Security
Built to pass the strictest enterprise review. Every time.
Built to pass the strictest enterprise review. Every time.
Built to pass the strictest enterprise review. Every time.
Contracts contain your most sensitive commercial information - deal terms, obligations, liabilities, counterparty data. Miramis is the system of record for all of it. We've built the data privacy and security infrastructure to match that responsibility.
Certified & compliant
Certified & compliant
Certified & compliant
Certified & compliant
ISO 27001
Our Information Security Management System is certified under ISO/IEC 27001 - the internationally recognised standard for information security management. All Miramis security measures are built on this foundation.
SOC 2 Type II
We are SOC 2 Type II certified, demonstrating that we manage data in accordance with the five trust service principles: security, availability, processing integrity, confidentiality, and privacy.
GDPR compliant
Our use and processing of data are compliant with the EU General Data Protection Regulation. With our technical team based in Sweden, GDPR compliance is built into how we operate.
eIDAS-compliant eSigning
Our native eSigning meets EU legal standards for electronic signatures across all member states.
ISO 27001
Our Information Security Management System is certified under ISO/IEC 27001 - the internationally recognised standard for information security management. All Miramis security measures are built on this foundation.
SOC 2 Type II
We are SOC 2 Type II certified, demonstrating that we manage data in accordance with the five trust service principles: security, availability, processing integrity, confidentiality, and privacy.
GDPR compliant
Our use and processing of data are compliant with the EU General Data Protection Regulation. With our technical team based in Sweden, GDPR compliance is built into how we operate.
eIDAS-compliant eSigning
Our native eSigning meets EU legal standards for electronic signatures across all member states.
How we prevent unauthorised access
How we prevent unauthorised access
How we prevent unauthorised access
How we prevent unauthorised access
Data encryption
Customer data at rest is encrypted with AES-256. Data in transit is encrypted with TLS 1.2. Encryption integrity is monitored through periodic risk assessments and annual third-party penetration tests.
Access control
We follow the principle of least privilege - role-based permissions and multi-factor authentication for all systems containing confidential data. Authorised users only have access to data relevant to their access rights. Routine vulnerability scanning, malicious activity detection, and automatic blocking of suspicious behaviour keep your data protected at all times. Firewalls segregate unwanted traffic from the network.
Annual penetration testing
Every year, an independent third party conducts penetration testing across the full scope of the Miramis platform. Findings are used to continuously strengthen our security posture.
Advanced permissions
Role-based access is configurable down to document level. Administrators control exactly who can see what across the platform.
Enterprise SSO
Integrates with your existing identity provider - no separate credentials to manage.
Your data, your control
Your data, your control
Your data, your control
Your data, your control
How we ensure business continuity
How we ensure business continuity
How we ensure business continuity
How we ensure business continuity
Testing
We perform automated and manual QA assessments for every Miramis release. Our automated testing infrastructure covers 100% of critical user flows and is triggered for every release candidate to manage defects before they reach production.
Data backups
Are performed automatically on a scheduled basis. Our team monitors backup integrity and tests restoration procedures regularly to ensure data can be recovered reliably.
Disaster recovery
Disaster recovery routines are built on AWS resilience capabilities such as region redundancy and automated failover, and are tested at regular intervals based on risk assessments. We define and validate Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) to ensure recovery targets are met. We carry out rigorous IT and management processes when a serious incident occurs and continuously update our processes and routines.
Location independence
All employees can continue working from alternative locations using MFA-protected tools and SSO managed systems. This ensures operations can continue if offices are inaccessible due to an extreme event.
Testing
We perform automated and manual QA assessments for every Miramis release. Our automated testing infrastructure covers 100% of critical user flows and is triggered for every release candidate to manage defects before they reach production.
Data backups
Are performed automatically on a scheduled basis. Our team monitors backup integrity and tests restoration procedures regularly to ensure data can be recovered reliably.
Disaster recovery
Disaster recovery routines follow AWS best practices and are tested at regular intervals based on risk assessments. We carry out rigorous IT and management processes when a serious incident occurs and continuously update our processes and routines.
Location independence
All employees can continue working from alternative locations using MFA-protected tools and SSO managed systems. This ensures operations can continue if offices are inaccessible due to an extreme event.
Frequently Asked Questions
How does Miramis encrypt data?
Customer data at rest is encrypted with AES-256. All data in transit uses TLS 1.2. Encryption integrity is monitored through periodic risk assessments and annual third-party penetration tests.
Does Miramis use our data to train AI models?
No. Your data is never used to train or fine-tune any AI models - by Miramis or by any of our subprocessors. This is contractually prohibited in all subprocessor agreements.
What certifications does Miramis hold?
ISO 27001 and SOC 2 Type II. We are also GDPR-compliant and our eSigning is eIDAS-compliant. Full certification documentation is available on request.
How do you control access to our data?
We follow the principle of least privilege. Role-based permissions mean users only access what they need. Multi-factor authentication is required for all systems containing confidential data. Firewalls segregate unwanted traffic, and suspicious behaviour is blocked automatically.
Can every user see every contract?
No. Access is controlled by role-based permissions configured by your administrators. Authorised users only have access to data relevant to their access rights.
How do you vet sub-processors and suppliers?
All critical sub-processors are required to meet ISO 27001 standards or equivalent and maintain GDPR compliance. Suppliers undergo a thorough security review during procurement, including an assessment of their alignment with ISO 27001 controls as well as a formal risk assessment. Results are documented and tracked in our GRC platform. Suppliers sign NDAs and security agreements before access is granted and are monitored on an ongoing basis.

Frequently Asked Questions
How does Miramis encrypt data?
Customer data at rest is encrypted with AES-256. All data in transit uses TLS 1.2. Encryption integrity is monitored through periodic risk assessments and annual third-party penetration tests.
Does Miramis use our data to train AI models?
No. Your data is never used to train or fine-tune any AI models - by Miramis or by any of our subprocessors. This is contractually prohibited in all subprocessor agreements.
What certifications does Miramis hold?
ISO 27001 and SOC 2 Type II. We are also GDPR-compliant and our eSigning is eIDAS-compliant. Full certification documentation is available on request.
How do you control access to our data?
We follow the principle of least privilege. Role-based permissions mean users only access what they need. Multi-factor authentication is required for all systems containing confidential data. Firewalls segregate unwanted traffic, and suspicious behaviour is blocked automatically.
Can every user see every contract?
No. Access is controlled by role-based permissions configured by your administrators. Authorised users only have access to data relevant to their access rights.
How do you vet sub-processors and suppliers?
All critical sub-processors are required to meet ISO 27001 standards or equivalent and maintain GDPR compliance. Suppliers undergo a thorough security review during procurement, including an assessment of their alignment with ISO 27001 controls as well as a formal risk assessment. Results are documented and tracked in our GRC platform. Suppliers sign NDAs and security agreements before access is granted and are monitored on an ongoing basis.

Frequently Asked Questions
How does Miramis encrypt data?
Customer data at rest is encrypted with AES-256. All data in transit uses TLS 1.2. Encryption integrity is monitored through periodic risk assessments and annual third-party penetration tests.
Does Miramis use our data to train AI models?
No. Your data is never used to train or fine-tune any AI models - by Miramis or by any of our subprocessors. This is contractually prohibited in all subprocessor agreements.
What certifications does Miramis hold?
ISO 27001 and SOC 2 Type II. We are also GDPR-compliant and our eSigning is eIDAS-compliant. Full certification documentation is available on request.
How do you control access to our data?
We follow the principle of least privilege. Role-based permissions mean users only access what they need. Multi-factor authentication is required for all systems containing confidential data. Firewalls segregate unwanted traffic, and suspicious behaviour is blocked automatically.
Can every user see every contract?
No. Access is controlled by role-based permissions configured by your administrators. Authorised users only have access to data relevant to their access rights.
How do you vet sub-processors and suppliers?
All critical sub-processors are required to meet ISO 27001 standards or equivalent and maintain GDPR compliance. Suppliers undergo a thorough security review during procurement, including an assessment of their alignment with ISO 27001 controls as well as a formal risk assessment. Results are documented and tracked in our GRC platform. Suppliers sign NDAs and security agreements before access is granted and are monitored on an ongoing basis.




