collab.spaceDocumentation
Overview
Apps

Security

Enterprise-grade security protecting your workspace and data.

Our security architecture is designed to protect your data at every layer. From infrastructure to application, we implement defense-in-depth strategies that meet the requirements of the most security-conscious organizations.

Infrastructure Security

ControlImplementation
Cloud ProviderHosted on enterprise cloud infrastructure with SOC 2 certification
Data CentersGeographically distributed with physical security controls
Network SecurityVirtual private clouds with network segmentation
DDoS ProtectionEnterprise-grade protection against distributed attacks
FirewallWeb application firewall with threat intelligence

Data Encryption

LayerStandardDetails
At RestAES-256All stored data encrypted using AES-256 via cloud provider
In TransitTLS 1.3All connections secured with TLS 1.2+
Key ManagementCloud-managedEncryption keys managed by cloud infrastructure (Amazon Web Services)
DatabaseEncryptedAll database storage encrypted at rest
BackupsEncryptedAll backups encrypted by cloud infrastructure

Access Controls

FeatureDescription
AuthenticationEmail/password, social login (Google, Microsoft), passwordless passkeys
Multi-Factor AuthTOTP authenticator apps and backup codes
Session ManagementSecure session handling with automatic timeouts
Role-Based AccessGranular permissions at workspace, team, and resource levels
API SecuritySession-based authentication with secure tokens

Application Security

PracticeImplementation
Secure DevelopmentSecurity-focused SDLC with code reviews
Dependency ScanningAutomated vulnerability scanning of dependencies
Static AnalysisCode analysis for security vulnerabilities
Penetration TestingAnnual third-party penetration tests

Monitoring & Logging

CapabilityDetails
Audit LogsComprehensive logs of all user and admin actions
Security Monitoring24/7 automated threat detection
AlertingReal-time alerts for suspicious activity
Log RetentionAudit logs retained for compliance requirements
SIEM IntegrationExport logs to your SIEM solution

Incident Response

PhaseDescription
DetectionAutomated detection with 24/7 monitoring
TriageSeverity assessment and team mobilization
ContainmentImmediate actions to limit impact
RemediationRoot cause analysis and fix deployment
CommunicationTimely notification to affected customers
Post-IncidentReview and process improvement

Business Continuity

MeasureDetails
BackupsAutomated daily backups with two providers; two locations; independent clouds
RedundancyMulti-region deployment for high availability
Disaster RecoveryDocumented DR procedures with regular testing
RTO/RPORecovery Time Objective: 4 hours, Recovery Point Objective: 24 hours
Uptime SLA99.5% uptime guarantee* Enterprise plans only.

Security Certifications

CertificationStatusDescription
SOC 2 Type IIIn ProgressWorking toward independent security audit
ISO 27001In progressWorking toward independent security audit
CSA STARIn progressCloud security best practices

Vulnerability Disclosure

We welcome responsible security research. If you discover a vulnerability:

StepAction
1Email [email protected] with details
2Include steps to reproduce the issue
3Allow 90 days for remediation before disclosure
4We'll acknowledge receipt within 24 hours