Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Supabase, your compliance team needs documented proof they can be trusted. ThirdProof investigated Supabase across 27 intelligence sources — here's what we found.
⚠ FedRAMP Status: Not found in the FedRAMP Marketplace. Vendors handling government data or CUI must be FedRAMP authorized.
27 sources queried. 100% confidence. Every Supabase investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Supabase's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 55% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q38
GitHub discussion indicates Supabase has removed all references to ISO 27001 and no longer mentions this certification.
Q41
Not found in FedRAMP marketplace
Q40
HIPAA compliance / BAA claim found on trust page (Vendor attested)
Q42
Supabase has a Data Processing Addendum (DPA) available at supabase.com/legal/dpa and provides a downloadable DPA document (Supabase+DPA+250314.pdf) that references applicable data protection laws.
+ 8 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Supabase's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Organizations with federal compliance requirements should verify this directly at marketplace.fedramp.gov.
Supabase is not listed on the FedRAMP Marketplace.
Low Risk
Vendor Risk Assessment
Based on data availability and source coverage
27
Sources Queried
26
Sources With Data
April 17, 2026
Last Assessed
AI-generated analysis for Supabase
Supabase (supabase.com) is a cloud infrastructure and Postgres development platform assessed at Tier 4 (Low Risk), reflecting a strong overall security posture with no sanctions matches, no adverse media, a clean domain reputation, and a minimal exposed attack surface. The platform demonstrates several meaningful positive signals across the assessment:
Independence Statement
All evidence underpinning this assessment was sourced independently from public registries, domain intelligence systems, threat intelligence platforms, and open media sources without any participation, input, or review by Supabase or its representatives.
4 findings identified for Supabase
3 Hacker News stories about "Supabase" related to security. Top story: "Supabase MCP can leak your entire SQL database" (848 points).
supabase.com is missing 2 recommended security headers: Content-Security-Policy, X-Frame-Options.
supabase.com received a mediocre grade (C). Some security headers are configured but improvements are needed. Note: This scan was performed on the marketing site (supabase.com). The application endpoint (app.supabase.com) may have different security headers. Verify the application domain separately.
supabase.com has certificates from 26 different Certificate Authorities. This may indicate inconsistent certificate management practices.
24 positive signals verified
No LEI Registry Match (Expected for Most Companies)
Business Registration →No Sanctions Matches Found
Sanctions & Watchlist Screening →No Adverse Media Found
Adverse Media Scan →No Adverse Media Signals
Adverse Media Scan (Fallback) →Firmographic Data Available
Company Intelligence →Valid SSL Certificate
Domain Analysis →2 Open Ports Detected
Infrastructure Exposure →Established Domain (8+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →Large Certificate Footprint (290 subdomains)
Certificate Transparency →Established Web Presence (7+ years)
Web Archive History →Domain in 3 Threat Pulses
Threat Intelligence (OTX) →Low Abuse Score: 0% (4 reports)
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →Certification Claimed: SOC 2
Trust & Compliance Page Scan →Certification Claimed: HIPAA
Trust & Compliance Page Scan →2 Subprocessors Identified
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →No Historical Adverse Media Found
Historical Media Search →HITRUST Directory Match — Manual Verification Required
Certification Registry Verification →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →Deep Document Crawler Results
Deep Document Analysis →Steps to address findings for Supabase
Request the SOC 2 Type II report and bridge letter from Supabase — Enterprise and Team plan customers can access the report directly in their Supabase dashboard; alternatively, contact Supabase's security team via https://supabase.com/security to request a copy under NDA.
If processing Protected Health Information (PHI), execute a Business Associate Agreement (BAA) with Supabase before go-live — their security page (https://supabase.com/security) indicates HIPAA compliance for hosted plans; contact their enterprise team to initiate the BAA process.
Issue internal developer guidance addressing Supabase-specific configuration risks: enforce Row Level Security (RLS) on all tables, restrict Service Role keys to server-side administrative contexts only, and prohibit exposure of API keys in client-side or version-controlled code — these risks are documented in the Hacker News discussions linked in findings.
Confirm automated TLS certificate renewal is active for supabase.com by contacting Supabase's security team within the next 30 days — the current Let's Encrypt certificate expires in approximately 51 days. Independently verify the renewal status post-expiry via https://www.SSL/TLS analysis service.com/ssltest/analyze.html?d=supabase.com.
Request a complete and up-to-date subprocessor list directly from Supabase — the publicly published list at https://trust.supabase.com/subprocessors lists only 2 subprocessors, which may not reflect the full scope of third-party data processors used in production infrastructure.
For healthcare or regulated data workloads, verify the HITRUST match at https://directory.hitrustalliance.net/search?q=Supabase directly with the HITRUST Alliance to confirm whether Supabase holds active HITRUST certification.
27 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Supabase? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Supabase on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Supabase's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Supabase a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Supabase appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Supabase's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Supabase's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Supabase claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Supabase depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Supabase appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Supabase and every other vendor in your stack — average report time: 7 minutes. Get Supabase's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Supabase across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.