skydio drone sitting on dock
skydio drone sitting on dock

The toughest jobs need the tightest security

Security from end-to-end

Skydio products are secure by design, safeguarding each layer of the UAS stack against external threats. From the way we source parts to the way we develop software, security is integrated from end-to-end to ensure the confidentiality, integrity, and availability of your data.

The most demanding organizations in the world trust Skydio because:

  1. Skydio is committed to meeting the security needs of all of our customers
  2. Strong encryption is used both in transit and at rest
  3. All customer data resides in the United States on our secure Skydio Cloud
  4. Our security is validated by best-in-class security auditors and penetration testers
Skydio data syncing to cloud and remote flight deck with SOC type II  and AES-265 encryption

Hardware Security

Designed, assembled, and supported in the U.S.

We work with manufacturing partners to prioritize security from the start, ensuring we protect our critical systems that store data from external threats.

factory icon

Manufacturing Partners

Skydio sources components from manufacturers that adhere to stringent security policies, just as we do. This helps us prioritize components sourced from companies that meet or exceed U.S. government and regulatory agency security requirements.

usa flag icon

Secure Development

Skydio products integrate security practices and considerations throughout the entire software development process. Our secure development practices identify and remediate security vulnerabilities and risks early in the development process, making our products secure, robust, and reliable.

padlock with network connection icon

Secure Connectivity

Skydio’s hardware communicates using secure AES-encrypted wireless links. SkydioLink utilizes AES-256 bit encryption for both Skydio Dock and Controller operations.

arrows in a circle to signify a refresh/update

Secure Updates

Software and firmware updates are digitally signed and verified to protect against unauthorized or malicious updates and enhance security and integrity.


Hosted on secure infrastructure in the U.S.

We protect your data in transit and at rest within Skydio Cloud where our customers manage their fleet, sync media from flights, view and share live streams from current flights, and remotely control Skydio drones through teleoperation.

aws logo icon

Hosting & Security

Skydio Cloud is SOC2 Type II certified and is hosted in the United States on Amazon Web Services infrastructure. Skydio Cloud operates out of AWS US-West and customer data is encrypted with AES-256 encryption and continually backed up to AWS US-East. Customer data is our most protected information at Skydio, all access is carefully monitored and controlled.

database with padlock icon

Data Encryption

Data is protected in transit with TLS 1.2/1.3 encryption (non-weak ciphers). Data uploaded to Skydio Cloud is encrypted at rest with AES-256 encryption.

cog containing the letters API icon

API Integration

Skydio offers a RESTful Skydio Cloud API, which allows customers to programmatically interact with Skydio Cloud securely. Amongst a wide range of functions, Skydio Cloud API allows customers to download and delete data from Skydio Cloud through our Skydio Cloud API.


Meeting the highest security standards

Skydio is committed to earning best-in-class security compliance certifications from industry-standard evaluators. Our customers can rest assured that their data is protected by security measures that meet or exceed the highest standards.

soc type 2 icon

SOC2 Compliance

Skydio renewed SOC2 Type II certification in 2023. If you wish to view the report, please request a copy from your account representative.

iso 27001:2022 icon

ISO Certification

Skydio completed ISO 27001:2022 certification audit in 2023. If you wish to view the certificate, please request a copy from your account representative.

icon of a thief

Penetration Testing

Skydio Drones, Dock, and Cloud undergo regular penetration tests by independent security firms according to industry-standard processes. Results are shared with senior management and any discovered vulnerabilities are prioritized, tracked, and remediated. Customer data is never exposed through penetration testing.

icon of a magnifying glass

Vulnerability Management

We regularly scan our network and cloud systems, promptly addressing and resolving any identified vulnerabilities or threats.

What team would you like to contact today?