Security at Knak
Enterprise-grade security and compliance. Safeguard your data with robust protection, privacy controls, and industry-leading standards.


SOC 2 Type II
CERTIFIED
Trusted by
Protecting Your Service Data
Compliance Reports
Continuous SOC 2 control testing and annual audits conducted by independent third-party. Reports available in our Trust Center.
Regular Pentesting
Knak performs bi-annual pentests on the application and cloud infrastructure. Reports available in our Trust Center.
24/7 Monitoring
We leverage a 24/7 MDR service to monitor logs and escalate any findings to our team.
Vulnerability Scanning
Knak has vulnerability scanning baked into the development process, automatically scanning code before it's pushed to production. Any findings are tracked and remediated within our SLAs.
Third-Party Risk Management
Vendors are reviewed in accordance with risk levels and sensitivity of data. We ensure our vendors have appropriate security controls in place to handle our customer and organization data, through reviewing security questionnaires and reports.
Least Access Privilege
Access Reviews
Knak conducts quarterly Access Reviews to regularly check whether access and permission levels are appropriate for applications.
Access Approval
Access to new applications requires an approval workflow that ensures access is provided with least access privilege and are required for daily responsibilities or a special project.
Product Security
Single Sign On
Knak offers SSO via SAML 2.0 to all of our customers.
Encryption
All data is encrypted in transit and at rest using industry standard methods.
Session Timeout
Sessions within the Knak platform timeout after 30 minutes of inactivity, reducing the risk of attackers hijacking the session.
Granular User Permissions (RBAC)
The Knak application offers a standard suite of roles along with the ability to create custom roles to meet any business needs. The user permission system grants customers the ability to facilitate role based access control and set guardrails at a variety of levels to ensure least access privilege.
Availability
Uptime and Availability
Knak is committed to offering transparency around our uptime and current status. See Knak’s realtime and historical uptime here.
Backup & Resiliency
Backups of data are taken on a daily basis. To support our resiliency efforts these backups are replicated in a geographically distinct region.
Disaster Recovery & Business Continuity
Disaster Recovery and Business Continuity plans are maintained by Knak and tested annually to mitigate risks when the plans must be put into action.
SOC 2 Type II
Knak has systems audited by an accredited third-party for compliance with SOC 2 Type II in relation to Security, Availability and Availability on an annual basis.

AI
Knak’s AI Features are opt-in by default.
See more about our approach to AI in our Trust Center.
Responsible Ethical Disclosure
Knak is committed to guarding the safety and security of our customers.
We follow best practices when it comes to Responsible Ethical Disclosure and receive any security concerns from researchers to security@knak.com.
Ready to see Knak in action?
Get a demo and discover how visionary marketers use Knak to speed up their campaign creation.
