SECURITY & ACCESS CONTROLS
A safe and sound solution
As an Amazon Web Services Advanced Technology Partner, Crownpeak meets the highest industry standards for security and regulatory compliance.Show me how
Play it safe
We take the security of your data seriously
Protecting the safety and integrity of an organization's data is critical to our success. As an enterprise web content and Digital Experience Management platform used by many of the world’s largest companies including those operating in very high regulated environments, we apply system and data security protections at all layers of the technology stack.
Encrypted at every turn
Using inheritance-based access control lists (ACLs), administrators can define access rules for all the content managed by Crownpeak. Data is encrypted in transit throughout the Crownpeak Platform; encryption for data at rest is also available. All storage is wiped to US DoD 5220.22-M or NIST 800-88 standards both before it is provisioned for use by the Crownpeak Platform and after it is released.
You dictate who gets access
Group-based ACLs are defined to partition and regulate the functions any given group can perform. Users must have access to both the asset and the particular function they wish to carry out before they can perform any action on any asset.