Skip to main content

Secure Customer Service

Cover your bases

Zendesk takes security very seriously – just ask the number of Fortune 100 and Fortune 500 companies that trust us with their data. We use a combination of enterprise-class security features and comprehensive audits of our applications, systems and networks to ensure that your data is always protected, which means every customer can rest easy – our own included.

Compliance Certifications and Memberships

Zendesk uses best practice and industry standards to achieve compliance with industry-accepted general security and privacy frameworks, which in turn helps our subscribers meet their own compliance standards.

Compliance badges

SOC 2 Type II

We undergo routine audits to receive updated SOC 2 Type II reports, available upon request and under NDA. Request the latest SOC 2 Type II report.

ISO 27001:2022

Zendesk is ISO 27001:2022 certified. Download the certificate.

ISO 27018:2019

Zendesk is ISO 27018:2019 certified. The certificate is available for download here.

ISO 27701:2019

Zendesk is ISO 27701:2019 certified. The certificate is available for download here.

ISO 27017:2015

Zendesk is ISO 27017:2015 certified. The certificate is available for download here.

FedRAMP LI-SaaS

Zendesk is FedRAMP authorised with Low Impact Software-as-a-Service (LI-SaaS) and is listed in the FedRAMP Marketplace. US Government agency customers can request access to the Zendesk FedRAMP Security Package by completing a Package Access Request Form here or by submitting a request to fedramp@zendesk.com.

Artifacts

Explore our Conveyor Trust Portal for on-demand, self-serve access to up-to-date security artifacts — certifications, audit reports, policies, and questionnaire answers.

Cloud Security

Facilities

Zendesk hosts Service Data primarily in AWS data centres that have been certified as ISO 27001, PCI DSS Service Provider Level 1, and/or SOC 2 compliant. Learn about Compliance at AWS.

AWS infrastructure services include backup power, HVAC systems, and fire suppression equipment to help protect servers and ultimately your data. Learn more about Data Centre Controls at AWS.

On-Site Security

AWS on-site security includes features such as security guards, fencing, security feeds, intrusion detection technology, and other security measures. Learn about AWS physical security.

Data Hosting Location

Zendesk leverages AWS data centres in the United States, Europe, and Asia Pacific. Learn more about Data Hosting Locations for your Zendesk Service Data.

Zendesk offers multiple data locality choices including the United States (US), Australia (AU), Japan (JP), or European Economic Area (EEA). For more information on product, plan, and regional offerings please see our Regional Data Hosting Policy.

Application Security

Secure Code Training

Annual secure code training for all engineers, based on OWASP Top 10 security risks.

Framework Security Controls

Zendesk leverages modern and secure open-source frameworks with security controls to limit exposure to OWASP Top 10 security risks. These inherent controls reduce our exposure to SQL Injection (SQLi), Cross Site Scripting (XSS), and Cross Site Request Forgery (CSRF), among others.

Quality Assurance

Our Quality Assurance (QA) department reviews and tests our code base. Dedicated application security engineers on staff identify, test, and triage security vulnerabilities in code.

Separate Environments

Testing and staging environments are logically separated from the Production environment. No Service Data is used in our development or test environments.

Product Security

Authentication Options

Zendesk has several different authentication options: subscribers can enable native Zendesk authentication, social media Single sign-on (SSO) (Facebook, Twitter, Google), and/or Enterprise SSO (SAML, JWT) for end user and/or agent authentication. Learn about user access.

Configurable Password Policy

Zendesk native authentication for products available through the Admin Centre provides the following levels of password security: low, medium and high, as well as set custom password rules for agents and admins. Zendesk also allows different password security levels to apply to end users vs. agents and admins. Only admins can change the password security level. Learn more about configurable password policies.

2-Factor Authentication (2FA)

Zendesk native authentication for products available through the Admin Centre offers 2-factor (2FA) for agents and admins via SMS or an authenticator app. Learn about 2FA.

Service Credential Storage

Zendesk follows secure credential storage best practice by never storing passwords in human-readable format, and only as the result of a secure, salted, one-way hash.

Advanced Data Privacy and Protection

For businesses that need a higher level of data privacy and security, Zendesk offers the Advanced Data Privacy and Protection add-on. The add-on includes capabilities for BYOK encryption, customisable data retention policies, data masking, PII redaction and access logs.

HR Security

Policies

Zendesk has developed a comprehensive set of security policies covering a range of topics. These policies are shared with and made available to all employees and contractors with access to Zendesk information assets.

Training

All employees attend a Security Awareness Training, which is given upon hire and annually thereafter. All engineers receive annual Secure Code Training. The Security team provides additional security awareness updates via email, blog posts, and in presentations during internal events.

Welcome to the Zendesk Global Privacy Programme

Zendesk has a formal global privacy and data protection programme, which includes cross-functional key stakeholders including Legal, Security, Product, and Executive sectors of the company. As privacy advocates, we work diligently to ensure our Services and team members are dedicated to compliance with applicable regulatory and industry frameworks.

The Australian Privacy Act of 1988 (as amended) provides several data subject rights and added mandatory notification of eligible data breaches. Unlike the GDPR, there are no concepts of data controller and data processor. https://www.zendesk.co.uk/company/anz-privacy/

Subscriber Service Data Details

Service Data is any information, including personal data, which is stored in or transmitted via the Zendesk Services by, or on behalf of, our subscribers and their end users. We use Service Data to operate and improve our Services, help customers access and use the Services, respond to subscriber inquiries, and send communications related to the Services.

Access: Zendesk provides an advanced set of access and encryption features to help customers effectively protect their information. We do not access or use customer content for any purpose other than providing, maintaining, and improving the Zendesk services and as otherwise required by law. See here for additional information.

Data Hosting: Zendesk uses Amazon Web Services to host Service Data as described here and in the Regional Data Hosting Policy. For additional information, please also see the Security section.

Default Data Types Collected by the Service: Zendesk has created a list of data points, categorised by product. For the full picture of data types, subscribers can use this list in conjunction with their specific intended use case and resultant data types.

Legal or Government Requests: Privacy, data security and subscriber trust are our top priorities. Zendesk does not disclose Service Data, except as necessary to provide our Services and to comply with applicable laws, as detailed in our Privacy Policy. To assist our subscribers in performing compliance reviews, we have additional resources: Transparency Report and Government Request Policy.

Ownership: From a privacy perspective, the subscriber is the controller of Service Data and Zendesk is a processor. This means that throughout the time that you subscribe to services with Zendesk, you retain ownership of and control over Service Data in your Zendesk instance.

Replication: Zendesk periodically replicates data for purposes of archival, backup, and audit logs. We use Amazon Web Services (AWS) to store some of the information that is backed up, such as database information and attachment files. Please see our Regional Data Hosting Policy for further details.

Security: Zendesk prioritises data security and combines enterprise-class security features with comprehensive audits of our applications, systems, and networks to ensure subscriber and business data is protected. See additional information here.

Security Incidents: For more information about security incident management see our Security Incident Response.

Sub-processors: Zendesk may use sub-processors, including affiliates of Zendesk, as well as third-party companies, to provide, secure, or improve the Services, and such sub-processors may have access to Service Data. Our Sub-processors policy provides an up-to-date list of the names and locations of all sub-processors.

Termination: Zendesk maintains a Service Data Deletion Policy that describes Zendesk’s data deletion processes upon subscriber’s termination or expiration of the Zendesk subscription.

Privacy Related Policies

Cookie Policy

Detailed information about how and when we use cookies on Zendesk websites.

In-Product Cookie Policy

Provides information about how and when Zendesk uses cookies within the Zendesk Services.

Service Data Deletion Policy

How our Subscribers’ Service Data is deleted in connection with the cancellation, termination or migration of an Account within the Zendesk Services.

Shared Responsibility Model

This framework clarifies which party is responsible for which controls related to the security and privacy of your data.

Application Features Related to Privacy

Zendesk has tools for each of its products to assist with user requests and other obligations under applicable privacy and data protection laws and regulations, such as data access, correction, portability, deletion, and objection. To learn about the features and functionality in each Zendesk product, please see Complying with Privacy and Data Protection in Zendesk products.

Zendesk AI

Zendesk AI is built based on the core principles of privacy, security and compliance, by design. Our commitment to providing businesses with secure, trusted products and solutions is embedded in our DNA. As part of this, Zendesk leverages a set of design principles that not only set the standard for how we design, develop and build everything we do, but set a clear foundation for our use of AI for customer experiences (CX and employee experience (EX)).

Service Data processed by Zendesk AI is subject to all security standards and commitments, including compliance with Zendesk’s robust Enterprise Security Measures, and storage within Zendesk’s SOC 2-compliant environment. Service Data will not be shared with any other customer.

Generative AI features are currently powered by OpenAI. OpenAI deletes all data after producing the output, without any storage. OpenAI data security practices are available here.

This could be the beginning of a beautiful relationship