Skip to main content

Workiva Security

Workiva utilises numerous measures to ensure the utmost in data security and privacy.

Image

workiva platform interface showing document permissions and security
Your browser doesn't support HTML5 canvas

Maximise security and privacy

 Encryption in transmission and at rest

 Advanced permissions and data authorisation

 Redundant data centers and rigorous failover processes

 SSO with SAML and two-factor authentication

SCIM provisioning compatibility

Bring Your Own Key (BYOK)

Committed to compliance

 

Image

the workiva platform is compliant with SOC 1, SOC 2 and GDPR

We take security seriously at Workiva and are committed to exceeding the industry standards to protect your data. Our applications are designed and developed with careful consideration given to customer data security, reliability and integrity. Customer data is stored in secure facilities, on secure servers and within secure applications, and confidential information is kept private. Our policies and procedures ensure security across the organisation and within our operations. More than 3,500 organisations, including 75% of the Fortune 500, have chosen to trust us with their most important and confidential data.

Organisational and operational security

Image

the workiva platform is compliant with GDPR

Data security and privacy

Workiva adheres to all rules and best practices for General Data Protection Regulation (GDPR) requirements for the collection, management and protection of personal data. Workiva also conducts privacy impact assessments (PIAs) on features, technology, third-party on-boarding and operations related to our service as required by GDPR.

Image

the workiva platform interface showing document permission and security settings

Identity and access management

Provide easy access to the platform without compromising security via SSO with SAML and two-factor authentication. Control identity using enterprise identity management, including Okta. Employ role-based access to features, content and workspaces. Utilise specific roles for IT admins to manage cross-organization and workspace settings.

Image

SOC 1 and SOC 2 logos

Global compliance standards

Workiva operations, policies and procedures are audited regularly to ensure that they meet and exceed all standards expected of cloud service providers (CSPs). Workiva publishes a Service Organization Controls (SOC) 1 Type II and a SOC 2 Type II audit report, which are available for review upon request.

Bring Your Own Key (BYOK) Management 

Certain businesses need an extra layer of control and protection. With BYOK, use your own encryption keys for complete flexibility, control and visibility of access to your data. The result? Additional assurance and confidence as you scale your Workiva experience.

See the power of connected reporting and compliance

Online registration is currently unavailable.

Please email events@workiva to register for this event.

Our forms are currently down.

Please contact us at info@workiva.com

Our forms are currently down.

Please contact us at info@workiva.com

Thank you

A Workiva team member will follow up with you shortly.

Thank you for registering

You'll receive a confirmation email shortly.

Thank you

You are now subscribed to receive blog updates.

Back to Top