• Standardised Information Gathering Questionnaire (SIG)
  • Consensus Assessments Initiative Questionnaire (CAIQ)

View the trust and transparency portal

In an effort to protect our digital ecosystem, we look forward to working with customers, users and security researchers to responsibly report any perceived or potential security issues they may discover.
 

Report security bug

  • Read the Equinix Global Information Security Policies

View the trust and transparency portal

  • View our BitSight Executive Report and Statement

View the trust and transparency portal

  • Annual Mandatory Security Awareness Training
  • Phishing Training Program

Learn about Security Awareness Center

As businesses adopt more service offerings, including Equinix’s portfolio of datacenter and digital services, it is critical to understand the division of responsibility for various parts of IT architectures that include Equinix services. Equinix provides a published shared responsibility model that aims to provide clarity to customers and partners as they leverage Equinix’s services to design and implement mission critical, secure and reliable IT architectures.

 

View documentation

We adapt policies, standards, processes, and procedures in accordance with evolving data privacy laws and regulations as they apply to us, as well as when our product portfolio and services evolve.

Read our privacy statement

SECURITY-FIRST APPROACH

Cybersecurity and Data Privacy

Our customers include some of the largest companies in the world. Their trust in the physical and data security environment for the equipment they deploy in our data centres is very important to us.  We are dedicated to implementing privacy by design throughout our company, enhancing resilience, enhancing capabilities and fostering a culture of speed, agility and a commitment to the user and customer experience.

Read More

Compliant, secure data centres across the world

We use advanced security capabilities, techniques and procedures to control and monitor access to our data centres. Each authorised visitor passes through five security checkpoints that include 24/7 manned security stations, mantraps, biometric readers and a robust set of cybersecurity measures.

View data centre design

Transparency in strategy and operations

We actively share our progress by responding to numerous surveys, audits and customer requests throughout the year. Our world-class Federated API framework provides real-time insight into the security controls protecting customers and their digital ecosystems.

Give Feedback