Skip to main content

Workiva Security

Workiva utilizes numerous measures to ensure the utmost in data security and privacy.

Image

workiva platform interface showing document permissions and security
Your browser doesn't support HTML5 canvas

Maximize security and privacy

 Encryption in transmission and at rest

 Advanced permissions and data authorization

 Redundant data centers and rigorous failover processes

 SSO with SAML and two-factor authentication

SCIM provisioning compatibility

 Bring Your Own Key (BYOK) Management

Committed to compliance

the workiva platform is compliant with SOC 1, SOC 2, FedRamp, HIPAA and GDPR

We take security seriously at Workiva and are committed to exceeding the industry standards to protect your data. Our applications are designed and developed with careful consideration given to customer data security, reliability, and integrity. Customer data is stored in secure facilities, on secure servers, and within secure applications, and confidential information is kept private.

Our policies and procedures ensure security across the organization and within our operations. More than 3,500 organizations, including 75% of the Fortune 500, have chosen to trust us with their most important and confidential data.

Organizational and operational security

Image

the workiva platform is compliant with HIPAA, FEDRAMP and GDPR

Data security and privacy

Workiva adheres to all rules and best practices for HIPAA and General Data Protection Regulation (GDPR) requirements for the collection, management, and protection of personal data.

Workiva is FedRAMP Authorized at the moderate security impact level, ensuring our public solutions meet or exceed cybersecurity standards required by federal government agencies and respect a benchmark of trust for continuous confidentiality, integrity, and availability of data.

Image

the workiva platform interface showing document permission and security settings

Identity and access management

Provide easy access to the platform without compromising security via SSO with SAML and two-factor authentication. Control identity using enterprise identity management, including Okta. Employ role-based access to features, content, and workspaces. Utilize specific roles for IT admins to manage cross-organization and workspace settings.

Image

SOC 1 and SOC 2 logos

Global compliance standards

Workiva operations, policies, and procedures are audited regularly to ensure that they meet and exceed all standards expected of cloud service providers (CSPs). Workiva publishes a Service Organization Controls (SOC) 1 Type II and a SOC 2 Type II audit report, which are available for review upon request.

Bring Your Own Key (BYOK) Management

Certain businesses need an extra layer of control and protection. With BYOK, use your own encryption keys for complete flexibility, control, and visibility of access to your data. The result? Additional assurance and confidence as you scale your Workiva experience.

See the power of connected reporting and compliance

Online registration is currently unavailable.

Please email events@workiva to register for this event.

Our forms are currently down.

Please contact us at info@workiva.com

Our forms are currently down.

Please contact us at info@workiva.com

Thank you

A Workiva team member will follow up with you shortly.

Thank you for registering

You'll receive a confirmation email shortly.

Thank you

You are now subscribed to receive blog updates.

Back to Top