COZERO Logo
Product
Product overview

Discover our Climate Action Platform, an end-to-end software solution for carbon management, helping sustainability stakeholders improve carbon accounting and decarbonize in complex sectors.

Learn more
Modules
Log
Carbon emissions calculations and analysis.
Act
Decarbonization planning and emission reduction strategy.
Share
Reporting and climate disclosure preparation.
Features
API
Integrate carbon accounting into your workflows.
Supplier engagement
Engage suppliers and collect Scope 3 data.

Discover how Cozero’s Climate Action Platform can help you streamline carbon emission management.

Request a demo
Solutions
Solution

Cozero supports enterprises across diverse industries for a wide array of use cases. Whether you're in manufacturing, logistics, technology, or any sector committed to reducing its carbon footprint, our platform is tailored to meet your unique needs.

Read customers stories
Industries
Logistics and transportation
Emission accounting and decarbonization tools for the logistics value chain.
Industrial manufacturing
Carbon management capabilities for sustainable manufacturing.
Connected industries
Tailored solutions for complex and high-emitting industries.
Use cases
Corporate Carbon Footprint
Measure your corporate footprint and identify hotspots.
Product Carbon Footprint
Calculate PCF and gain insights into your product emissions.
Scope 3
Account for Scope 3 emissions and engage your suppliers.
CBAM
Prepare EU-ready CBAM reporting.

Download our case study collection and learn how Cozero helps enterprises from the industry to decarbonize.

Download
Resources
Resources

We provide you with resources to fuel your journey toward sustainable excellence, whether robust carbon management tools, insightful industry analyses, or expert guidance.

Resources
Blog
Insights and updates on carbon management
Customer stories
Learning and success stories from our customers
Webinars
Videos resources and on-demand webinars
Documentation
Cozero Wiki
Discover how to use the Cozero Climate Action Platform.
API Documentation
Discover how to use the Cozero API.
How Cozero helped LeanIX to advance in carbon management

With André Christ, LeanIX CEO and Co-founder

Read the case study
Company
Company

Founded in Berlin in 2020 and winner of the German Sustainability Award 2022, Cozero empowers enterprises to take control of their environmental footprint and decarbonization journey. 

About
About Cozero
Climate and sustainability startup
Career
Explore exciting job opportunities
Get in touch
Contact our team of experts
Media
Press center
Latest news and press releases
Media request
Send us media inquiries
DMG MORI advances sustainable manufacturing and Scope 1, 2 and partially 3 transparency with Cozero

DMG MORI, a global leader in machine tools and manufacturing solutions, is strengthening its pioneering role in sustainability by deepening its decarbonization efforts.

Read the press release
Language
EN
DE
FR
Go to accountSchedule a call
Language
EN
DE
FR

Security and compliance at Cozero

Effective date: September 1, 2024

Protecting personal and customer confidential information is our top priority. For the sake of our customers, our business ethics and values, we don't compromise or cut corners when it comes to data security. As part of that commitment, we operate with the utmost transparency. The following overview provides a high-level look at the ever-evolving security practices we have in place.

 

We’re compliant with the highest security and privacy standards

GDPR & CCPA - By complying with GDPR and CCPA we prove our commitment to protecting personal information and enforcing a consent based model to personal data processing.

Our encryption protocols are national-security worthy

Powered by an AWS cloud environment, we keep all data encrypted both in rest and in motion using best-in-breed security algorithms such as RSA4096, SHA256 and AES256. Data sent to or from our infrastructure is encrypted in transit via industry best-practices using Transport Layer Security (TLS). At rest, all data is subject to battle-proof encryption algorithms and stored using secret management services. You can view our SSLLabs report here.  

With end-to-end encryption at every stage – at rest, in transit, or in cloud storage – Cozero services ensure your data is always safe, secure, and private. Even the metadata communications between your system and the Cozero are encrypted for total security.

Our consent-based model gives people control over their personal and protected health information

According to Europe’s General Data Protection Regulation of 2018, personal data, including protected health data, is owned by the individual it represents, and consent to process and share that data must be “freely given, specific, and informed.” We couldn’t agree more.

When a user uses Cozero services, they are sending a request to an individual for permission to access their data, empowering the average person to exercise consent and data ownership.

Our security measures are ever evolving to keep pace with the changing threat landscape

Our work on security and privacy efforts does not have an end; it's a continuous cycle of researching, revising, implementing, testing, fixing, scaling, blocking, and permissioning. We are constantly working to meet and exceed what is asked of us from regulators, investors, partners, and users, and we collectively live the security processes on a daily basis. Security and privacy are integral to our culture. After all security is one of the core services we offer.

Data retention and removal is standardized and at the discretion of our users

All permissioned user data held by Cozero is available to our customers for electronic retrieval for a period of 30 days after the expiration or termination of the Service Agreement. All data is then completely removed from Cozero’s servers. Every user can request the removal of their personal data by contacting Cozero support. Read more about our privacy settings.

We establish strong defences at points of entry

Cozero developed apps and backend infrastructure, the main entry points of user data, only allows client requests using strong TLS protocols. All communication between Cozero maintained infrastructure and data platforms is transmitted over encrypted tunnels.

We take all necessary infrastructure precautions.

All of our services run in cloud environments. We don’t host or run our own routers, load balancers, DNS servers, or physical servers. Cloud providers we use regularly undergo independent verification of security, privacy, and compliance controls against the following standards: ISO/IEC 27001, ISO/IEC 27017, SOC 1, SOC 2, SOC 3, PCI DSS, HIPAA, CSA Star, FedRAMP, and many others.

Secure code: transparent development with security in mind

Protecting customer data from modern threats means products developed through our services must be developed with security in mind. The following practices ensure the highest level of security in our software:

  • Applying Secure Software Development Life Cycle (S-SDLC) which focuses on incorporating security into the development cycle
  • Developing and continuously maintaining a corporate culture dedicated to security
  • We assess the security of our code using industry well-known security frameworks such as ATT&CK, OWASP Top 10, and SANS Top 25
  • Developers participate in regular security training to learn about common vulnerabilities, threats and secure coding best practices
  • We review our code for security vulnerabilities
  • We regularly update our backend infrastructure and software and make sure none of them have known vulnerabilities
  • We use static application security testing (SAST) and dynamic application security testing (DAST) to detect basic security vulnerabilities in our codebase
  • We conduct regular external penetration tests on our production environments

Our application security monitoring and protections solutions allow us the visibility to:

  • Identify attacks and respond quickly to a data breach
  • Monitor exceptions and logs and detect anomalies in our applications
  • Collect and store logs to provide an audit trail of our applications activity

We also deploy a runtime protection system that identifies and blocks web attacks and business logic attacks in real time, as well as security headers to protect our users from attacks.  

We practice stringent network-level security monitoring and protection

We maintain our own in-house Security Operations Center. Our network consists of multiple security zones, which we monitor and protect with trusted and next-generation firewalls, including IP address filtering, to insure against unauthorized access. We deploy an intrusion detection and/or prevention solution (IDS/IPS) that monitors and blocks potential malicious packets as well as distributed denial of service (DDoS) mitigation services powered by an industry-leading solution.

We boast an industry-leading security team

Our security team comprises security experts dedicated to constantly improving the security of our organization. Our team is trained and certified in security threat detection and incident response, security engineering, penetration testing, application security, security management compliance and latest security best practices.

We encourage responsible disclosure.

If you discover vulnerabilities in our application or infrastructure, we ask that you alert our team by contacting security@cozero.io please include a proof of concept in your email. We will respond as quickly as possible to your submission and won’t take legal action if you follow the responsible disclosure process:

  • Please avoid automated testing and only perform security tests with your own data
  • Please include a proof of concept in your email
  • Do not disclose any information regarding the vulnerabilities until clear approval is given

Note that our bug bounty program is currently closed and we are not looking for new security researchers.  

General Information Security Policy

Protect Cozero’s informational and IT assets (including but not limited to all computers, mobile devices, networking equipment, software and sensitive data) against all internal, external, deliberate or accidental threats and to mitigate the risks associated with the theft, loss, misuse, damage or abuse of these systems;

Ensure information will be protected against any unauthorized access. Users shall only have access to resources that they have been specifically authorized to access. The allocation of privileges shall be strictly controlled and reviewed regularly.

Protect CONFIDENTIALITY of information. When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized parties;

Ensure INTEGRITY of information. Integrity of information refers to protecting information from being modified by unauthorized parties;

Maintain AVAILABILITY of information for business processes. Availability of information refers to ensuring that authorized parties can access the information when needed.

Comply with and, wherever possible, exceed, national legislative and regulatory requirements, standards and best practices;

Develop, Maintain and Test business continuity plans to ensure we stay on course despite all obstacles that we may come across. It is about “keeping calm and carrying on!”;

Raise awareness of information security by making information security training available for all Employees. Security awareness and targeted training shall be conducted consistently, security responsibilities reflected in job descriptions, and compliance with security requirements shall be expected and accepted as a part of our culture;

Ensure that no action will be taken against any employee who discloses an information security concern through reporting or in direct contact with Information Security Management Leader, unless such disclosure indicates, beyond any reasonable doubt, an illegal act, gross negligence, or a repetitive deliberate or willful disregard for regulations or procedures;

Report all actual or suspected information security breaches to security@cozero.io

COZERO Logo
Cozero equips enterprises with an end-to-end software solution for carbon management, helping sustainability stakeholders improve carbon accounting and decarbonize in complex sectors.
2024 Cozero GmbH
Platform
Platform overview
Log
Act
Share
Cozero API ↗
Resources
Blog
Webinars
Customer stories
Cozero wiki ↗
Industries
Transportation & Logistics
Industrial manufacturing
Connected industries
Use cases
Corporate Carbon Footprint
Product Carbon Footprint
Supplier engagement
CBAM reporting
CSRD reporting
Company
About us
Careers
New
Press
Contact us
Get in touch
Contact sales
Language
EN
DE
FR
a flag and a flag of the european uniona black and white photo of a german awarda black and red logo with the words ncp on it
SecurityTrust center ↗ImprintTerms & ConditionsPrivacy Policy