Security and Compliance

Have more questions? Submit a request
Last Updated: August 24, 2023

We take security, compliance, and the protection of our customers' data very seriously at DroneDeploy. We are committed to securing your data and earning your trust. We use a variety of industry-standard technologies and best practices to secure our customers' data. To ensure we’re building trust amongst our customers, we considered it paramount to achieve the highest standards when it comes to security.

As a company, we value transparency as a core principle and as such share details about how we handle security at DroneDeploy. If you have any questions regarding security, we are happy to answer them at



The following security-related audits, certifications, regulations apply to DroneDeploy:

SOC 2 Type 1

DroneDeploy has received SOC 2 Type 1 Certification. SOC (System and Organization Controls) is an American standard that belongs to AICPA (the American CPA association). US public companies and companies that target the US market rely on SOC to help ensure that the services they use meet security and availability requirements. SOC 2 Type 1 Report for DroneDeploy is complete and available for customers and prospects. The SOC 2 report includes management’s description of DroneDeploy’s trust services and controls as well as the independent auditor’s opinion of DroneDeploy’s system design.

SOC 2 Type 2

Type II is more comprehensive than Type 1 and covers the details of established security controls and policies to ensure companies rigorously apply and adhere to those standards without exceptions.

ISO 27001

DroneDeploy has achieved ISO 27001 compliance which is the internationally recognized standard for information security management controls. You can download the ISO 27001 certificate here. A copy of the Statement of Applicability is available upon request from your Sales Account Executive.


DroneDeploy's payment and credit card information is handled by Stripe and Chargify. Stripe and Chargify have been audited by an independent PCI Qualified Security Assessor (QSA) and are certified as a PCI Level 1 Service Provider. This is the most stringent level of certification available in the payments industry.

We are a PCI Level 4 Merchant and have completed the Payment Card Industry Data Security Standard’s SAQ-A, allowing us to use a third party to process your credit card information securely.

Privacy Shield

DroneDeploy complies with the EU-U.S. Privacy Shield Framework and the Swiss-U.S. Privacy Shield Framework (Privacy Shield) as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information transferred from the European Union and the United Kingdom and/or Switzerland, as applicable to the United States in reliance on Privacy Shield. DroneDeploy has certified to the Department of Commerce that it adheres to the Privacy Shield Principles with respect to such information. If there is any conflict between the terms in this privacy policy and the Privacy Shield Principles, the Privacy Shield Principles shall govern. To learn more about the Privacy Shield program, and to view our certification, please visit

  • Notice
  • Choice
  • Accountability for Onward Transfer
  • Security
  • Data Integrity & Purpose Limitation
  • Recourse, Enforcement & Liability

DroneDeploy commits to cooperate with EU data protection authorities (DPAs) and comply with the advice given by such authorities with regard to human resources data transferred from the EU in the context of the employment relationship.


DroneDeploy is committed to complying with the General Data Protection and Regulation (GDPR). DroneDeploy has a dedicated security & privacy program and works diligently to follow the guidance from privacy-related regulatory bodies in the EU to incorporate any changes in the regulations. 


Because of our commitment to the privacy and security of all of our customers' data, we have applied the privacy and security controls necessary for GDPR compliance across the board to all DroneDeploy customers at no additional cost.


For customers processing information on behalf of EU and Swiss citizens, DroneDeploy offers a Data Processing Addendum. DroneDeploy is a processor of your customers, and you are the controller. To make sure that you are in compliance, you should take the following steps:


* Perform your own research and seek legal advice on how GDPR regulations apply to your business

* Contact for additional information 

* Update your EU contact details within your account settings in DroneDeploy 

* Accept the latest Terms and Conditions and Privacy Policy within your accounts settings in DroneDeploy.



Data Encryption In Transit and At Rest

All data is sent securely to DroneDeploy via the HTTPS protocol using the latest recommended ciphers and TLS protocol. All customer data encrypted at rest on DroneDeploy servers.

Physical Access

DroneDeploy hosts its data in Amazon Web Services and Google Cloud. DroneDeploy employees do not have physical access to the Amazon or Google data centers, servers, network equipment, or storage.

AWS provides physical data center access only to approved employees. All employees who need data center access must first apply for access and provide a valid business justification. These requests are granted based on the principle of least privilege, where requests must specify to which layer of the data center the individual needs access, and are time-bound. Requests are reviewed and approved by authorized personnel, and access is revoked after the requested time expires. Once granted admittance, individuals are restricted to areas specified in their permissions.

According to the Google Security Whitepaper: “The data center floor features laser beam intrusion detection. Data centers are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders. Access logs, activity records, and camera footage are reviewed in case an incident occurs. Data centers are also routinely patrolled by professional security guards who have undergone rigorous background checks and training.”

Penetration Testing

DroneDeploy undergoes annual network and system level penetration tests from an outside security vendor to test for vulnerabilities. In the event of a vulnerability, the issue is tracked in an internal issue tracking management system with SLAs for resolution depending on the severity of the issue.


Data Residency / Regionalization 

Several privacy regulations require the localization of regulated data, such as personal information, within a particular region or country (i.e., Australia, EU/UK). To meet this need, DroneDeploy also offers the option to store and process their data exclusively within secure data centers located in South Korea, the United Kingdom, and Australia. This includes the imagery provided by the customers, processed data, and the generated assets.

In more detail, all data for processing or display is then uploaded to a Google Cloud Storage bucket located in the customer’s local region. From here, the data is transferred, with encryption, to Google Cloud servers in the customer’s local region for processing. Any outputs resulting from processing, such as maps or models, are pushed to a Google bucket in the customer’s local region. Metadata and other data entered into the platform are stored in databases located in a US-based server.
Please note that all customer data is stored in US data centers unless explicitly agreed upon in the customer contract. Please work with your DroneDeploy customer success and account executive team to learn more.

Application Security

Login Security

In addition to password-based logins, DroneDeploy provides Google single sign-on for all accounts allowing you to use Google or GSuite accounts to authenticate users requiring two-factor authentication. Google logins can be protected by multiple 2FA mechanisms including access codes or security keys.

Single Sign-On

Enterprise users can use Single Sign-On functionality to authenticate against multiple provider types including Active Directory Federation Services, Google Apps, Microsoft Office 365, PingFederate, and Azure Active Directory. DroneDeploy also provides integration via SAML2.0 compliant identity providers.

Audit Controls

Enterprise administrations can view and export audit logs of activity that occurs within their DroneDeploy. The activity log contains data on primary interactions with functionality within the user's organization including the action, object type, details, and date of the interaction.

Enterprise administrators also can view any data that has been created across their organization and view any outside sharing that has occurred in their account for data loss prevention purposes.

Product Security

DroneDeploy adheres to the principles of secure by design and privacy by design through our Secure Development Lifecycle. The DroneDeploy SDL incorporates key components from the industry standard Security Development Lifecycle models such as the Microsoft Security Development Lifecycle and OWASP Software Application Maturity Model.

DroneDeploy's software design phase introduces security and privacy requirements in the design phase of the project. All engineers at DroneDeploy are required to undergo application security training prior as part of their employment.

Before the completion of a software component, the component undergoes a security risk assessment which determines the level of risk for a component. The risk analysis leverages best practices from the OWASP Top 10 as well as language and infrastructure specific best practices that are unique to the DroneDeploy environment. Based on this analysis, each project has a set of requirements that must be fulfilled before the project going into production.

All features and functionality go through a security review process. Our code is audited with automated static analysis software, tested, and manually peer-reviewed prior to being deployed to production. Once deployed, our applications go through regular penetration testing to verify the security and safety of the application in production.

Account Deletion

If you want DroneDeploy to delete your account, please send an email to You must provide DroneDeploy with reasonable identity verification details prior to us processing any deletion requests. DroneDeploy is not liable in connection with any deletion requests or if your identity cannot be sufficiently verified in DroneDeploy’s sole discretion.

Corporate Security

Workstation and Mobile Management

All workstations used to access DroneDeploy systems must are configured to comply with our internal standards for security. Our default configuration requires all devices to have full-disk encryption, strong passwords, and by locked when idle. Workstations are required to be kept up to date with the latest system security patches.

All mobile devices connecting to DroneDeploy internal networks are protected by Mobile Device Management. DroneDeploy employs a number of security standards for all mobile devices accessing the internal network including all users must authenticate with multi-factor authentication, devices must be kept up to date with manufacturer or network provided patches, and all devices must have encrypted storage.

Risk Management

DroneDeploy utilizes ISO/IEC 27005:2011, Information technology - Security techniques - Information security risk management, to guide the company’s risk assessment activities as specified by the company's Risk Management Policy. DroneDeploy’s risk assessment framework follows a 9 step procedure for dealing with risks including the identification, evaluation, and mitigation of risks.

Records of the risk assessment are kept by DroneDeploy’s Information Security Council.

Information Security Policies

DroneDeploy follows an internal set of security policies and controls that are reviewed annually by the Information Security Steering Committee. The following policies can be made available to DroneDeploy Enterprise customers upon request:

  • Information Security
  • Remote Access
  • Mobile Device Security
  • Incident Management
  • Risk Assessment
  • Information Security Scope and Organization
  • Asset Management

Disclosure Policy

DroneDeploy follows the incident handling and response process recommended by SANS, which includes identifying, containing, eradicating, recovering from, communicating, and documenting security events. DroneDeploy notifies customers of any data breaches as soon as possible via email or phone call. DroneDeploy Enterprise plans include a dedicated customer success manager who holds responsibility for customer communication.

DroneDeploy provides a report of operational uptime via Users can subscribe to updates via email from the status page.

Articles in this section

Was this article helpful?
0 out of 0 found this helpful