Canvas Has Open Security
And no, that's not an oxymoron. It's more like oxygenius.
Security Program and Team
Our security program is built based on ISO 27001, NIST’s Cyber Security Framework, AICPA’s Trust Services Principles and Criteria, and SANS’ CIS Critical Security Controls. And we develop our applications abiding with OWASP’s Top 10.
We implement both preventative and detective mechanisms, as well as processes, controls, and tools in layers—helping to mitigate risks that might impact data, people, systems, operations, products, and our mission as a company. We also encrypt data in transit and at rest using known strong cryptographic protocols and ciphers.
We produce SOC2 Type 2 reports annually to demonstrate Instructure’s compliance with industry best practices for security, availability, confidentiality, processing integrity, and privacy. You can reach out to your customer support manager for a copy of this report.
Our dedicated security team is full of passionate, skilled, and experienced security professionals who focus on detecting and protecting against badness, and earning and maintaining your trust.
Security and Due Diligence Documents
Learn more about Instructure’s security program and review related due-diligence documents using the links below:
Vulnerability Disclosure and Continuous Penetration Testing
Instructure hosts its bug bounty program through Bugcrowd, through which security researchers are continuously poking at our products. We publish—publicly—the results of these activities annually for all to see. You're welcome to join this program and submit your findings. Please send your Bugcrowd ID to [email protected] to be added to the program. Download Our Latest Penetration Test ResultsLearn More