Artifacts
Explore our Conveyor Trust Portal for on-demand, self-serve access to up-to-date security artifacts — certifications, audit reports, policies, and questionnaire answers.
Cloud Security
Facilities | Zendesk hosts Service Data primarily in AWS data centres that have been certified as ISO 27001, PCI DSS Service Provider Level 1, and/or SOC 2 compliant. Learn about Compliance at AWS. AWS infrastructure services include backup power, HVAC systems, and fire suppression equipment to help protect servers and ultimately your data. Learn more about Data Centre Controls at AWS. |
On-Site Security | AWS on-site security includes features such as security guards, fencing, security feeds, intrusion detection technology, and other security measures. Learn about AWS physical security. |
Data Hosting Location | Zendesk leverages AWS data centres in the United States, Europe, and Asia Pacific. Learn more about Data Hosting Locations for your Zendesk Service Data. Zendesk offers multiple data locality choices including the United States (US), Australia (AU), Japan (JP), or European Economic Area (EEA). For more information on product, plan, and regional offerings please see our Regional Data Hosting Policy. |
Application Security
Secure Code Training | Annual secure code training for all engineers, based on OWASP Top 10 security risks. |
Framework Security Controls | Zendesk leverages modern and secure open-source frameworks with security controls to limit exposure to OWASP Top 10 security risks. These inherent controls reduce our exposure to SQL Injection (SQLi), Cross Site Scripting (XSS), and Cross Site Request Forgery (CSRF), among others. |
Quality Assurance | Our Quality Assurance (QA) department reviews and tests our code base. Dedicated application security engineers on staff identify, test, and triage security vulnerabilities in code. |
Separate Environments | Testing and staging environments are logically separated from the Production environment. No Service Data is used in our development or test environments. |
Product Security
Authentication Options | Zendesk has several different authentication options: subscribers can enable native Zendesk authentication, social media Single sign-on (SSO) (Facebook, Twitter, Google), and/or Enterprise SSO (SAML, JWT) for end user and/or agent authentication. Learn about user access. |
Configurable Password Policy | Zendesk native authentication for products available through the Admin Centre provides the following levels of password security: low, medium and high, as well as set custom password rules for agents and admins. Zendesk also allows different password security levels to apply to end users vs. agents and admins. Only admins can change the password security level. Learn more about configurable password policies. |
2-Factor Authentication (2FA) | Zendesk native authentication for products available through the Admin Centre offers 2-factor (2FA) for agents and admins via SMS or an authenticator app. Learn about 2FA. |
Service Credential Storage | Zendesk follows secure credential storage best practice by never storing passwords in human-readable format, and only as the result of a secure, salted, one-way hash. |
Advanced Data Privacy and Protection | For businesses that need a higher level of data privacy and security, Zendesk offers the Advanced Data Privacy and Protection add-on. The add-on includes capabilities for BYOK encryption, customisable data retention policies, data masking, PII redaction and access logs. |
HR Security
Policies | Zendesk has developed a comprehensive set of security policies covering a range of topics. These policies are shared with and made available to all employees and contractors with access to Zendesk information assets. |
Training | All employees attend a Security Awareness Training, which is given upon hire and annually thereafter. All engineers receive annual Secure Code Training. The Security team provides additional security awareness updates via email, blog posts, and in presentations during internal events. |
Subscriber Service Data Details
Service Data is any information, including personal data, which is stored in or transmitted via the Zendesk Services by, or on behalf of, our subscribers and their end users. We use Service Data to operate and improve our Services, help customers access and use the Services, respond to subscriber inquiries, and send communications related to the Services.
Access: Zendesk provides an advanced set of access and encryption features to help customers effectively protect their information. We do not access or use customer content for any purpose other than providing, maintaining, and improving the Zendesk services and as otherwise required by law. See here for additional information.
Data Hosting: Zendesk uses Amazon Web Services to host Service Data as described here and in the Regional Data Hosting Policy. For additional information, please also see the Security section.
Default Data Types Collected by the Service: Zendesk has created a list of data points, categorised by product. For the full picture of data types, subscribers can use this list in conjunction with their specific intended use case and resultant data types.
Legal or Government Requests: Privacy, data security and subscriber trust are our top priorities. Zendesk does not disclose Service Data, except as necessary to provide our Services and to comply with applicable laws, as detailed in our Privacy Policy. To assist our subscribers in performing compliance reviews, we have additional resources: Transparency Report and Government Request Policy.
Ownership: From a privacy perspective, the subscriber is the controller of Service Data and Zendesk is a processor. This means that throughout the time that you subscribe to services with Zendesk, you retain ownership of and control over Service Data in your Zendesk instance.
Replication: Zendesk periodically replicates data for purposes of archival, backup, and audit logs. We use Amazon Web Services (AWS) to store some of the information that is backed up, such as database information and attachment files. Please see our Regional Data Hosting Policy for further details.
Security: Zendesk prioritises data security and combines enterprise-class security features with comprehensive audits of our applications, systems, and networks to ensure subscriber and business data is protected. See additional information here.
Security Incidents: For more information about security incident management see our Security Incident Response.
Sub-processors: Zendesk may use sub-processors, including affiliates of Zendesk, as well as third-party companies, to provide, secure, or improve the Services, and such sub-processors may have access to Service Data. Our Sub-processors policy provides an up-to-date list of the names and locations of all sub-processors.
Termination: Zendesk maintains a Service Data Deletion Policy that describes Zendesk’s data deletion processes upon subscriber’s termination or expiration of the Zendesk subscription.
Privacy Related Policies
| Cookie Policy | Detailed information about how and when we use cookies on Zendesk websites. |
| In-Product Cookie Policy | Provides information about how and when Zendesk uses cookies within the Zendesk Services. |
| Service Data Deletion Policy | How our Subscribers’ Service Data is deleted in connection with the cancellation, termination or migration of an Account within the Zendesk Services. |
| Shared Responsibility Model | This framework clarifies which party is responsible for which controls related to the security and privacy of your data. |
Application Features Related to Privacy
Zendesk has tools for each of its products to assist with user requests and other obligations under applicable privacy and data protection laws and regulations, such as data access, correction, portability, deletion, and objection. To learn about the features and functionality in each Zendesk product, please see Complying with Privacy and Data Protection in Zendesk products.