Learn How Procore Protects Your Data in the Cloud Watch Now
Security and Data Governance Standards

Keep your data secure and compliant.

See how our best-in-class security program safeguards your data, manages risk, and helps you meet compliance standards—without compromising productivity.

Compliance at Procore


SOC 1 (Type 2)

Report on Fairness—internal control over financial reporting.


SOC 2 (Type 2)

Trust Service Principles—security and confidentiality.

ISO logo

ISO 27001:2013

Information Security Management System (ISMS) for any kind of digital information.

Download Certificate

Run your business on a secure, reliable cloud.

Trust in a global partner that supports you wherever you are, powered by a platform with world-class infrastructure, security, and privacy built into every layer.

  • Data encryption at rest and data in transit
  • Rely on 16 secure global file storage locations
  • Stay up and running with 99.9% uptime for Procore's services
  • See detailed information about Procore's current system status
Check System Status
Illustration of mobile phone connecting to the cloud

Control access to your information.

Take advantage of a robust set of security and data protection platform features that give you the tools you need to manage your security.

  • Secure authentication and password protection
  • Enable Single Sign-On (SSO) via Security Assertion Markup Language (SAML)
  • Configure role-based permissions to control access to project data
Several construction workers gathered around a tablet

Meet privacy standards and control project data.

Get the flexibility you need to control the contents of your Procore account(s) and extract data without custom code. Comply with global privacy standards including:

  • California's Consumer Privacy Act (CCPA)
  • General Data Protection Regulation (GDPR)
  • Australia's Privacy Act of 1988
See Privacy Notice
Procore security badge illustration

Multiple layers of defense.

To meet new challenges and demands, Procore continues to invest in broad initiatives that help ensure optimal security across our platform.

  • All Procore applications are scanned for vulnerabilities and patched, including but not limited to, vulnerabilities identified in the Open Web Application Security Project Top 10
  • Procore employs countermeasures and technologies to prevent and dissuade attackers
  • Strict access control policies
  • Ongoing security training program to keep our teams current on the latest security innovations throughout the industry
Construction worker looking at iPad

Named #1 in JBKnowledge's 2021 ConTech Report

Schedule a personal walkthrough to see how putting our customer's security first made us the leading construction management platform.


Countries Served Worldwide


Users Worldwide


Projects Built with Procore




How does Procore store customer information?

For documents, photos, and attachments that users upload, Procore leverages Amazon Web Service's (AWS) highly secure data centers, S3 (Amazon Simple Storage Service). Amazon Web Services provides enterprise-class tools that have been proven to be both reliable and secure for today's web-based applications.

What encryption standard does Procore use to protect user data?

Procore employs many of the same data encryption standards, which are widely used by large online banking services. Data at rest is encrypted and stored in a secure, private cloud infrastructure.

How does the Transport Layer Security v1.2 requirement impact users?

Procore relies on the Transport Layer Security TLS v1.2 protocol for ensuring user interaction with Procore over the internet occurs securely without transmissions being vulnerable to outside entities. The cipher suite uses: ECDHE for key exchange, RSA for authentication, AES 128 for encryption, and SHA256 for hashing

What is Procore's data backup strategy?

Procore maintains a robust “high-availability” strategy to protect our customers against software problems, hardware failure, and even large-scale natural disasters. Procore maintains several replicas of the application software on each server. All data are copied to off-site storage regularly. Replication distributes this offline snapshot across the United States. We maintain the software on dozens of servers and remote copies are maintained in different secure data centers. This diversity protects against hardware failure and local service issues.

How is security handled with third-party applications?

Procore employs what many consider the industry standard for API authorization - OAuth 2.0. The OAuth 2.0 authorization framework provides a secure means of authorizing and authenticating access to user data for third-party applications. OAuth 2.0 relies on SSL (Secure Sockets Layer) to ensure data transfer between the web server and browsers remains private and is kept safe. OAuth 2.0 is designed to protect Procore user data by providing access without revealing the identity of the user. Third-party applications make requests on behalf of the user without accessing passwords and other sensitive information.

Procore secures 3rd party application access to customer data with 3 methods:

  • Applications can only be installed by a user who has authenticated successfully and has the correct permissions of company administrator as defined by the RBAC model for the account.
  • When an application is installed, an OAUTH2 token is generated to authorize a specific scope for data access based on what the application needs to function.
  • Data transfers via API are secured with TLS 1.2 as described above.

How does information stay secure?

Any data being transferred is encrypted, which means the information is converted to a code that can only be understood at the other end, at its intended destination. Procore follows some of the strongest industry standards for encryption. We use firewalls, which block unauthorized access to information while enabling outward communication. Data is encrypted when it is stored on servers, as well.

How does Procore ensure ongoing access to my data?

Ensuring access to business information is one of the greatest benefits to using a cloud-based service. Backup copies of information are kept in alternate locations in case of a disaster, which is known as redundancy. And the software is scanned for any anomalies to detect coded threats, without actually reading the information. We have a dedicated team to monitor and respond to network threats, rather than a customer trying to do it all on their own. Procore has a set of procedures to follow called an Incident Response Plan to help ensure business continuity to our users.

Are there any industry certifications or standards that Procore follows to demonstrate that we follow best practices?

First, there are IT security management standards, which you could compare to the kinds of standards you see around building or manufacturing. (ISO) 27001:2013 Is a framework for confidentiality, integrity and availability of information as well as legal compliance. SSAE18 SOC 2 Speaks to how we maintain confidentiality and security of data. Procore also engages third parties to review our program through an exercise called Penetration and Vulnerability Testing, as well as auditing and ensuring compliance with a number of industry standards. Next, Procore helps Customers meet their data protection regualtory requirements around what personal information can be collected, how it can be used, and who can access it.

Report a Security Vulnerability

If you believe Procore has a security vulnerability, please contact us right away. In your report, please include a description of the vulnerability and information to reproduce the vulnerability (including browser/OS versions, URLs, etc).

Contact Procore Security