;][vc_column_text]<\/p>\n<h3>SOC 3 reports<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243; offset=&#8221;vc_col-lg-offset-1&#8243; el_class=&#8221;right-clmn&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Vendor-PAM-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank&quot;\" rel=\"noopener\">CyberArk Vendor PAM SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-offset-0 vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Secure-Browser-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank&quot;\" rel=\"noopener\">CyberArk Secure Browser SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Endpoint-Privilege-Manager-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Endpoint Privilege Manager SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Cloud-Security-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Cloud Security SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Privilege-Cloud-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Privilege Cloud SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Secure-Web-Sessions-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Secure Web Sessions SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Identity-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Identity SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Secure-Infrastructure-Access-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Secure Infrastructure Access SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Conjur-Cloud-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Conjur Cloud SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-box&#8221; offset=&#8221;vc_col-lg-6&#8243;][vc_column_text css=&#8221;&#8221; el_class=&#8221;link-arrow-right&#8221;]<a href=\"https:\/\/www.cyberark.com\/CyberArk-Secrets-Hub-Type-2-SOC-3-Final-Report.pdf\" target=\"_blank\" rel=\"noopener\">CyberArk Secrets Hub SOC 3 Report<\/a><i class=\"fa fa-long-arrow-right\"><\/i>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;cybv2 int-hero-noimg&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text el_class=&#8221;cyb-breadcrumb&#8221;]Back to Trust Center[\/vc_column_text][vc_column_text] Compliance at CyberArk CyberArk i&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":131026,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-194777","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Compliance | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk is dedicated to many leading industry compliance and regulatory measures to ensure that our business is compliant, and your data is safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/trust\/compliance\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance\" \/>\n<meta property=\"og:description\" content=\"CyberArk is dedicated to many leading industry compliance and regulatory measures to ensure that our business is compliant, and your data is safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/trust\/compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-31T22:11:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"190\" \/>\n\t<meta property=\"og:image:height\" content=\"190\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/compliance\/\",\"url\":\"https:\/\/www.cyberark.com\/trust\/compliance\/\",\"name\":\"Compliance | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png\",\"datePublished\":\"2021-07-20T14:55:36+00:00\",\"dateModified\":\"2025-01-31T22:11:01+00:00\",\"description\":\"CyberArk is dedicated to many leading industry compliance and regulatory measures to ensure that our business is compliant, and your data is safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/trust\/compliance\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/trust\/compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/compliance\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/trust\/compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u4fe1\u4efb\u4e2d\u5fc3\",\"item\":\"https:\/\/www.cyberark.com\/trust\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Compliance | CyberArk","description":"CyberArk is dedicated to many leading industry compliance and regulatory measures to ensure that our business is compliant, and your data is safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/trust\/compliance\/","og_locale":"zh_TW","og_type":"article","og_title":"Compliance","og_description":"CyberArk is dedicated to many leading industry compliance and regulatory measures to ensure that our business is compliant, and your data is safe.","og_url":"https:\/\/www.cyberark.com\/trust\/compliance\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2025-01-31T22:11:01+00:00","og_image":[{"width":190,"height":190,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"11 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/trust\/compliance\/","url":"https:\/\/www.cyberark.com\/trust\/compliance\/","name":"Compliance | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/trust\/compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/trust\/compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png","datePublished":"2021-07-20T14:55:36+00:00","dateModified":"2025-01-31T22:11:01+00:00","description":"CyberArk is dedicated to many leading industry compliance and regulatory measures to ensure that our business is compliant, and your data is safe.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/trust\/compliance\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/trust\/compliance\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/trust\/compliance\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2023\/08\/iso_27001.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/trust\/compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"\u4fe1\u4efb\u4e2d\u5fc3","item":"https:\/\/www.cyberark.com\/trust\/"},{"@type":"ListItem","position":3,"name":"Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/194777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=194777"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/194777\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/pages\/131026"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=194777"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/product_category?post=194777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}