
Miro demonstrates enterprise-grade security with comprehensive certifications including ISO 27001:2022, SOC 2 Type II, and ISO/IEC 42001:2023 (AI Management System). The platform maintains strong compliance signals with regional data residency options, comprehensive security controls, and regular third-party assessments, positioning it as a trusted choice for organizations requiring high-security collaboration tools.
Third-party audited certification validating comprehensive information security management system implementation with annual surveillance audits and 3-year recertification, covering 114 security controls across organizational security, human resources, operations, and access management domains.
ISO 27001:2022 Certificate - 2024-2027 (Updated June 2025)
Third-party audited international standard for AI management systems requiring comprehensive governance, risk management, and ethical AI practices with annual surveillance audits and 3-year recertification for AI system reliability.
ISO/IEC 42001:2023 Certificate 2025-2028 - AI Management System certification
A comprehensive audit report that verifies a service organization's controls related to security, availability, processing integrity, confidentiality, and privacy over a period of time (typically 6-12 months)
SOC 2 Type II Report - 2024/2025 (Added March 2025)
Previous year's SOC 2 Type II attestation report demonstrating security, availability, and confidentiality controls over a 12-month period, providing historical compliance validation and continuous security assurance.
SOC 2 Type II Report - 2023/2024
Public-facing summary of third-party SOC 2 audit results providing general information about service organization controls for security, availability, processing integrity, confidentiality, and privacy without revealing sensitive operational details or vulnerabilities.
SOC 3 Report - 2024/2025
Comprehensive visual documentation illustrating data movement through organizational systems, applications, and processes including data sources, destinations, transformation points, and security controls to ensure proper data governance, privacy protection, and regulatory compliance.
Data flow and architecture diagrams
Detailed visual documentation of organizational network infrastructure showing network topology, security devices, access points, firewalls, routers, switches, and network segmentation to illustrate overall network architecture and security control implementation for governance transparency.
Network architecture and security diagrams
Organizational policy defining acceptable and prohibited uses of company systems, networks, and resources, establishing guidelines for responsible technology use and security compliance across all organizational activities.
2025/2026 Acceptable Use Policy
Systematic process for immediately revoking system access upon employee termination, including termination checklists and defined SLAs to prevent unauthorized access and ensure prompt deprovisioning of user accounts.
Access revocation policy with termination checklists and SLAs
Organizational policy establishing requirements for antivirus software deployment, configuration, and management across all systems and endpoints to protect against malware, viruses, and other malicious software threats.
2025/2026 Antivirus Policy
Comprehensive governance framework ensuring continuous business operations through documented recovery procedures, backup strategies, alternative site provisions, and tested incident response protocols for maintaining service availability.
Business continuity and disaster recovery planning
Organizational policy requiring employees to maintain clean, secure workspaces by securing sensitive documents and information when not in use, preventing unauthorized access to confidential materials and reducing security risks.
2025/2026 Clean Desk Policy
Organizational policy establishing standards and procedures for cryptographic key generation, distribution, storage, rotation, and destruction to ensure secure encryption and decryption of sensitive data and communications.
2025/2026 Cryptographic Key Management Policy
Governance framework establishing data lifecycle management procedures including collection, storage, processing, sharing, retention, and secure disposal with data classification standards, quality controls, and privacy protection measures.
Data management and protection policies
Executive-approved security framework establishing incident detection, analysis, containment, eradication, and recovery procedures with defined roles, communication protocols, and post-incident review processes for effective security incident management.
Incident response and management procedures
Executive-approved governance framework establishing security objectives, risk management approach, and mandatory controls for data protection, access management, incident response, and security awareness across all organizational functions and personnel.
Comprehensive information security policy framework
Organizational policy establishing framework for identifying, assessing, and managing security risks across all business operations, defining risk tolerance levels and mitigation strategies to protect organizational assets and objectives.
2025/2026 Risk Management Policy
Organizational policy establishing security requirements and practices throughout the software development lifecycle, ensuring secure coding practices, security testing, and vulnerability management in all software development activities.
2025/2026 Secure Software Development Lifecycle Policy
Organizational policy establishing security requirements and guidelines for remote work environments, ensuring secure access to company systems and data while maintaining appropriate security controls and compliance standards.
2025/2026 Teleworking Policy
Formalized policy establishing anonymous reporting channels for employees and stakeholders to report potential security issues, fraud concerns, or misconduct without fear of retaliation, ensuring transparency and accountability.
Whistleblower policy with anonymous reporting channel
Industry-standard questionnaire enabling cloud service providers to document security controls and practices, allowing customers to assess cloud security posture, compliance with industry standards, and third-party risk management capabilities through standardized evaluation criteria.
Miro CSA CAIQ - 2025 (CSA Star Level 1)
Streamlined vendor security assessment questionnaire developed by the Shared Assessments Program providing standardized evaluation of third-party vendor security controls and risk management practices through industry-accepted assessment criteria and scoring methodologies.
SIG Lite questionnaire
Comprehensive documentation outlining organizational security architecture, compliance posture, and risk management approach providing detailed information about security controls, frameworks, certifications, and governance practices for stakeholder transparency and accountability.
Security compliance and best practices whitepaper
Public declarations and commitments made by an organization regarding security practices, compliance standards, data protection measures, and governance principles that demonstrate transparency and accountability to customers, partners, and stakeholders through formal communication channels.
Company security commitments communicated to customers in Master Cloud Agreement and Terms of Service
UK government-backed cybersecurity certification scheme validating implementation of basic security controls against common cyber attacks, with annual assessments covering technical controls and organizational security measures for UK businesses.
Cyber Essentials 2024-2025 Certificate of Assurance Level 1
UK government-backed cybersecurity certification scheme validating implementation of basic security controls against common cyber attacks, with annual assessments covering technical controls and organizational security measures for UK businesses.
Cyber Essentials 2025-2026 Certificate of Assurance Level 1
Financial protection mechanism providing coverage for business disruptions and financial losses resulting from cybersecurity incidents, data breaches, and other cyber-related events to ensure business continuity and risk mitigation.
Cybersecurity insurance maintained for business disruption mitigation
Pre-employment screening process to verify candidate credentials, criminal history, and employment history, ensuring only qualified and trustworthy individuals are hired for positions involving sensitive data or systems.
Employee background checks performed on new hires
Comprehensive architectural documentation illustrating organizational data security infrastructure including data classification, encryption layers, access controls, monitoring systems, and security boundaries across enterprise infrastructure for governance and compliance transparency.
Enterprise Guard Data Security Architecture Sheet
Mobile Device Management (MDM) system for device security
Regular systematic evaluations of potential threats and vulnerabilities that could impact organizational objectives, including asset identification, threat analysis, vulnerability assessment, impact analysis, and risk treatment recommendations with documented methodology and review processes.
Risk assessments performed at least annually with formal assessment of threats, changes, and fraud considerations
Formal organizational program that systematically identifies, assesses, treats, and monitors risks across the enterprise, including governance structures, methodologies, tools, and regular reporting to senior management and stakeholders with defined roles and responsibilities.
Risk management program established with documented guidance on threat identification, risk rating, and mitigation strategies
Mandatory employee education program covering cybersecurity best practices, threat recognition, and incident reporting, required within 30 days of hire and annually thereafter to maintain security-conscious workforce.
Security awareness training required within 30 days and annually
Formal contractual agreements with external vendors, suppliers, and service providers that include security requirements, data protection clauses, compliance obligations, and accountability measures to ensure comprehensive third-party risk management and governance.
Written agreements with vendors including confidentiality and privacy commitments
Automotive industry security assessment standard requiring third-party verification of information security controls for handling sensitive automotive data, with annual assessments covering data protection, access controls, and incident management for automotive supply chain compliance.
TISAX certification for automotive industry security assessment
Third-party security assessment evaluating desktop application security through systematic vulnerability testing including buffer overflows, privilege escalation, insecure data storage, and client-side security issues with documented remediation verification.
Desktop applications penetration testing results
Third-party security assessment simulating real-world cyber attacks against external-facing network infrastructure, systems, and applications to identify vulnerabilities and security weaknesses from an external attacker perspective with comprehensive remediation guidance.
External network penetration testing results
Third-party security assessment evaluating mobile applications (iOS/Android) for vulnerabilities including insecure data storage, weak cryptography, insecure communication, reverse engineering risks, and platform-specific security issues with remediation verification.
Mobile applications penetration testing results
Third-party security assessment evaluating Software Development Kits (SDKs) for vulnerabilities including insecure APIs, weak authentication mechanisms, data leakage, insufficient input validation, and integration security risks with documented remediation procedures.
SDK penetration testing results
Third-party security assessment validating web application and API security through systematic vulnerability testing covering OWASP Top 10, authentication mechanisms, authorization controls, input validation, and API-specific security controls with documented remediation verification.
Web applications and API penetration testing results
Risk of exposing sensitive information through improper sharing policies, accidental public board access, or inadequate content monitoring in collaborative platforms. The ease of sharing can lead to unintended data exposure if proper controls and user awareness are not maintained.
Miro's collaborative nature allows for easy sharing of boards, which can lead to accidental exposure of sensitive information if sharing policies are not properly configured. The platform's ease of use can inadvertently result in public access to confidential business information.
Potential non-compliance with regional data residency requirements and data sovereignty laws. Organizations operating in regions with strict data localization laws must ensure that vendor data storage aligns with their regulatory obligations and jurisdictional requirements.
While Miro offers data residency options in EU, US, and Australia, organizations must carefully configure their data residency settings to ensure compliance with regional regulations. Default EU storage may not align with all organizational requirements, requiring explicit configuration.
Security risks introduced through third-party application integrations and supply chain vulnerabilities. Each integration can introduce potential security risks if not properly vetted, monitored, and managed according to organizational security standards.
Miro integrates with numerous third-party applications including Microsoft Azure, Google Cloud Platform, and various productivity tools. Each integration introduces potential supply chain vulnerabilities that require careful assessment and monitoring to prevent unauthorized data access or security breaches.
Risks from improper configuration of role-based access controls, Single Sign-On (SSO), and user permissions leading to unauthorized access to sensitive information. Requires regular audits and proper implementation to maintain data integrity and prevent privilege escalation.
Miro's role-based access controls and SSO integration require proper configuration to prevent unauthorized board access. Improper permission settings or inadequate user provisioning can lead to exposure of sensitive collaborative content to unauthorized users.
Unclear or misaligned data retention and deletion practices that may conflict with organizational data governance requirements, regulatory compliance, and legal obligations. Organizations must ensure vendor policies align with internal data lifecycle management standards.
Miro retains customer content according to customer instructions and applicable laws, but organizations must ensure these policies align with their internal data governance requirements. The platform's data retention practices may not meet all organizational compliance needs without proper configuration and monitoring.
Potential delays in addressing security vulnerabilities, incidents, or compliance issues due to inadequate incident response procedures, slow vulnerability disclosure, or insufficient monitoring capabilities. Organizations should evaluate vendor response mechanisms for timely mitigation.
While Miro maintains a bug bounty program through Intigriti, organizations should evaluate the platform's incident response capabilities and vulnerability disclosure processes to ensure timely mitigation of security issues that could impact collaborative workflows.
Human errors and security breaches resulting from insufficient user training, lack of security awareness, or improper usage of collaboration tools. Users may inadvertently expose sensitive data, fall victim to phishing attacks, or misuse platform features without proper education and ongoing training.
The effectiveness of Miro's security features depends heavily on user awareness and proper usage. Without adequate training, users may inadvertently expose sensitive information through improper sharing, weak authentication practices, or misuse of collaborative features.
Primary cloud infrastructure provider hosting all application services, databases, and data storage. Critical infrastructure supporting 99.99% uptime requirements with global data residency controls.
Primary cloud infrastructure hosting and data storage. EU data residency (Primary: Ireland), US data residency (Primary: Ohio), AU data residency (Primary: Sydney). Provides the core cloud infrastructure for Miro's platform.
Cloud infrastructure provider hosting applications, databases, and data storage. Critical infrastructure supporting compute, storage, and AI services with enterprise-grade security and compliance.
Provides accessibility services, OCR functionality, and Miro AI capabilities. Microsoft Corporation supports Miro's AI features and accessibility features.
Cloud infrastructure provider hosting applications, databases, and data storage. Critical infrastructure supporting compute, storage, and AI/ML services with global data residency controls.
Provides Sensitive Data Discovery functionality through Enterprise Guard. Google LLC supports Miro's data security and classification features.
Customer service platform managing support tickets, knowledge base, and customer interactions. Processes customer conversations, support requests, and service analytics.
Customer support ticketing system. Zendesk, Inc. provides customer support ticket management and helpdesk functionality.
Customer communication platform managing live chat, support tickets, and user messaging. Processes customer conversations, support interactions, and user engagement data for customer success operations.
Customer success and support platform. InSided, Inc. provides customer success management and community support features.
Email delivery infrastructure handling transactional and marketing emails. Processes email content, recipient data, and delivery analytics for customer communication and marketing campaigns.
Service-related email delivery. The Rocket Science Group, LLC (Mailchimp) provides email marketing and service communication capabilities.
Product analytics platform tracking user interactions, feature usage, and conversion events. Collects detailed behavioral data for product optimization and user experience insights.
Customer training platform. Thought Industries, Inc. provides customer education and training management capabilities.
Payment processing infrastructure handling credit card transactions, subscription billing, and financial data. Processes sensitive payment information including card details, billing addresses, and transaction metadata.
Customer support services. PartnerHero, Inc. provides outsourced customer support and customer service operations.
Application performance monitoring and observability platform. Collects metrics, logs, and traces from applications and infrastructure for performance analysis and incident response.
Customer success and support platform. Gainsight, Inc. provides customer success management and customer health monitoring capabilities.