Splunk Security Page Overview

Splunk
Key Takeaways

CTA buttons

Customer Trust Portal, vulnerability reporting

Compliance certifications

FedRAMP, SOC, HIPAA

Highlights

Data privacy, cloud security, product security
Based on the page highlights.

Short Overview

Splunk covers all security, compliance, data privacy information, certifications, and principles on its security page with additional tabs for detail pages such as Compliance and Security Portal. The page includes Splunk's guiding principles in relation to data security, such as Data Privacy, Security, and Compliance. Following the security highlights, there are quick links to other resource pages as well as the Customer Trust Portal which requires login. The remaining page elements include links to a whitepaper, Data Request Guidelines, and a CTA button to report a security vulnerability.

Highlighted keywords: Data, privacy, trust

Security Page Structure

Splunk rounds up Security, Data Privacy, Compliance, and Customer Trust Portal under the Splunk Protects page. The security tab falls into three categories; Cloud Security, Corporate Security, Product Security.

Security Page link: splunk.com/en_us/about-splunk/splunk-data-security-and-privacy

Compliance Page: splunk.com/en_us/about-splunk/splunk-data-security-and-privacy/compliance-at-splunk

Page highlights

  • Data privacy, security, and compliance highlights with links to detail pages
  • Additional resources including data protection and security whitepaper, Data Request Guidelines, and Customer Trust Portal
  • Email subscription call to action
  • CTA to encourage professional security researchers to report potential vulnerabilities
  • Customer Trust Portal button that allows on-demand access to documentation about Splunk's privacy, security, and compliance programs and more

Compliance Certifications

  • GDPR
  • CCPA
  • ISO 27001
  • SOC 2 Type II
  • HIPAA
  • PCI DSS
  • FedRAMP
  • FIPS 140-2
  • DoD Impact Level 5 (IL5)

Best practices checklist

This checklist is based on the Minimum Viable Secure Product and the information on the concerning platform’s security and compliance pages.

Note that some details might be missing if the information is mentioned in a whitepaper or login-required Trust Portal and not directly on the page.

check icon
Backup and disaster recovery
check icon
Self-assessment
check icon
External testing
check icon
Incident handling
check icon
Single sign-on
check icon
Backup and disaster recovery
By Resmo

Security increases customer trust and sales

Learn how top SaaS companies apply security communication best practices and compare vendors with a free PDF guide.

Pagerduty logo