Security overview & certifications

Infotopics Apps for Tableau are built with security by design and follow internationally recognised standards to protect customer data, infrastructure, and operational processes.

This documentation is intended for:

  • IT administrators

  • Security and compliance teams

  • Architects and procurement reviewers

Security responsibilities vary depending on the deployment model (Share or Enterprise) and the product used, but the same core security principles apply across all Apps for Tableau.


ISO/IEC 27001:2022 Certification

Infotopics | Apps for Tableau is ISO/IEC 27001:2022 certified, the globally recognised standard for Information Security Management Systems (ISMS).

This certification confirms that Infotopics:

  • Identifies and manages information security risks

  • Applies formal security controls and policies

  • Continuously monitors and improves security practices

  • Is independently audited on a regular basis

The ISO certification applies particularly to Share (SaaS) deployments, where Infotopics operates and secures the hosting environment on behalf of customers.


Security governance

Infotopics maintains a structured security governance framework that includes:

  • Documented security and access policies

  • Role-based access control

  • Secure development lifecycle practices

  • Incident detection and response procedures

  • Regular internal and external security reviews

Security is treated as an ongoing process, not a one-time activity.


Secure-by-design approach

All Apps for Tableau are designed to:

  • Minimise data exposure

  • Respect Tableau’s security model

  • Avoid unnecessary data storage

  • Operate transparently within customer environments

Security whitepaper

Infotopics provides a detailed Security Whitepaper that explains how Apps for Tableau are designed, deployed, and operated securely.

The whitepaper covers:

  • Security architecture and principles

  • Tableau Extensions security model

  • SaaS (Share) and Enterprise deployment security

  • Data protection and operational safeguards

The document is intended for IT, security, and compliance reviews.

Download the Security Whitepaperarrow-up-right

Last updated

Was this helpful?