Data Privacy. Security. Compliance.
These matter to you. And they are imperative to us.
Customers turn to Splunk to understand and improve their security posture. We practice what we preach. We are dedicated to keeping your data secure and private. We are committed to adhering to global and industry compliance initiatives. We prepare for incidents, and we help you prepare, respond to and remediate the consequences of any incidents.
Security by Design
Security and compliance are top-of-mind throughout our development process. Our products are designed to meet your data handling needs, with access controls, auditability, assurance of data integrity, and integration with enterprise single-sign on solutions.
Training and Internal Policies
It’s not enough to build secure products. Every person at an organization is responsible for making sure data is secure. We train employees on policies and procedures for secure data handling, and use physical and procedural safeguards to help keep our facilities and equipment secure.
Meeting International and Industry Standards
Splunk complies with both industry and international security standards.This includes participating in rigorous third-party audits that verify security controls for our cloud solutions.
Granular Access and Audit Controls
Role-based access and audit controls allow you to control and monitor the actions your Splunk users can take, and what data, tools and dashboards they can access.
- Learn more about configuring role-based user access and audit controls.
- You can build your own roles to map to your organization’s data access policies for different classes of users. You can also map Lightweight Directory Access Protocol (LDAP) or Security Assertion Markup Language (SAML) groups to different roles.
Security Certifications and Attestations (SOC2 Type II and ISO 27001)
Splunk Cloud maintains a comprehensive security program designed to protect your data’s confidentiality, integrity, and availability in accordance with the highest industry standards. Splunk Cloud is regularly audited by independent third-party auditors for SOC2 Type II and ISO 27001 security compliance.
Still Have Questions?