Cloud Factory

Trust & Compliance

Trust, security, and compliance are at the core of how we operate as a cloud distributor. On this page, we explain how we maintain compliance and provide transparency for our Partners, covering how we handle personal data under GDPR, strengthen operational resilience and security in line with NIS2, and embed ESG into day-to-day governance. Our approach is built on clear ownership, documented processes, and effective controls to support risk management.

You will also find information about our approach to vendor due diligence and supply-chain governance, our use of audit assurances, and how we work with ongoing monitoring, risk management and training. The goal is simple: to give you a transparent view of how we manage risk, so you can confidently build your own compliance on top of ours.

L1011319

Audit reports

Cloud Factory obtains audit reports annually. The reports are prepared by an independent third party and covers Cloud Factory’s compliance with GDPR and NIS2, as well as the requirements set out in the data processing agreement.

ISAE3000 GDPR

Data Processing Agreement

You can find our standard data processing agreement below:

Data Processing Agreement

Security Measures

Supply chain security:
Due dillgence upon selection of new suppliers. We rely on established, industry-recognized service providers for hosting and functionality to our platform. These providers are certified under ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, and ISO 9001.

MFA login:
Multi-Factor Authentication (MFA) required for accessing the platform and the production environment.

Redundancy:
Full redundancy at the primary hosting and operations provider to ensure platform availability and continuous operation.

Screening:
Employee background checks upon hiring.

Logging:
Logging of access and activities across the platform and related systems.

Auditing:
Regular audits of the platform conducted by external auditors.

Procedures:
Documented procedures governing access to the production environment and customer data.

Antivirus:
Up-to-date anti-malware and antivirus protection across systems and devices.

Awareness:
Security awareness training for employees as part of onboarding and ongoing employment.

FAQ - GDPR

What is GDPR and why is it relevant?

The General Data Protection Regulation (GDPR) governs how personal data may be processed. It sets the rules for how organisations may collect, use, store, share, secure and otherwise process personal data, and requires that all processing is lawful, transparent and limited to specific purposes.

GDPR applies to any organisation that processes personal data about data subjects (people) in EU, whether the organisation acts as a data controller or as a data processor.

Why is it necessary to enter into a Data Processing Agreement with Cloud Factory?

Under GDPR Article 28(3), any processing of personal data carried out by a processor on behalf of a controller must be governed by a contract (“data processing agreement”). The agreement must specify the subject matter, duration, nature and purpose of the processing, the types of personal data, the categories of data subjects, and the rights and obligations of the controller.

When you use Cloud Factory’s license management platform, Cloud Factory processes personal data on your behalf (such as user information, access logs and account-related data). This constitutes a processor relationship under the GDPR, which requires a formal Data Processing Agreement.

It is important to note that when reselling the services to end customers, the end customers will use these services for a different purpose. Consequently, they must enter into a separate data processing agreement directly with the relevant third-party provider. Cloud Factory is not a data processor for that processing activity.

What sub-processors do Cloud Factory use in order to provide the license management platform?

We use the following sub-processors in order to provide our license management platform:

Primary sub processors

NAME

ADDRESS

DESCRIPTION OF ACTIVITES

Netic A/S

Alfred Nobels Vej 25, 9220 Aalborg Øst, Denmark.

The supplier is hosting Cloud Factory’s license management platform.

Data is stored in a secure data center facility in Denmark.

Atlassian Pty Ltd

341 George Street, Sydney, Australia.

The supplier manages support inquiries through ticketing system.

Data is stored in a secure data center facility in Germany.

Auth0 Inc.
(part of Okta)

100 1st St Suite 150, San Francisco, USA

The supplier provides multi-factor authentication for user login to verify identity and ensure access control to the license management platform.

Data is stored in a secure data center facility in Germany.

Functional Software Inc. (“Sentry”)

45 Fremont Street, 8th Floor, San Francisco, CA 94105, USA.

The supplier provides a monitoring service that enables proactive identification and resolution of frontend bugs encountered by partners.

Data is stored in a secure data center facility in Germany.

Secondary sub processors

NAME

ADDRESS

DESCRIPTION OF ACTIVITES

Microsoft Ireland

One Microsoft Court, South County Business Park, Leopardstown, Dublin 18

Information regarding Microsoft’s suppliers and data hosting setup can be found in Microsoft’s public documentation. Documentation may be product specific. For more information, please see the links below.

Adobe Ireland Limited

6 Riverwalk, Naas Road
24, Dublin, Ireland

Information regarding Adobe’s suppliers and data hosting setup can be found in Adobe’s public documentation. Documentation may be product specific. For more information, please see the links below.

Impossible Cloud GmbH

Friesenweg 12, Haus 5
22763 Hamburg Germany

Information regarding Impossible Cloud’s suppliers and data hosting setup can be found in Impossible Cloud’s public documentation. Documentation may be product specific. For more information, please see the links below.

Twingate Inc.

Redwood, 541 Jefferson Ave, Suite 100, United States

Information regarding Twingate’s suppliers and data hosting setup can be found in Twingate’s public documentation. Documentation may be product specific. For more information, please see the links below.

Keepit A/S

Per Henrik Lings Allé 4, 7,

2100 København,

Denmark

Information regarding Keepit’s suppliers and data hosting setup can be found in Keepit’s public documentation. Documentation may be product specific. For more information, please see the links below.

ESET spol. s.r.o

Bratislava, Aupark Tower, 16th Floor, Einsteinova 3541/24, Slovakia

Information regarding ESET’s suppliers and data hosting setup can be found in ESET’s public documentation. Documentation may be product specific. For more information, please see the links below.

Exclaimer ltd.

3rd Floor, 250 Fowler Avenue, Farnborough, Hampshire, GU14 7JP, United Kingdom

Information regarding Exclaimer’s and data hosting setup can be found in Exclaimer’s public documentation. Documentation may be product specific. For more information, please see the links below.

Dropbox Ireland ltd.

70 SIR JOHN ROGERSON'S QUAY, DUBLIN 2Ireland

Information regarding Dropbox’s suppliers and data hosting setup can be found in Dropbox’s public documentation. Documentation may be product specific. For more information, please see the links below.

Acronis International GmbH

Rheinweg 9

8200,

Schaffhauen

Switzerland

Information regarding Acronis’ suppliers and data hosting setup can be found in Acronis’ public documentation. Documentation may be product specific. For more information, please see the links below.

Read more about our supplier structure here.

Does Cloud Factory maintain GDPR-risks assessments to evaluate the security of the processing?

Cloud Factory regularly updates written risk assessments covering processing activities related to the license management platform. These assessments evaluate risks to confidentiality, integrity and availability, identify relevant threats and vulnerabilities, and document the technical and organizational measures implemented in accordance with GDPR Article 32. The risk assessments are internal and confidential documents, but are reviewed by external auditors during our annual ISAE3000 audit.

Where is Cloud Factory's platform hosted?

Cloud Factory’s license management platform is hosted in Denmark by Netic, a Danish infrastructure provider operating ISO 27001-certified data centres. All primary systems, production environments and backups are stored within Netic’s facilities.

What is Cloud Factory's retention periods for personal data processed in the platform?

Partner inactivity and offboarding

For Partners with zero license consumption for at least six consecutive months, Cloud Factory may, after prior notice to the Partner, deactivate and subsequently delete the Partner’s platform access, as such inactivity typically indicates silent churn.

If a Partner notifies us that they are transitioning to another distributor or otherwise terminating the relationship, and requests deletion of personal data, Cloud Factory will delete the relevant personal data within the agreed timeframe.

User accounts

Cloud Factory deletes platform user accounts that have been inactive for 24 consecutive months, or earlier if requested by the Partner. This deletion includes the user’s platform data and the personal data associated with the individual user profile.

Certain information may, however, be retained where we have an obligation or another legitimate reason to do so, for example in connection with ongoing license consumption, billing, security logging, dispute handling, or an active Partner relationship that requires the user to maintain access. In such cases, the data is kept for as long as these purposes apply.

Does Cloud Factory have data processing agreements in place with all sub processors relevant for providing the license management platform?

Yes. We enter into data processing agreements with all sub processors that process personal data on our behalf.

This is tested by an external auditor on a yearly basis and documented in our ISAE3000 audit report.

How does Cloud Factory ensure that suppliers comply with applicable GDPR requirements?

We rely on our internal vendor-management framework. This includes:

  • Pre-contract assessments, including evaluation of security measures, certifications, sub-processor lists, and data-flow implications.

  • Contractual safeguards, such as data processing clauses, confidentiality, and restrictions on international transfers.

  • Continuous monitoring, including annual reviews of certifications (e.g., ISO, ISAE, SOC), TIA updates, and documented reassessments when there are material changes.

This is reviewed by an external auditor on a yearly basis and documented in our ISAE3000 audit report.

How does Cloud Factory document compliance with the data processing agreement and the GDPR?

We maintain documented evidence of our compliance framework, including but not limited to:

  • Independent assurance reports, such as an ISAE 3000 report or equivalent third-party audits covering security, access control, governance and data protection processes.

  • Internal governance documentation, including data flow mappings, retention schedules, access logs, incident procedures and records of policy reviews.

  • Records of processing activities (RoPA) covering all relevant data-processing purposes.

  • Documented risk assessments for systems and processing activities.

  • Evidence of technical and organisational measures, which are regularly reviewed and updated.

How does Cloud Factory make sure your employees are adequately trained in data protection?

We consider data protection training as an integrated part of the employee journey. All new employees complete mandatory onboarding training in data protection, information security and our internal policies. This includes practical guidance on handling customer data, use of tools, and how to recognise and report incidents.

During employment, we follow up with regular awareness activities and refresher training to keep knowledge up to date and adapted to the employee’s role. This may include e-learning, targeted sessions for specific functions (e.g. support, development, sales) and periodic tests or campaigns. Completion of training is logged so we can document to management and external auditors that employees have received and maintained the necessary competencies in data protection.

FAQ - NIS2

What is NIS2, and who does it apply to?

NIS2 is a cybersecurity directive aimed at strengthening the resilience of essential and important entities across the Union.

The directive applies to organisations operating in sectors considered critical to society or the economy, such as digital infrastructure, cloud services, managed service providers, public administration, finance, and healthcare. Whether an organisation is in scope depends on its sector, size, and overall criticality.

While entities may not be directly subject to NIS2, the directive requires in-scope entities to manage and document cybersecurity risks throughout their supply chain. Consequently, suppliers are indirectly affected because customers increasingly need to:

  • assess the security posture of key vendors,

  • obtain documentation demonstrating adequate technical and organisational controls,

  • ensure appropriate contractual safeguards are in place, and

  • monitor supplier risks on an ongoing basis.

This creates a practical expectation that suppliers align with NIS2-level security standards, even if they are not legally in scope.

What security and governance requirements does NIS2 introduce?

The NIS2 directive strengthens and harmonises cybersecurity requirements for essential and important entities in EU. In-scope entities must establish a structured risk management approach that includes, at a minimum:

  • Technical and organisational cybersecurity measures, such as access control and authentication, encryption, network segmentation, vulnerability and patch management, secure development practices, logging and monitoring, and robust backup and recovery strategies.

  • Governance and management involvement, including clear allocation of security responsibilities, board-level oversight, regular reporting on cyber risks, and explicit accountability for management bodies.

  • Incident handling procedures, covering detection, analysis, containment, recovery and mandatory notification of significant incidents to the competent authorities within prescribed timelines.

  • Supply-chain and third-party risk management, requiring organisations to identify, assess and continuously monitor risks arising from vendors, outsourcing arrangements and other digital service providers that support critical processes.

  • Business continuity and crisis management, including disaster recovery planning, continuity of critical services, and tested response plans for major cyber incidents.

NIS2 is risk-based, meaning each in-scope entity must determine and implement security measures that are appropriate to its specific risk profile, threat landscape, size, and operational context. This means the directive does not prescribe a single technical setup, but expects a defensible, documented rationale for how risks are identified, mitigated and monitored over time.

How does Cloud Factory document security and compliance efforts?

We document our security controls and compliance posture through an information security management framework. This includes:

  • Policies and procedures, updated regularly and aligned with recognised standards.

  • Risk assessments covering internal operations as well as dependencies on vendors and critical systems.

  • Audit reports, such as ISAE 3000/3402 reports and internal reviews.

  • Incident logs and response procedures.

  • Vendor due diligence reports and continuous monitoring of suppliers.

  • Documentation of technical controls, such as access rights, logging, backup strategies, and update/patch management.

What is Cloud Factory's approach to supplier management?

We have implemented a vendor-management framework. This includes:

  • Pre-contract assessments, including evaluation of security measures, certifications, sub-processor lists, and data-flow implications.

  • Contractual safeguards, such as data processing clauses, confidentiality, and restrictions on international transfers.

  • Continuous monitoring, including annual reviews of certifications (e.g., ISO, ISAE, SOC) and documented reassessments when there are material changes.

Does Cloud Factory have external security audits?

We will undergo our first external NIS2 audit in May 2026. After that external audits will be conducted on a yearly basis.

How does Cloud Factory ensure secure development of the platform?

We apply secure development practices including code reviews, automated security scanning, monitoring, separation of environments, and controlled deployment processes. This is reviewed during external and internal audits.

What service levels apply to the platform?

Our service levels follow the SLAs defined for our platform and support services. Partners can download the applicable SLA documentation directly from the Partner Portal.

FAQ - ESG

What is ESG, and why does it matter?

ESG refers to the environmental, social, and governance factors that organisations are expected to manage as part of responsible and sustainable business practices.

For a technology-focused organisation like Cloud Factory, ESG extends beyond environmental considerations to include data governance, security, operational resilience, diversity, and ethical business conduct.

Is Cloud Factory subject to CSRD reporting requirements?

Cloud Factory is not directly in scope of the Corporate Sustainability Reporting Directive (CSRD). However, because ESG is an important element of good corporate governance and increasingly relevant to our stakeholders, we have prepared a voluntary ESG report based on the VSME standard for small and medium-sized enterprises.

Our voluntary ESG report can be downloaded here.

How does Cloud Factory assess ESG risks?

We conduct regular ESG risk assessments covering:

  • environmental footprint,

  • workplace rights and employee well-being,

  • diversity and inclusion,

  • supply-chain risks,

  • governance, ethics, and compliance,

  • operational resilience and data protection.

Risks are prioritised based on likelihood, impact, and dependency, applying the same structured methodology we use in information security and compliance.

Has Cloud Factory ESG policies in place?

Yes. We maintain documented ESG-related policies, including environmental practices, diversity and inclusion, ethical conduct, anti-corruption, and governance procedures. These policies are reviewed and updated regularly to reflect regulatory developments and best practice.

How does Cloud Factory manage ESG risks in the supply chain?

Suppliers are evaluated through our vendor-management process that includes due diligence, documentation review, contractual safeguards, and ongoing monitoring.
We expect suppliers to maintain appropriate environmental, social, and governance standards and to provide transparent evidence of compliance in accordance with our Supplier Code of Conduct.

FAQ - Partner Agreement

What notice period applies if the Partner (customer) wants to terminate the agreement?

As a Partner, you are free to terminate the agreement at any time. Our business model is based on flexibility and on the expectation that Partners choose, and remain with, Cloud Factory because of the value and services we deliver, not because they are locked in.

Does the Partner Agreement apply to all products in the Cloud Factory portfolio?

The Partner Agreement applies to all products and services that are made available through Cloud Factory’s license management platform, unless otherwise expressly stated. For each individual cloud service, the underlying vendor’s own terms, product conditions and data protection documentation will apply in addition to the Partner Agreement.

How does the Partner Agreement and the vendor's product terms apply together?

The Partner Agreement governs the overall relationship between Cloud Factory and the Partner, including access to the platform, ordering and management of services, billing, data protection between Cloud Factory and the Partner, and general rights and obligations.

For each individual cloud service, the vendor’s own product and service terms apply to the use of that specific service. This typically covers:

  • the service description and functionality

  • licence conditions and usage rights

  • service levels and support obligations

  • the vendor’s own data protection and security commitments

  • acceptable use and any export or sanctions restrictions

In practice, this means:

  • For matters between Cloud Factory and the Partner (e.g. invoicing, platform access, our liability and role), the Partner Agreement applies and takes precedence.

  • For matters relating to the specific cloud service and the relationship between the vendor, the Partner and/or the end-customer, the vendor’s terms apply.

Cloud Factory does not change or override the vendors’ product terms. Partners should always review the relevant vendor terms and privacy documentation when deciding how to offer and configure a service for their end-customers.

How are claims from end-customers handled and should they be directed to the Partner or Cloud Factory?

The contractual relationship for the cloud services is between the Partner and its customers ("end-customers"). Claims from end-customers (including service issues, credits, refunds and similar) should be directed to and handled by the Partner.

If a claim relates to matters for which Cloud Factory is responsible under the Partner Agreement, the Partner may raise a corresponding claim with Cloud Factory in accordance with the agreement. End-customers do not have a direct contractual relationship with Cloud Factory.

FAQ - Distribution vendors

What is a "distribution vendor"?

When we refer to distribution vendors in this context, we mean the third-party providers whose cloud services and software products are provisioned via the Cloud Factory platform by our Partners to their end-customers.

These are not our own infrastructure or tooling providers, but the upstream vendors behind the products you can order, manage and bill through our platform.

Who are Cloud Factory's distribution vendors?

Cloud Factory’s distribtion vendors can be found here.

Where is data processed when using cloud services from distribution vendors?

Data processing locations are determined by the individual distribution vendor and by how the specific product is configured and used. In practice, this depends on factors such as:

  • which region or data centre is selected during setup

  • how tenants, environments, logging and backups are configured

  • which features, integrations and add-ons are enabled

Many distribution vendors offer hosting options within the EU/EEA. Where data is transferred outside the EU/EEA, vendors will typically rely on recognised safeguards (such as adequacy decisions or standard contractual clauses).

Because these details, and the impact of your configuration choices, vary from product to product, Partners should always refer to the vendor’s own documentation (e.g. data processing agreements, security and privacy pages, regional setup guides) for precise information about data flows and locations.

To support this, Cloud Factory has prepared an overview containing links to each distribution vendor’s processing and compliance information, so Partners can quickly find more detail on where and how data is processed for the individual services they use. This overview can be found here.