Security and Compliance Settings
Last updated July 29, 2024
Workato prioritizes the security and compliance of your data and workflows. It provides various settings and features to ensure that your automations operate securely and in accordance with industry standards and regulations. This article will guide you through understanding and configuring Workato’s security and compliance settings.
Security Features
- Two-Factor Authentication (2FA): Workato enables 2FA for added account security, requiring users to provide an additional authentication factor beyond their password.
- Role-Based Access Control (RBAC): Workato allows you to define roles with specific permissions to manage user access and control what actions users can perform.
- Data Encryption: Workato encrypts sensitive data at rest and in transit to protect it from unauthorized access.
- Security Audits: Workato provides detailed security audit logs to track user activity, access permissions, and changes to settings.
- IP Whitelisting: You can restrict access to Workato from specific IP addresses to enhance security.
- Secure Connectors: Workato connectors are designed to securely integrate with applications, adhering to industry standards and best practices.
Compliance Certifications
- SOC 2 Type II: Workato has achieved SOC 2 Type II certification, demonstrating its commitment to meeting stringent security and compliance standards for data security.
- GDPR: Workato is GDPR compliant, ensuring adherence to European Union data protection regulations.
- HIPAA: Workato offers HIPAA compliance features for organizations operating in the healthcare industry, complying with regulations for handling protected health information (PHI).
- Other Compliance Standards: Workato may offer compliance certifications for other industry-specific regulations as needed.
Configuring Security and Compliance Settings
- Access Account Settings: Within your Workato account, navigate to the account settings or "Security" section.
- Enable Two-Factor Authentication: Turn on 2FA to require an additional authentication step for account login.
- Configure Roles: Define roles with specific permissions to manage user access and control their actions.
- Review and Configure Security Settings: Explore and adjust other security settings, such as IP whitelisting, audit logs, and data encryption options.
- Stay Informed: Monitor Workato's announcements and updates for information on new security features and compliance certifications.
By understanding Workato’s security features and configuring settings appropriately, you can enhance the security and compliance of your automations, ensuring that your data and workflows are protected and handled responsibly. Workato’s commitment to security and compliance provides confidence in using the platform to automate your processes effectively and securely.
Was this article helpful?