NetApp Instaclustr Security Overview

Product and customer data security is of utmost importance at NetApp. NetApp Instaclustr follows security best practices throughout the service lifecycle to ensure customer information and data is secured in the best possible way.

For detailed control evidence, refer to the SOC 2 Type II report, available via the NetApp Trust Center.

Shared Responsibility

NetApp operates under a shared responsibility model with three parties:

  • Cloud providers secure the underlying infrastructure — physical data centres, hypervisors, and network fabric.
  • NetApp secures the platform — hardened nodes, patching, monitoring, backups, and incident response.
  • You secure your data and access — firewall rules, encryption, and user management.

Security is a partnership. NetApp can harden the platform, but open firewall rules or disabled encryption create gaps only you can close.

Customer responsibilities, including firewall configuration, encryption enablement, and capacity planning are documented in the Instaclustr Service Specific Terms.

NetApp reviews each supported cloud provider’s SOC 2 and PCI reports at least annually — customers should also review their chosen provider’s SOC 2 and PCI report to verify it meets their requirements.

The NetApp SOC 2 report includes Complementary User Entity Controls (CUECs) for a full view of shared obligations, available via the NetApp Trust Center.

Compliance

NetApp performs independent third-party audits and validations from external licensed CPA firms of its security, processes, and services.

Certification What It Covers
SOC 2 Type II Security, availability, and confidentiality controls — evaluated over a sustained period
PCI DSS Payment card data protection standards for PCI-enabled clusters
ISO 27001 and ISO 27018 Information Security Management System and cloud privacy and protection of personal data

NetApp conducts an annual risk assessment covering security, availability, and confidentiality threats. Independent penetration testing is performed twice annually. SOC reports for cloud subservice providers are reviewed annually. Where gaps are identified, NetApp remediates and is re-assessed.

Reports are available via the NetApp Trust Center.

Subservice Organizations

NetApp relies on trusted subservice providers and evaluates their security posture regularly.

Clusters run on AWS, Azure, or GCP. Cloud providers are responsible for physical security, hypervisor isolation, and environmental controls. NetApp applies consistent security configurations on top and reviews provider SOC 2 reports annually. Cloud provider regions are verified for compliance coverage before being added to services.

Operational suppliers are assessed under the NetApp Supplier Risk Management program. For on-premises or customer-owned infrastructure, customers are responsible for physical security and environmental controls.

For the full list of subservice organisations, refer to the SOC 2 report.

NetApp Security Advisories

You can view available security advisories here.

Want More Detail?

Resource Location
SOC 2 Type II Report NetApp Trust Center
Support Documentation support.instaclustr.com
Security & Compliance Questions [email protected]
Service Status status.instaclustr.com