Skip to main content
Close NavigationClose Navigation

Security at Slack

Learn how Slack secures customer data at every layer.

Introduction

Slack interface showcasing security features
Slack's security-focused interface design

Slack’s mission is to make people’s working lives simpler, more pleasant, and more productive. We also believe that it’s impossible to achieve that mission without a strong foundation of trust. We’re committed to being transparent about our security practices and helping you understand our approach. This white paper outlines how we maintain the security of Slack, but as with any SaaS application, security is a collaborative responsibility between Slack and our customers – everyone is responsible for keeping data secure. For best practices on how you can improve your workspace’s security posture, click here.

Organizational Security

Security professional monitoring systems at desk
Dedicated security professionals monitor and protect Slack's systems

Slack’s industry-leading security program is based on the concept of defense in depth — securing our organization, and your data, at every layer. Our security program is aligned with ISO 27000, AICPA Trust Service Principles, and NIST standards, and is constantly evolving with updated guidance and new industry best practices. You can see all our certifications and attestations here.

Slack’s security team, led by our VP of security, is responsible for the implementation and management of our security program. The VP of security is supported by the members of Slack’s security team, who focus on security architecture, product security, security engineering and operations, customer protection, and risk and compliance.

Protecting Customer Data

The focus of Slack’s security program is to prevent unauthorized access to customer data. To this end, our team of dedicated security practitioners — working in partnership with peers across the company — take exhaustive steps to identify and mitigate risks, implement best practices, and constantly develop ways to improve.

Secure by Design

Slack follows a standardized System Development Lifecycle (SDLC) process for code changes. All code is checked into a version-controlled repository. Code changes are subject to peer review and continuous integration testing. In addition, Slack’s product security team operates continuous automated static analysis and performs threat modeling and manual testing for major features/releases via a Secure Development Lifecycle (SDL) process.

While we strive to catch all vulnerabilities in the design and testing phases, we realize that sometimes mistakes happen. With this in mind, we have created a public bug bounty program (located here) to facilitate responsible disclosure of potential security vulnerabilities. All identified vulnerabilities are validated for accuracy, triaged, and tracked to resolution.

Encryption

  • Data in transit
    All data transmitted between Slack clients and the Slack service is done so using strong encryption protocols. Slack supports the latest recommended secure cipher suites to encrypt all traffic in transit, including use of TLS 1.2 or higher protocols, AES-256 encryption, and SHA-2 signatures, whenever supported by the clients.
  • Data at rest
    Data at rest in Slack’s production network is encrypted using FIPS 140-2 compliant encryption standards, which applies to all data at rest within Slack’s systems: relational databases, file stores, database backups, etc. All encryption keys are stored in a secure server on a segregated network with very limited access. Slack has implemented appropriate safeguards to protect the creation, storage, retrieval, and destruction of secrets such as encryption keys and service account credentials. Slack also provides enterprise customers with the option to manage their own encryption keys using Slack Enterprise Key Management.

Customer data is hosted in our shared infrastructure and logically separated from other customers’ data. We use a combination of storage technologies to ensure that customer data is protected from hardware failures and returns quickly when requested. The Slack service is hosted in data centers maintained by industry-leading service providers, offering state-of-the-art physical protection for the servers and infrastructure that comprise the Slack operating environment. Slack also offers data residency, which allows organizations to choose the country or region where they want to store their data at rest.

Network Security and Server Hardening

Slack divides its systems into separate networks to better protect sensitive data. Systems supporting testing and development activities are hosted in a separate network from systems supporting Slack’s production infrastructure. All servers within our production fleet are hardened (e.g. disabling unnecessary ports, removing default passwords, etc.) and have a base configuration image applied to ensure consistency across the environment.

Network access to Slack’s production environment from open, public networks (the internet) is restricted, with only a small number of production servers accessible from the internet. Only those network protocols essential for delivery of Slack’s service to its users are open at our perimeter and there are mitigations against distributed denial of service (DDoS) attacks deployed at the network perimeter. Additionally, for host-based intrusion detection and prevention activities, Slack logs, monitors, and audits system calls, and Slack has alerting in place for system calls that indicate a potential intrusion.

Endpoint Security

All workstations issued to Slack personnel are configured and managed by Salesforce to comply with our standards for security. These standards require all workstations to be updated, tracked, and monitored by Salesforce’s endpoint management solutions. Endpoints are configured to encrypt data at rest, have strong passwords, and lock when idle. Workstations run up-to-date monitoring software to report potential malware, unauthorized software, and mobile storage devices. Mobile devices that are used to engage in company business are required to be enrolled in the appropriate mobile device management system, to ensure that they meet Salesforce security standards.

Access Control

  • Provisioning
    To minimize the risk of data exposure, Slack adheres to the principles of least privilege and role-based permissions when provisioning access, that is workers are only authorized to access data that they reasonably must handle in order to fulfill their current job responsibilities. All production access is reviewed at least quarterly.
  • Authentication
    To further reduce the risk of unauthorized access to data, Slack employs multi-factor authentication for all access to systems with highly classified data, including our production environment, which houses our customer data. Where possible and appropriate, Slack uses private keys for authentication, in addition to the previously mentioned multi-factor authentication on a separate device.
  • Password management
    Slack requires personnel to use an approved password manager. Password managers generate, store, and enter unique and complex passwords to avoid password reuse, phishing, and other password-related risks. In most cases, Slack leverages passkeys rather than passwords for a faster, easier, and more secure sign-in process.

System Monitoring, Logging, and Alerting

Slack monitors servers, workstations, and mobile devices to retain and analyze a comprehensive view of the security state of its corporate and production infrastructure. Administrative access, use of privileged commands, and system calls on all servers in Slack’s production network are logged and retained for at least two years. Analysis of logs is automated to the extent practical to detect potential issues and alert responsible personnel. All production logs are stored in a separate network that is restricted to only the relevant security personnel.

Data Retention and Disposal

Customer data is removed immediately upon deletion by the end user or upon expiration of message retention as configured by the customer administrator. Slack hard deletes all information from currently running production systems (excluding team names and search terms embedded in URLs in web server access logs) and backups are destroyed within 14 days.

Disaster Recovery and Business Continuity Plan

Slack utilizes services deployed by its hosting provider to distribute production operations across four separate physical locations. These four locations are within one geographic region, but protect Slack’s service from loss of connectivity, power infrastructure, and other common location-specific failures. Production transactions are replicated among these discrete operating environments to protect the availability of Slack’s service in the event of a location-specific catastrophic event. Slack also retains a full backup copy of production data in a remote location significantly distant from the location of the primary operating environment. Full backups are saved to this remote location at least once per day and transactions are saved continuously. Slack tests backups at least quarterly to ensure that they can be successfully restored.

Responding to Security Incidents

Slack has established policies and procedures (also known as runbooks) for responding to potential security incidents. All security incidents are managed by Slack’s security team. The runbooks define the types of events that must be managed via the incident response process and classifies them based on severity. In the event of an incident, affected customers will be informed via email from our customer experience team. Incident response procedures are tested and updated at least annually.

Vendor Management

To run efficiently, Slack relies on sub-service organizations. Where those sub-service organizations may affect the security of Slack’s production environment, we take appropriate steps to ensure our security posture is maintained by establishing agreements that require service organizations to adhere to confidentiality commitments we have made to users. We monitor the effective operation of the organization’s safeguards by conducting reviews of all service organizations’ controls before use and at least annually. Please view our sub-service organizations here.

External Validation

Data encryption and network security visualization
Advanced encryption and network security measures in action

  • Security compliance
    Slack is continuously monitoring, auditing, and improving the design and operating effectiveness of our security controls. These activities are regularly performed by both third-party credentialed assessors and Slack’s internal risk and compliance team. Audit results are shared with senior management and all findings are tracked to resolution in a timely manner. Please view our suite of compliance certifications and attestations here.
  • Penetration testing
    In addition to our compliance audits, Slack engages independent entities to conduct application-level and infrastructure-level penetration tests at least annually. Results of these tests are shared with senior management and are triaged, prioritized, and remediated in a timely manner. Customers may receive executive summaries of these activities by requesting them from their account executive.
  • Customer driven audits and penetration tests
    Our customers are welcomed to perform either security controls assessments or penetration testing on Slack’s environment. Please contact your account executive to learn about options for scheduling either of these activities.

Conclusion

Access control and authentication security systems
Multi-factor authentication and access control implementation

We have an existential interest in protecting your data. Every person, team, and organization deserves and expects their data to be secure and confidential. Safeguarding this data is a critical responsibility we have to our customers, and we continue to work hard to maintain that trust. Please contact your account executive if you have any questions or concerns.

  • The preceding information is intended for informational purposes only, and not as a binding commitment. Please do not rely on this information in making your purchasing decisions. The development, release and timing of any product, features or functionality remain at the sole discretion of Slack, and are subject to change.

 

Was this resource useful?

0/600

Awesome!

Thanks so much for your feedback!

Got it!

Thanks for your feedback.

Oops! We're having trouble. Please try again later!