Skip to content

NODES AI: Online Conference for Graph + AI - April 15, 2026 | Register Today

The Neo4j Graph Platform – The #1 Platform for Connected Data
Neo4j logo
  • Products
    • GRAPH DATABASE
    • Neo4j AuraDB Fully managed graph database as a service
    • Neo4j Graph Database Self managed, deploy anywhere graph database
    • GRAPH ANALYTICS
    • Neo4j Aura Graph Analytics Fully managed graph analytics as a service
    • Neo4j Graph Data Science Self managed graph algorithms and ML modeling
    • GRAPH AI
    • Neo4j Aura Agent A single console to manage all your DB instances
    • GRAPH TOOLS
    • Neo4j Fleet Manager A single control plane to manage all your DB instances
    • Neo4j Bloom Easy graph visualization and exploration
    • PARTNER SOLUTIONS
    • Neo4j Graph Analytics for Snowflake Fully managed graph analytics within Snowflake AI Data Cloud
    • Neo4j Graph Intelligence for Microsoft Fabric Fully managed graph database and analytics integrated in Fabric
  • Use Cases
    • AI Systems Back your LLMs with a knowledge graph for better business AI
    • Industries and Use Cases Fraud detection, knowledge graphs, financial services, and more
    • Customer Success Stories Case studies, customer videos, proof points, and more
  • Developers
    • Developer Center Best practices, guides, tutorials, and downloads
    • GraphAcademy Free online courses and certifications. Join the 100K+ Neo4j experts.
    • DEVELOPERS
    • Deployment Center Deploy Neo4j on any cloud or architecture
    • Documentation Manuals for Neo4j products, Cypher, and drivers
    • Developer Blog Deep dives into more technical Neo4j topics
    • Community A global forum for online discussion
    • DATA SCIENTISTS
    • Data Science Documentation Manuals for the Graph Data Science library
    • Graph Data Science Home Learn what Neo4j offers for data science
    • Get Started With Graph Data Science Download or get started in Sandbox today
    • Data Science Community A global forum for data-driven professionals
  • AI Systems
  • Learn
    • LEARN
    • Documentation Manuals for Neo4j products, Cypher, and drivers
    • GraphAcademy Free online courses and certifications
    • Resource Library White papers, datasheets, and more
    • Customer Success Stories Case studies, customer videos, proof points, and more
    • CONNECT
    • Neo4j Events Hub Live and on-demand events, training, webinars, and demos
    • Neo4j Blog Announcements, guides, and best practices
    • Neo4j Video Hub Covering graph databases, data science, analytics & AI
    • FEATURED EVENTS
    • GraphSummit 2026 Graphs + AI: Transform Your Data Into Knowledge
    • NODES AI 2026 Virtual Conference Dedicated to Graph + AI
  • Pricing
  • QUICK LINKS
  • Partners
    • Find a Partner
    • Become a Partner
    • Solution Partners
    • OEM Partners
    • Technology Partners
    • Partner Portal Login
  • Company
    • About Us
    • Newsroom
    • Awards and Honors
    • Graphs4Good
    • Careers
    • Culture
    • Leadership
  • Support
  • Aura Login
Get Started Contact Us
  • Aura Login
  • Partners
    • Find a Partner
    • Become a Partner
    • Solution Partners
    • OEM Partners
    • Technology Partners
    • Partner Portal Login
  • Company
    • About Us
    • Newsroom
    • Awards and Honors
    • Graphs4Good
    • Careers
    • Culture
    • Leadership
  • Support
  • Search
Neo4j logo
  • Products
    GRAPH DATABASE
    • \"menu
      Neo4j AuraDB Fully managed graph database as a service
    • \"menu
      Neo4j Graph Database Self managed, deploy anywhere graph database
    GRAPH ANALYTICS
    • \"menu
      Neo4j Aura Graph Analytics Fully managed graph analytics as a service
    • \"menu
      Neo4j Graph Data Science Self managed graph algorithms and ML modeling
    GRAPH AI
    • \"menu
      Neo4j Aura Agent A single console to manage all your DB instances
    PARTNER SOLUTIONS
    • \"menu
      Neo4j Graph Intelligence for Microsoft Fabric Fully managed graph database and analytics integrated in Fabric
    • \"menu
      Neo4j Graph Analytics for Snowflake Fully managed graph analytics within Snowflake AI Data Cloud
    Graph Tools
    • Neo4j Fleet Manager A single control plane to manage all your DB instances
    • Neo4j Bloom Easy graph visualization and exploration
  • Use Cases
    • AI Systems

      Back your LLMs with a Knowledge Graph for better business AI

      Learn More

    • Industries and Use Cases

      Fraud detection, knowledge graphs, financial services, and more

      All Use Cases

    • Customer Success Stories

      Case studies, customer videos, proof points, and more

      All Customer Stories

  • Developers
    • Developer Center

      Best practices, guides, tutorials, and downloads

      Learn More

      GraphAcademy

      Free online courses and certifications. Join the 100K+ Neo4j experts.

      Learn More

    • Developers
      • Deployment Center Deploy Neo4j on any cloud or architecture
      • Documentation Manuals for Neo4j products, Cypher, and drivers
      • Developer Blog Deep dives into more technical Neo4j topics
      • Community A global forum for online discussion
    DATA SCIENTISTS
    • Data Science Documentation Manuals for the Graph Data Science library
    • Graph Data Science Home Learn what Neo4j offers for data science
    • Get Started With Graph Data Science Download or get started in Sandbox today
    • Data Science Community A global forum for data-driven professionals
  • AI Systems
  • Learn
    LEARN
    • Documentation Manuals for Neo4j products, Cypher, and drivers
    • GraphAcademy Free online courses and certifications
    • Resource Library White papers, datasheets, and more
    • Customer Success Stories Case studies, customer videos, proof points, and more
    CONNECT
    • Neo4j Events Hub Live and on-demand events, training, webinars, and demos
    • Neo4j Blog Announcements, guides, and best practices
    • Neo4j Video Hub Covering graph databases, data science, analytics & AI
    FEATURED EVENTS
    • GraphSummit Logo

      Graphs + AI: Transform Your Data Into Knowledge

      Learn more
    • Neo4j Nodes AI 2026 logo

      Virtual Conference Dedicated to Graph + AI

      Register Today
  • Pricing
  • Contact Us
  • Get Started Free

Neo4j Security Addendum

Neo4j Security Addendum

Last Updated: March 18, 2025

This Neo4j Security Addendum (“Security Addendum” or “Addendum“) is incorporated into and supplements the agreement between Customer and Neo4j that references this document (the “Agreement”). Capitalized terms used but not defined have the meanings set forth in the Agreement. In the event of any conflict between the Agreement and this Security Addendum, this Addendum shall govern.

Neo4j uses infrastructure-as-a-service cloud providers (“Infrastructure Provider”) for its Cloud Offering as further described in the Agreement and the Documentation.

  1. GENERAL. Neo4j implements and maintains an information security program designed to protect the confidentiality, integrity, and availability of the Cloud Offering and Customer Data (the “Security Program”). The Security Program provides security controls outlined and evidenced by third-party reports and certifications with specific defined scopes and boundaries, including: (i) Neo4j’s current System Organization Controls 2, Type 2 report (“SOC 2 Report”); and (ii) Neo4j’s current ISO 27001 certification (the “ISO Certification”), or, in each case, such successor industry standards of comparable scope and rigor as determined by Neo4j. These certifications are verified by an independent auditor who reviews Neo4j’s security controls and business continuity plan.
  2. REPORTS AND CERTIFICATIONS. Neo4j makes available copies of reports and certifications at no charge on its Trust Center, including its SOC 2 Report, ISO Certification, and HIPAA documentation, all of which are Neo4j’s Confidential Information.
  3. ORGANIZATIONAL & ADMINISTRATIVE SECURITY.
    1. Personnel Screening. Neo4j screens all employees at time of hire which, to the extent permitted by applicable law, may include the following: (a) social security verification; (b) prior employment verification; and (c) criminal history.
    2. Personnel Training and Awareness. Neo4j conducts staff security awareness training and education. Training is conducted at the time of hire and annually during employment.
    3. Internal Access Management. Neo4j personnel use Neo4j-issued laptops. Neo4j maintains an inventory of any Neo4j-issued assets. Such assets are managed through a centrally administered mobile device management system and utilize security controls that include, but are not limited to, (a) disk encryption, (b) a centrally managed and updated anti-malware protection program, and (c) centrally performed remote wipes of hard drives. Neo4j personnel are assigned a unique, individual user account. User authentication is required to gain access to production and non-production Neo4j systems. In addition to appropriate user authentication controls, Neo4j also requires the use of secure remote access connections, complex passwords, enablement of account lock-out, and two-factor authentication. Access to Neo4j systems and Customer Data are protected by authentication and authorization mechanisms based on job requirements and the principles of least privilege and need-to-know. These access entitlements and privileges are regularly reviewed by management, at least annually.
    4. Vendor and Third-Party Management. Neo4j assesses and manages the security risks posed by third-party vendors and subprocessors (“Third Parties”) who may access or process Customer Data through policies and a vendor risk management program. Neo4j will evaluate all Third Parties to ensure that they maintain adequate physical, technical, organizational, and administrative controls, based on the risk tier appropriate to the services they provide. Neo4j will remain responsible for the acts and omissions of Third Parties as they relate to their compliance with the requirements of this Addendum and applicable laws.
    5. Security Contact. If you have security concerns or questions, you may contact Neo4j via normal Support channels or by emailing security@neo4j.com.
  4. PHYSICAL & ENVIRONMENTAL SECURITY.
    1. Infrastructure Providers. Neo4j requires all Infrastructure Providers to maintain physical and environmental controls applicable to their services and data centers at least in line with a SOC 2, Type II or ISO 27001 certification. Neo4j reviews these reports annually.
    2. Customer Data Environment. The hosting location of Customer Data is selected by Customer on an Order Form and/or configured by the Customer via the Cloud Offering. Neo4j provisions Customer’s account in their chosen location and this account is logically separated from other customer accounts. Customer accounts are located in the cloud environment that is both logically and physically separate from Neo4j’s corporate offices and networks.
    3. Neo4j Offices. Although Customer Data is not hosted at Neo4j’s corporate offices, Neo4j’s controls for its corporate offices include, but are not limited to, (a) physical access at office ingress points; (b) keycard or badge access requirements for personnel; (c) regular review of issued privileges; (d) required sign-in for external visitors; and (e) use of security doors, alarm devices, and/or security services outside of business hours including implementation of measures for on-premise security (e.g. intruder alert/notification).
  5. NETWORK, SYSTEM, & APPLICATION SECURITY.
    1. Network Architecture. The Cloud Offering uses network segmentation, detection systems, and secure configurations to secure its infrastructure and enforce secure, hardened configurations.
    2. Secure Development Lifecycle (“SDLC”). Neo4j implements an SDLC that is aligned with OWASP Top 10 and is actively managed by a dedicated application security team. The SDLC is designed to cover all stages of software development, including but not limited to, (a) threat modeling of new features or changes; (b) security review to cover functional and non-functional security requirements; (c) code scanning to identify known vulnerabilities; and (d) secure coding guidelines.
    3. Penetration Tests. Neo4j conducts internal and external penetration tests on a regular basis. External scans and penetration tests against production and development environments will be conducted by external, qualified, credentialed, and industry recognized third-party companies engaged by Neo4j.
    4. Anti-virus and Malicious Code. Neo4j leverages threat detection tools with regular scans to monitor and uncover malware, viruses, vulnerabilities, or other harmful, malicious computer code. Upon becoming aware of such vulnerabilities, Neo4j will address or have a plan to remediate these vulnerabilities in accordance with its security policies and the National Vulnerability Database’s Common Vulnerability Scoring System in which critical vulnerabilities are addressed within seven (7) days.
    5. Configuration and Change Management. Changes to the infrastructure as code, and to the service source code, all go through the same change management process that include review and approval before being merged with the code base.
  6. TECHNICAL SECURITY.
    1. Encryption. To protect data at rest, Neo4j encrypts Customer Data using AES-256 encryption. Customer Data is also encrypted during transmission (e.g., TLS 1.2 or higher).
    2. Key Management. Encryption keys used for encryption at rest are created, managed, and stored by the Customer’s chosen CSP key management service. Customers may also leverage customer managed encryption keys (CMEK), which offer complete control of the key life cycle.
    3. Data Retention and Disposal. Neo4j provides Customer with functionality for the deletion of Customer Data, as further described in the Documentation. Following the termination or expiration of the Agreement and subject to the applicable provisions, including the Retrieval Right, Neo4j shall promptly delete any remaining Customer Data.
  7. MONITORING, LOGGING, & INCIDENT MANAGEMENT.
    1. Security Monitoring. A dedicated Security Operations Center team reviews system security monitoring and alerting using integrated Security Information and Event Management (SIEM) tooling.
    2. Logging. Neo4j collects and maintains logs for systems hosting, processing, and/or storing Customer Data for 12 months. Neo4j’s logs are only accessible to authorized personnel and secured to prevent tampering. Customer may access logs in accordance with the Documentation.
  8. BUSINESS CONTINUITY AND RECOVERY. Neo4j maintains a business continuity policy and a disaster recovery plan to ensure the availability and resiliency of the Aura production environment. Neo4j will test the policy and plan on at least an annual basis.
    1. Data Backup and Recovery. Neo4j may automatically create backups of each database at regular intervals, depending on the product and tier selected by Customer as further described in the Documentation. Customers may configure different intervals with built-in functionality.
    2. Recovery Objectives. Neo4j offers the following target recovery objectives: (a) restoration of the Cloud Offering without undue delay and completion of the restoration using commercially reasonable efforts following Neo4j’s declaration of a disaster; and (b) maximum Customer Data loss as described in the Documentation. Except as otherwise provided in the applicable policy, Neo4j will use commercially reasonable efforts to promptly notify Customer’s account administrator of any failure of critical services or a material business disruption.
  9. SHARED RESPONSIBILITY.
    1. Customer is responsible for its election of the Infrastructure Provider. By executing an Order Form or configuring its chosen hosting location, Customer agrees that it has done its own assessment about the technical and organizational security measures of the respective Infrastructure Provider and that Neo4j is not responsible for such measures.
    2. Customer is responsible for the security and confidentiality of User credentials and must notify Neo4j of any unauthorized use of, distribution, or access to its User credentials. Further, Customer must actively manage and protect any customer managed key to ensure the confidentiality and integrity of the key and the Customer Data encrypted with such key. Customer is further responsible for implementing any customer-configurable access controls and functionality to ensure a level of security appropriate for the Customer Data.

Build Intelligent Apps Easily

Transform your data into knowledge to build smart, accurate, and adaptive applications.

Start Building
Products
  • Neo4j AuraDB
  • Neo4j Graph Database
  • Neo4j Graph Analytics
  • Neo4j Graph Data Science
  • Neo4j Fleet Manager
  • Neo4j Bloom
  • Cypher Query Language
  • Neo4j GraphQL
  • Pricing
  • Neo4j Community Edition
Use Cases
  • AI Systems
  • Generative AI
  • Knowledge Graphs
  • Pattern Matching
  • Industries & Use Cases
  • Case Studies
Developers
  • Developer Home
  • Documentation
  • Deployment Center
  • Developer Blog
  • Community
  • Virtual Events
  • GraphAcademy
  • Release Notes
Data Scientists
  • Graph Data Science Home
  • Data Science Documentation
  • Get Started with Graph Data Science
  • Data Science Community
  • GraphAcademy for Data Science
Learn
  • Resource Library
  • Neo4j Blog
  • GraphAcademy
  • Research Center
  • Case Studies
  • Neo4j Video Hub
  • Neo4j Events Hub
  • GraphSummit
  • NODES
  • Webinars
  • GraphRAG
Partners
  • Find a Partner
  • Become a Partner
  • Solution Partners
  • OEM Partners
  • Technology Partners
  • Partner Portal Login
Company
  • About Us
  • Newsroom
  • Awards and Honors
  • Graphs4Good
  • Careers
  • Culture
  • Leadership
  • Support
  • Trust Center
Contact Us →
  • US: 1-855-636-4532
  • Sweden: +46 171 480 113
  • UK: +44 20 3868 3223
  • France: +33 (0) 1 88 46 13 20
  • Singapore: +65 6859 0336
  • Australia: +61 2 8395 2895
Social Networks
© 2026 Neo4j, Inc.
Terms | Privacy Notice | Sitemap
Anti-Corruption Policy
©2026 Neo4j, Inc., Neo Technology®, Neo4j®, Cypher®, Neo4j Bloom™, Neo4j Graph Data Science Library™, Neo4j® Aura™, and Neo4j® AuraDB™ are registered trademarks or a trademark of Neo4j, Inc. All other marks are owned by their respective companies.
Contact Us