- EU-US Privacy Shield
6 more topics
- Product Security
- Audit Logs
Asana’s Audit Log API provides Admins in Enterprise organizations access to an immutable log of key events across their organization.
4 more topics
- Data Processing Addendum
- Availability & Reliability
- Data Redundancy
Asana uses Amazon's relational database service (RDS) to manage all user data. The database is replicated synchronously so that Asana can typically recover from a database failure in a matter of seconds.
- Organizational Security
- Confidentiality Agreements
Asana team members are bound by confidentiality agreements, but may access your data to the extent necessary to diagnose and correct problems in the product.
- Business Continuity
- Business Continuity Plan
Asana’s infrastructure investments provide daily backups, regional backups, and recovery procedures for restoring services in the event of unavoidable failures.
- Threat Management
- Penetration Testing
Asana maintains an information security program, which includes penetration testing performed by a qualified third party on an annual basis.
Sign up to view Asana's Subprocessors
Sign up to see the rest of Asana's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.