
Conversational AI marketing platform acquired by Salesloft in 2024, with ISO 27001, ISO 27701, and SOC 2 Type II certifications plus CREST-certified penetration testing. Critical August 2025 breach compromised 700+ organizations via integration exploits. Chat platform risks include potential data exposure through conversations and visitor privacy awareness considerations requiring proper implementation controls.
Third-party audited certification validating comprehensive information security management system implementation with annual surveillance audits and 3-year recertification, covering 114 security controls across organizational security, human resources, operations, and access management domains.
Third-party audited ISO/IEC 27001:2022 certification by Schellman validating comprehensive information security management system with annual surveillance audits. Certificate published June 2025 covering Salesloft+Drift platforms with Statement of Applicability detailing 114 security controls.
Third-party audited certification validating privacy information management systems with annual surveillance audits covering privacy controls and data protection requirements for organizations processing personal data.
ISO/IEC 27701:2019 Privacy Information Management System certification demonstrating compliance with privacy management requirements. Third-party audited by Schellman with Statement of Applicability published June 2025 covering personal data processing controls.
A comprehensive audit report that verifies a service organization's controls related to security, availability, processing integrity, confidentiality, and privacy over a period of time (typically 6-12 months)
Annual SOC 2 Type 2 attestation report validating security, availability, and confidentiality controls through independent assessment. 2024 report published June 2025 with bridge letter extending coverage through July 2025 until new 2025 report availability.
Organizational policy defining acceptable and prohibited uses of company systems, networks, and resources, establishing guidelines for responsible technology use and security compliance across all organizational activities.
Acceptable-Use Standard (STND-300) defining prohibited uses of platforms and services including illegal, harmful, or offensive activities. Policy protects platform integrity and user security with enforcement mechanisms for violations.
Comprehensive governance framework ensuring continuous business operations through documented recovery procedures, backup strategies, alternative site provisions, and tested incident response protocols for maintaining service availability.
Formal Business-Continuity and Disaster-Recovery Policy (POL-400) with geographically diverse teams ensuring regional events don't disrupt critical functions. All personnel can work remotely, effectively testing BC capabilities continuously.
Comprehensive recovery framework detailing IT system restoration procedures, recovery time objectives, backup strategies, testing protocols, and incident response measures for maintaining business operations during disruptive events.
High-availability architecture utilizing multi-AZ configuration with near-real-time data replication across data centers. Recovery Point Objective (RPO) of 60 minutes or less with automated CI/CD deployment enabling transparent disaster recovery.
Executive-approved security framework establishing incident detection, analysis, containment, eradication, and recovery procedures with defined roles, communication protocols, and post-incident review processes for effective security incident management.
Dedicated incident response team with formal Incident Response Standard (STND-206) defining detection, analysis, containment, and recovery procedures. Includes security breach notification protocols and escalation processes updated June 2025.
Executive-approved governance framework establishing security objectives, risk management approach, and mandatory controls for data protection, access management, incident response, and security awareness across all organizational functions and personnel.
Comprehensive Information Security Policy (POL-200) establishing governance framework for security objectives, risk management, and mandatory controls across organizational functions. Policy updated June 2025 incorporating defense-in-depth approach and ISO 27001 alignment.
Comprehensive privacy policy outlining data collection, processing, storage, and sharing practices, user rights, and privacy safeguards to ensure transparent and compliant data handling practices.
Detailed privacy framework including Privacy Notice, Platform Privacy Notice, and Data Privacy Framework Privacy Notice covering GDPR, CCPA/CPRA compliance. Outlines data collection, processing, security measures, and data subject rights with DPF certification for EU-US transfers.
Security vulnerability disclosure framework establishing clear guidelines for security researchers to report vulnerabilities with defined scope, submission process, and response timelines for coordinated vulnerability management.
Formal Vulnerability Disclosure Program (VDP) allowing responsible disclosure of security vulnerabilities with clear submission process and response timelines. Policy establishes coordinated vulnerability management approach for security researchers.
Industry-standard questionnaire enabling cloud service providers to document security controls and practices, allowing customers to assess cloud security posture, compliance with industry standards, and third-party risk management capabilities through standardized evaluation criteria.
Cloud Security Alliance Consensus Assessment Initiative Questionnaire (CAIQ) v4.0.2 self-assessment completed February 2025. Published in Trust Portal demonstrating alignment with CSA security best practices for cloud service providers.
Security vulnerability disclosure program inviting security researchers to report vulnerabilities with monetary rewards based on severity and impact, enabling proactive security testing and vulnerability management.
Active bug bounty program operated through HackerOne platform enabling independent security researchers to identify and responsibly disclose vulnerabilities. Program includes ongoing security testing with defined scope, submission guidelines, and response expectations.
Financial protection mechanism providing coverage for business disruptions and financial losses resulting from cybersecurity incidents, data breaches, and other cyber-related events to ensure business continuity and risk mitigation.
Active cybersecurity insurance coverage with Certificate of Insurance (COI) published in Trust Portal. 2025-26 insurance certificate updated June 2025 providing financial protection against security incidents and data breach liability.
Advanced encryption standard implementing 256-bit key length for data at rest protection, providing military-grade security for sensitive data storage and ensuring confidentiality of customer information.
Storage-layer encryption using AES-256-GCM for all customer data at rest in addition to hardware-layer full-disk encryption from IaaS providers. Application-layer encryption applied for select sensitive data elements per Cryptographic Standard (STND-203).
Legal agreement establishing data processing terms, responsibilities, and safeguards between data controller and processor, ensuring compliance with data protection regulations and defining data handling requirements.
Comprehensive Data Processing Addendum (DPA) establishing Salesloft's obligations as processor of personal data under GDPR, CCPA/CPRA, and applicable privacy regulations. Includes Standard Contractual Clauses for international transfers and data subject rights.
Designated data protection officer (DPO) responsible for overseeing data protection compliance, providing privacy guidance, and serving as a point of contact for data protection matters and regulatory inquiries.
Designated Data Protection Officer (DPO) with formal policy (PRIV-004) establishing DPO responsibilities for GDPR compliance, privacy program oversight, and data subject request management. Updated June 2025 with privacy governance framework.
Regional data storage options enabling customers to host content in specific geographic regions to meet data sovereignty requirements and compliance with local regulations.
Salesloft platform offers US or EU hosting region choice with in-region data residency maintained. Drift currently offers US hosting only. Each region operates independently with geographic isolation: US (AWS us-east-1, GCP us-central1), EU (GCP europe-west3 Frankfurt).
Configurable data retention policies enabling organizations to control data lifecycle, including zero data retention options for compliance requirements and data sovereignty needs.
Self-service data retention with customer-controlled deletion through UI, APIs, or CRM synchronization rules. Conversations recordings retention configurable by customers. 30-day post-termination retention period before automatic data deletion per Master Subscription Agreement.
Pre-employment screening process to verify candidate credentials, criminal history, and employment history, ensuring only qualified and trustworthy individuals are hired for positions involving sensitive data or systems.
Background checks performed for all employees prior to onboarding including employment/educational history verification and criminal checks as permitted by jurisdiction. Credit checks performed for senior financial positions with confidentiality agreements required.
Enterprise-grade access controls including multi-factor authentication, single sign-on (SAML SSO), and role-based access controls for comprehensive user management and security.
Identity Provider/SSO solution enforcing multi-factor authentication (MFA), device trust, and re-authentication requirements. Support for Okta, SAML, Google OpenID Connect, Salesforce IDP, OneLogin, and Microsoft Azure (Entra) integrations.
Comprehensive access controls restricting privileged access to production systems, databases, applications, and infrastructure to authorized users with documented business need and proper authorization procedures.
Zero-trust model with least-privilege access provisioning and segregation of duties. Automated workflow from HRMS to IdP/SSO with role-based access provisioning and automatic revocation upon job changes or termination. Quarterly access reviews performed.
Mandatory employee education program covering cybersecurity best practices, threat recognition, and incident reporting, required within 30 days of hire and annually thereafter to maintain security-conscious workforce.
Mandatory security and privacy awareness training during onboarding and annually thereafter covering phishing, social engineering, confidentiality, and GDPR. Automated phishing-test campaigns conducted monthly with web-based training platform tracking completion.
Centralized Security Information and Event Management (SIEM) system for secure storage and continuous monitoring of infrastructure logs, enabling real-time analysis to detect, alert, and mitigate potential security threats promptly.
SIEM solution with 24x7x365 monitoring by security vendor performing Tier 1 triage and analysis. Critical alerts escalated to Salesloft Security team with after-hours on-call rotation and automated escalations to additional personnel.
Transport Layer Security protocol implementing TLS 1.2 or higher for data in transit protection, ensuring secure communication channels and preventing unauthorized interception of customer data during transmission.
All connections use HTTPS/TLS encryption with support for TLS 1.2 and higher protocols. Qualys SSL Labs testing available for accounts.salesloft.com, app.salesloft.com, start.drift.com, and app.drift.com demonstrating strong cipher suite configurations.
Formal vulnerability management process including regular vulnerability assessments, patch management with documented SLAs, vulnerability prioritization and remediation based on severity levels, and continuous monitoring of security vulnerabilities.
Vulnerability Management Standard (STND-208) establishing risk-based prioritization and tracking through dispensation. Daily infrastructure scanning with cloud-native security tools, EDR/XDR, PAM solution, and automated alerting for identified vulnerabilities.
Industry-leading Web Application Firewall (WAF) service monitoring web traffic, detecting anomalies, and deploying rulesets to protect online applications from security threats and ensure continued security and availability.
Web Application Firewall (WAF) protecting against application-layer vulnerabilities and attempted exploits. Integrated with DDoS protection and cloud-native security tools from GCP and AWS infrastructure providers.
Regular independent security assessments conducted by third-party experts to identify vulnerabilities and security weaknesses before exploitation, ensuring ongoing security validation.
Annual third-party penetration testing performed by CREST-certified vendor following OWASP methodology. 2024-2025 Letter of Assessment published June 2025 covering Drift platform web application, mobile app, and infrastructure security assessments.
Security risks introduced through third-party application integrations and supply chain vulnerabilities. Each integration can introduce potential security risks if not properly vetted, monitored, and managed according to organizational security standards.
August 2025 critical security breach where financially motivated threat group exploited Drift platform integrations to access connected systems, potentially compromising over 700 organizations including Cloudflare, Zscaler, and Palo Alto Networks. Attackers compromised OAuth tokens through Salesforce integration. Salesloft recommended all Drift customers revoke and rotate existing API keys and engaged cybersecurity firms for forensic investigation.
Risk of exposing sensitive information through improper sharing policies, accidental public board access, or inadequate content monitoring in collaborative platforms. The ease of sharing can lead to unintended data exposure if proper controls and user awareness are not maintained.
Drift chat conversations may inadvertently expose sensitive business information if users share confidential data, financial details, or internal communications through chat widgets. Platform's ease of engagement requires proper user training and data classification awareness to prevent unintended disclosure of proprietary information through conversational interactions.
Human errors and security breaches resulting from insufficient user training, lack of security awareness, or improper usage of collaboration tools. Users may inadvertently expose sensitive data, fall victim to phishing attacks, or misuse platform features without proper education and ongoing training.
Website visitors engaging with Drift chat widgets may not fully understand data collection practices, cookie deployment, or how conversation data is processed and stored. Drift's Wiretapping FAQ addresses compliance concerns, but customer implementation requires clear privacy notices and consent mechanisms to ensure visitor awareness.
Risk of sensitive data being inadvertently included in model training datasets or exposed through model outputs, potentially violating privacy regulations and data protection requirements.
While Drift contractually prohibits third-party AI providers from using customer data for model training, the platform's AI-powered chat features process sensitive conversation content. Customers must understand data flows to AI processors (GCP, AWS, Microsoft) and ensure compliance with privacy regulations for chat data handling.
Primary cloud infrastructure provider hosting all application services, databases, and data storage. Critical infrastructure supporting 99.99% uptime requirements with global data residency controls.
Primary IaaS hosting provider for all Drift platform services and data storage. Provides compute, storage, database, and AI infrastructure with multi-AZ high-availability configuration for resiliency and near-real-time data replication.
Cloud infrastructure provider hosting applications, databases, and data storage. Critical infrastructure supporting compute, storage, and AI/ML services with global data residency controls.
AI processing infrastructure provider for Drift platform artificial intelligence features. Supports transcription services, natural language processing, and machine learning capabilities with enterprise security controls.
Cloud data warehouse platform hosting structured and semi-structured data. Provides scalable data storage, analytics, and business intelligence for large-scale data processing and analysis.
Data warehouse and analytics platform processing all subject information for Drift platform. Provides data analytics capabilities with enterprise security, encryption, and compliance controls. Added as subprocessor August 2025.
Email delivery infrastructure handling transactional and marketing emails. Processes email content, recipient data, and delivery analytics for customer communication and marketing campaigns.
Email delivery service provider for Drift platform handling email notifications and communications. Processes contact information and email content with enterprise-grade delivery infrastructure and security controls.
Email delivery platform (owned by MessageBird) providing transactional and marketing email infrastructure. Processes email content, recipient data, and delivery analytics for high-volume email sending.
Email delivery service provider (MessageBird) for Drift platform handling email exchange contents. Provides reliable email delivery infrastructure with monitoring and analytics capabilities for platform communications.
Azure OpenAI Service providing large language model capabilities for Drift AI-powered features. Third-party AI processor with contractual prohibitions against using customer data for model training. Customer data anonymized and de-identified per DPA requirements.
SolarWinds Loggly service providing log aggregation and analysis capabilities. Processes subject information captured in system logs for operational monitoring, troubleshooting, and security analysis purposes.
Operational monitoring platform for Drift Video services. Incidentally captures subject information through logging and monitoring activities to ensure service performance, availability, and reliability.
Data enrichment service for Drift Intel feature processing contact information and identifiers. Provides account intelligence and visitor identification capabilities to enhance lead qualification and sales intelligence workflows.