Skip to content

SEcurity

The secure way to scale AI

Don’t compromise. Zapier is the only AI orchestration platform that combines the oversight IT demands with the speed your business teams need.

Image
AI Security

AI under your control

Use AI on your terms. Control who in your org can access third-party AI app integrations and know your data won’t be used to train AI models*. 

Reliability

Built for resilience

Zapier’s event-driven architecture helps your workflows run smoothly, even when APIs change, and integrates with nearly 8,000 apps.

Governance & observability

Granular access & visibility

Zapier provides role-based access and audit logs for oversight of who’s automating what, and when.

Zapier is trusted by companies where security comes first

IDENTITY ACCESS MANAGEMENT

FINANCIAL SERVICES

BIOTECH SAAS

AUDIT MANAGEMENT SOFTWARE

CLOUD STORAGE

INDUSTRIAL TECHNOLOGY

Customers trust us to keep their data secure and safe. I have 100% confidence that Zapier handles that data with the utmost security.

— Connor Sheffield, Head of Marketing Ops and Automation, Zonos

Platform Capabilities

A foundation built on data security

SOC 2 (TYPE II)

SOC 3

CCPA

GDPR Compliant

GDPR UK Compliant

AI Security

Zapier ensures AI-driven automation is secure, transparent, and compliant, giving users full control over data and app interactions.

Features

Enterprise plan governance

Turn off third-party integrations with AI apps entirely or limit to the ones you want your users to use

Model training opt-out

Automatic opt-out for Enterprise customers, and easy opt-out for all other customers

Reliability

With automated high availability, fault tolerance, and built-in redundancy, Zapier keeps mission-critical workflows running smoothly.

Features

Outage detection

Keep your data safe when partners experience downtime

Intelligent throttling

Never lose data, even during peak traffic

API change management

Zero workflow disruptions when partner APIs evolve

Data checkpoints

Complete confidence your workflows will always finish

Horizontal scalability

Handle fluctuating workflow volume without performance degradation

Data security and privacy

Zapier protects sensitive data with enterprise-grade encryption, strict access controls, and compliance with GDPR, SOC 2 (Type II), and CCPA.

Features

AWS cloud security

Enterprise-grade infrastructure trusted by industry leaders

Bug bounty program

Continuous security improvement through ethical hacker insights

Annual third-party penetration tests

Independent verification of our robust defenses

Security logging and monitoring

Real-time threat detection for immediate response

Custom data retention for Zaps

Control exactly how long your sensitive data remains

Encryption in transit to all Zapier products

Your data is protected en route

Encryption at rest (AES-256)

Enterprise-grade security for your stored information

Governance and observability

Zapier provides real-time audit logs and granular permissions for complete security oversight and control.

Features

SSO (SAML)

Seamless secure access with your existing identity provider

SCIM

Automate user provisioning for efficient access management

2FA

Add an essential second layer of protection to prevent unauthorized access

Application controls

Granular permissions to enforce your security policies

Domain capture

Complete visibility and control of your organization's Zapier usage

Shared app connections

Centralized credential management for enhanced security

IP allowlist

Restrict access to trusted networks only

Audit log

Complete visibility into user actions for compliance and security tracking

Analytics and Zap runs API

Data-driven insights to optimize your automation security

Why 87% of the Forbes Cloud 100 Trust Zapier: A Message from our Head of Security

We can do a lot of advanced things with Zapier and it's very easy. I don't need a highly technical team—I just need the right tools.

— Korey Marciniak, Senior Manager of Customer Support Strategy and Operations, Okta

FAQ

What security measures does Zapier implement to protect user data?

Zapier uses the latest encryption methods to protect your data. Zapier web application communications are encrypted over TLS 1.2, and data is encrypted at rest using AES-256 encryption. Please refer to our Trust Center for more details. 

Is Zapier compliant with SOC 2 and SOC 3 standards?

Yes, Zapier has obtained SOC 2 Type II and SOC 3 certifications, demonstrating adherence to stringent security and compliance standards.

How does Zapier handle data privacy in AI functionalities?

Zapier ensures AI-powered automation is designed with privacy at the forefront, and all AI-driven features comply with GDPR, CCPA, and other privacy regulations. Enterprise customers’ data is not used to train AI models, and all other customers can opt out of data training by filling out this form.

Does Zapier use customer data to train AI models?

Enterprise customers are automatically opted out of data training, and customers on other plans can opt out of data training by filling out this form.

What cloud service provider does Zapier utilize?

Zapier is hosted on Amazon Web Services (AWS) in the United States and leverages AWS security best practices for data protection and redundancy.

Does Zapier offer two-factor authentication (2FA)?

Yes, Zapier offers two-factor authentication (2FA) to help prevent unauthorized access to accounts.

How can I review Zapier's security practices?

You can review Zapier's security documents, compliance certifications, and policies in the Zapier Trust Center.

What is Zapier's approach to vulnerability management?

Zapier follows a proactive security model with regular threat assessments, penetration testing, and a Bug Bounty Program to identify and remediate vulnerabilities.

Where can I find Zapier’s SOC 2 and SOC 3 report?

Zapier's SOC 2 and SOC 3 report is publicly available for review at the Zapier Trust Center.

How does Zapier monitor and log user activities?

Zapier provides audit logs that track user and automation activities, ensuring transparency and compliance for enterprise security teams.

See what Zapier can do for your business

*Enterprise customers are automatically opted out, and customers on other plans can opt out by submitting the opt-out form. Security controls and certifications may vary by beta products.