SEcurity
The secure way to scale AI
The secure way to scale AI
The secure way to scale AI
Don’t compromise. Zapier is the only AI orchestration platform that combines the oversight IT demands with the speed your business teams need.
Don’t compromise. Zapier is the only AI orchestration platform that combines the oversight IT demands with the speed your business teams need.
Don’t compromise. Zapier is the only AI orchestration platform that combines the oversight IT demands with the speed your business teams need.

AI Security
AI under your control
Use AI on your terms. Control who in your org can access third-party AI app integrations and know your data won’t be used to train AI models*.
Reliability
Built for resilience
Zapier’s event-driven architecture helps your workflows run smoothly, even when APIs change, and integrates with nearly 8,000 apps.
Governance & observability
Granular access & visibility
Zapier provides role-based access and audit logs for oversight of who’s automating what, and when.
Zapier is trusted by companies where security comes first
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
FINANCIAL SERVICES
FINANCIAL SERVICES
FINANCIAL SERVICES
BIOTECH SAAS
BIOTECH SAAS
BIOTECH SAAS
AUDIT MANAGEMENT SOFTWARE
AUDIT MANAGEMENT SOFTWARE
AUDIT MANAGEMENT SOFTWARE
CLOUD STORAGE
CLOUD STORAGE
CLOUD STORAGE
INDUSTRIAL TECHNOLOGY
INDUSTRIAL TECHNOLOGY
INDUSTRIAL TECHNOLOGY

Customers trust us to keep their data secure and safe. I have 100% confidence that Zapier handles that data with the utmost security.
Customers trust us to keep their data secure and safe. I have 100% confidence that Zapier handles that data with the utmost security.
Customers trust us to keep their data secure and safe. I have 100% confidence that Zapier handles that data with the utmost security.
— Connor Sheffield, Head of Marketing Ops and Automation, Zonos




Platform Capabilities
Platform Capabilities
Platform Capabilities
Platform Capabilities
A foundation built on data security
A foundation built on data security
A foundation built on data security


SOC 2 (TYPE II)
SOC 3
SOC 2 (TYPE II)
SOC 3


CCPA
CCPA


GDPR Compliant
GDPR Compliant


GDPR UK Compliant
GDPR UK Compliant
AI Security
AI Security
AI Security
Zapier ensures AI-driven automation is secure, transparent, and compliant, giving users full control over data and app interactions.
Features
Enterprise plan governance
Turn off third-party integrations with AI apps entirely or limit to the ones you want your users to use
Turn off third-party integrations with AI apps entirely or limit to the ones you want your users to use
Turn off third-party integrations with AI apps entirely or limit to the ones you want your users to use
Model training opt-out
Automatic opt-out for Enterprise customers, and easy opt-out for all other customers
Automatic opt-out for Enterprise customers, and easy opt-out for all other customers
Automatic opt-out for Enterprise customers, and easy opt-out for all other customers
Reliability
Reliability
Reliability
With automated high availability, fault tolerance, and built-in redundancy, Zapier keeps mission-critical workflows running smoothly.
Features
Outage detection
Keep your data safe when partners experience downtime
Keep your data safe when partners experience downtime
Keep your data safe when partners experience downtime
Intelligent throttling
Never lose data, even during peak traffic
Never lose data, even during peak traffic
Never lose data, even during peak traffic
API change management
Zero workflow disruptions when partner APIs evolve
Zero workflow disruptions when partner APIs evolve
Zero workflow disruptions when partner APIs evolve
Data checkpoints
Complete confidence your workflows will always finish
Complete confidence your workflows will always finish
Complete confidence your workflows will always finish
Horizontal scalability
Handle fluctuating workflow volume without performance degradation
Handle fluctuating workflow volume without performance degradation
Handle fluctuating workflow volume without performance degradation
Data security and privacy
Data security and privacy
Data security and privacy
Zapier protects sensitive data with enterprise-grade encryption, strict access controls, and compliance with GDPR, SOC 2 (Type II), and CCPA.
Features
AWS cloud security
Enterprise-grade infrastructure trusted by industry leaders
Enterprise-grade infrastructure trusted by industry leaders
Enterprise-grade infrastructure trusted by industry leaders
Bug bounty program
Continuous security improvement through ethical hacker insights
Continuous security improvement through ethical hacker insights
Continuous security improvement through ethical hacker insights
Annual third-party penetration tests
Independent verification of our robust defenses
Independent verification of our robust defenses
Independent verification of our robust defenses
Security logging and monitoring
Real-time threat detection for immediate response
Real-time threat detection for immediate response
Real-time threat detection for immediate response
Custom data retention for Zaps
Control exactly how long your sensitive data remains
Control exactly how long your sensitive data remains
Control exactly how long your sensitive data remains
Encryption in transit to all Zapier products
Your data is protected en route
Your data is protected en route
Your data is protected en route
Encryption at rest (AES-256)
Enterprise-grade security for your stored information
Enterprise-grade security for your stored information
Enterprise-grade security for your stored information
Governance and observability
Governance and observability
Governance and observability
Zapier provides real-time audit logs and granular permissions for complete security oversight and control.
Features
SSO (SAML)
Seamless secure access with your existing identity provider
Seamless secure access with your existing identity provider
Seamless secure access with your existing identity provider
SCIM
Automate user provisioning for efficient access management
Automate user provisioning for efficient access management
Automate user provisioning for efficient access management
2FA
Add an essential second layer of protection to prevent unauthorized access
Add an essential second layer of protection to prevent unauthorized access
Add an essential second layer of protection to prevent unauthorized access
Application controls
Granular permissions to enforce your security policies
Granular permissions to enforce your security policies
Granular permissions to enforce your security policies
Domain capture
Complete visibility and control of your organization's Zapier usage
Complete visibility and control of your organization's Zapier usage
Complete visibility and control of your organization's Zapier usage
Shared app connections
Centralized credential management for enhanced security
Centralized credential management for enhanced security
Centralized credential management for enhanced security
IP allowlist
Restrict access to trusted networks only
Restrict access to trusted networks only
Restrict access to trusted networks only
Audit log
Complete visibility into user actions for compliance and security tracking
Complete visibility into user actions for compliance and security tracking
Complete visibility into user actions for compliance and security tracking
Analytics and Zap runs API
Data-driven insights to optimize your automation security
Data-driven insights to optimize your automation security
Data-driven insights to optimize your automation security
Why 87% of the Forbes Cloud 100 Trust Zapier: A Message from our Head of Security
Why 87% of the Forbes Cloud 100 Trust Zapier: A Message from our Head of Security
Why 87% of the Forbes Cloud 100 Trust Zapier: A Message from our Head of Security

We can do a lot of advanced things with Zapier and it's very easy. I don't need a highly technical team—I just need the right tools.
We can do a lot of advanced things with Zapier and it's very easy. I don't need a highly technical team—I just need the right tools.
We can do a lot of advanced things with Zapier and it's very easy. I don't need a highly technical team—I just need the right tools.
— Korey Marciniak, Senior Manager of Customer Support Strategy and Operations, Okta




FAQ
What security measures does Zapier implement to protect user data?
Zapier uses the latest encryption methods to protect your data. Zapier web application communications are encrypted over TLS 1.2, and data is encrypted at rest using AES-256 encryption. Please refer to our Trust Center for more details.
Is Zapier compliant with SOC 2 and SOC 3 standards?
Yes, Zapier has obtained SOC 2 Type II and SOC 3 certifications, demonstrating adherence to stringent security and compliance standards.
How does Zapier handle data privacy in AI functionalities?
Zapier ensures AI-powered automation is designed with privacy at the forefront, and all AI-driven features comply with GDPR, CCPA, and other privacy regulations. Enterprise customers’ data is not used to train AI models, and all other customers can opt out of data training by filling out this form.
Does Zapier use customer data to train AI models?
Enterprise customers are automatically opted out of data training, and customers on other plans can opt out of data training by filling out this form.
What cloud service provider does Zapier utilize?
Zapier is hosted on Amazon Web Services (AWS) in the United States and leverages AWS security best practices for data protection and redundancy.
Does Zapier offer two-factor authentication (2FA)?
Yes, Zapier offers two-factor authentication (2FA) to help prevent unauthorized access to accounts.
How can I review Zapier's security practices?
You can review Zapier's security documents, compliance certifications, and policies in the Zapier Trust Center.
What is Zapier's approach to vulnerability management?
Zapier follows a proactive security model with regular threat assessments, penetration testing, and a Bug Bounty Program to identify and remediate vulnerabilities.
Where can I find Zapier’s SOC 2 and SOC 3 report?
Zapier's SOC 2 and SOC 3 report is publicly available for review at the Zapier Trust Center.
How does Zapier monitor and log user activities?
Zapier provides audit logs that track user and automation activities, ensuring transparency and compliance for enterprise security teams.
FAQ
What security measures does Zapier implement to protect user data?
Zapier uses the latest encryption methods to protect your data. Zapier web application communications are encrypted over TLS 1.2, and data is encrypted at rest using AES-256 encryption. Please refer to our Trust Center for more details.
Is Zapier compliant with SOC 2 and SOC 3 standards?
Yes, Zapier has obtained SOC 2 Type II and SOC 3 certifications, demonstrating adherence to stringent security and compliance standards.
How does Zapier handle data privacy in AI functionalities?
Zapier ensures AI-powered automation is designed with privacy at the forefront, and all AI-driven features comply with GDPR, CCPA, and other privacy regulations. Enterprise customers’ data is not used to train AI models, and all other customers can opt out of data training by filling out this form.
Does Zapier use customer data to train AI models?
Enterprise customers are automatically opted out of data training, and customers on other plans can opt out of data training by filling out this form.
What cloud service provider does Zapier utilize?
Zapier is hosted on Amazon Web Services (AWS) in the United States and leverages AWS security best practices for data protection and redundancy.
Does Zapier offer two-factor authentication (2FA)?
Yes, Zapier offers two-factor authentication (2FA) to help prevent unauthorized access to accounts.
How can I review Zapier's security practices?
You can review Zapier's security documents, compliance certifications, and policies in the Zapier Trust Center.
What is Zapier's approach to vulnerability management?
Zapier follows a proactive security model with regular threat assessments, penetration testing, and a Bug Bounty Program to identify and remediate vulnerabilities.
Where can I find Zapier’s SOC 2 and SOC 3 report?
Zapier's SOC 2 and SOC 3 report is publicly available for review at the Zapier Trust Center.
How does Zapier monitor and log user activities?
Zapier provides audit logs that track user and automation activities, ensuring transparency and compliance for enterprise security teams.
FAQ
What security measures does Zapier implement to protect user data?
Zapier uses the latest encryption methods to protect your data. Zapier web application communications are encrypted over TLS 1.2, and data is encrypted at rest using AES-256 encryption. Please refer to our Trust Center for more details.
Is Zapier compliant with SOC 2 and SOC 3 standards?
Yes, Zapier has obtained SOC 2 Type II and SOC 3 certifications, demonstrating adherence to stringent security and compliance standards.
How does Zapier handle data privacy in AI functionalities?
Zapier ensures AI-powered automation is designed with privacy at the forefront, and all AI-driven features comply with GDPR, CCPA, and other privacy regulations. Enterprise customers’ data is not used to train AI models, and all other customers can opt out of data training by filling out this form.
Does Zapier use customer data to train AI models?
Enterprise customers are automatically opted out of data training, and customers on other plans can opt out of data training by filling out this form.
What cloud service provider does Zapier utilize?
Zapier is hosted on Amazon Web Services (AWS) in the United States and leverages AWS security best practices for data protection and redundancy.
Does Zapier offer two-factor authentication (2FA)?
Yes, Zapier offers two-factor authentication (2FA) to help prevent unauthorized access to accounts.
How can I review Zapier's security practices?
You can review Zapier's security documents, compliance certifications, and policies in the Zapier Trust Center.
What is Zapier's approach to vulnerability management?
Zapier follows a proactive security model with regular threat assessments, penetration testing, and a Bug Bounty Program to identify and remediate vulnerabilities.
Where can I find Zapier’s SOC 2 and SOC 3 report?
Zapier's SOC 2 and SOC 3 report is publicly available for review at the Zapier Trust Center.
How does Zapier monitor and log user activities?
Zapier provides audit logs that track user and automation activities, ensuring transparency and compliance for enterprise security teams.
FAQ
What security measures does Zapier implement to protect user data?
Zapier uses the latest encryption methods to protect your data. Zapier web application communications are encrypted over TLS 1.2, and data is encrypted at rest using AES-256 encryption. Please refer to our Trust Center for more details.
Is Zapier compliant with SOC 2 and SOC 3 standards?
Yes, Zapier has obtained SOC 2 Type II and SOC 3 certifications, demonstrating adherence to stringent security and compliance standards.
How does Zapier handle data privacy in AI functionalities?
Zapier ensures AI-powered automation is designed with privacy at the forefront, and all AI-driven features comply with GDPR, CCPA, and other privacy regulations. Enterprise customers’ data is not used to train AI models, and all other customers can opt out of data training by filling out this form.
Does Zapier use customer data to train AI models?
Enterprise customers are automatically opted out of data training, and customers on other plans can opt out of data training by filling out this form.
What cloud service provider does Zapier utilize?
Zapier is hosted on Amazon Web Services (AWS) in the United States and leverages AWS security best practices for data protection and redundancy.
Does Zapier offer two-factor authentication (2FA)?
Yes, Zapier offers two-factor authentication (2FA) to help prevent unauthorized access to accounts.
How can I review Zapier's security practices?
You can review Zapier's security documents, compliance certifications, and policies in the Zapier Trust Center.
What is Zapier's approach to vulnerability management?
Zapier follows a proactive security model with regular threat assessments, penetration testing, and a Bug Bounty Program to identify and remediate vulnerabilities.
Where can I find Zapier’s SOC 2 and SOC 3 report?
Zapier's SOC 2 and SOC 3 report is publicly available for review at the Zapier Trust Center.
How does Zapier monitor and log user activities?
Zapier provides audit logs that track user and automation activities, ensuring transparency and compliance for enterprise security teams.
See what Zapier can do for your business
See what Zapier can do for your business
See what Zapier can do for your business
See what Zapier can do for your business
*Enterprise customers are automatically opted out, and customers on other plans can opt out by submitting the opt-out form. Security controls and certifications may vary by beta products.