Shared Responsibility Model

When an organization runs its own on-premise data centers, control over security is straightforward: it falls solely on the shoulders of that organization. They are solely responsible for maintaining the CIA Triad of Confidentiality, Integrity and Availability of their systems, as well as the data stored within them.

In a hybrid or cloud environment, the responsibility for maintaining the CIA Triad is shared with a cloud service provider (CSP), such as under a Shared Responsibility Model.

In simplest terms, a Shared Responsibility Model denotes that CSPs are responsible for the operation of security controls of the cloud, and customers are responsible for securing the data they put in the cloud utilizing the provided tools.

The CIA Triad protection only works when the security controls are tailored to fit the individual needs of an organization. Responsibility is responsible for protecting the underlying infrastructure (hardware, software, networking and facilities) upon which the platform operates. is also responsible for the availability and functionality of the world class security controls customers may choose to utilize.

Customer Responsibility

Customers are responsible for utilizing the provided security controls to configure their account to meet the unique requirements of their organization.

Customer responsibilities include:

  • File contents stored on the platform

  • Initiating file transfers in/out of using the appropriate encryption options

  • User account provisioning

  • User account deprovisioning

  • Permissions

  • File storage locations

  • File expiration/deletion settings

  • SSL Settings

  • IP Whitelisting/country restrictions

  • Encryption options

  • User awareness and training Security Controls

The following are a select list of the security controls that provides for customers to meet their unique security needs:

  • File expiration

  • File hash value via API

  • Deleted file retention

  • Storage region selections

  • Multiple storage regions on certain plans

  • Custom SSL Certificates

  • Session IP Pinning

  • Session expiration

  • Brute force protection options

  • Multiple 2FA methods

  • 2FA required

  • Globally unique usernames

  • Password Controls, including Length, Complexity, History, Expiration

  • Prevent use of breachable passwords

  • Permissions: User, Group, Folder

  • IP Whitelist

  • Allowed/disallowed countries

  • Multiple SSO/LDAP Integration options

  • Per folder options: Folder level admins, Folder storage region, GPG encryption on certain plans

  • Rest API

  • Account Provisioning, including password setting options, 2FA options, and SSO/LDAP integration options

  • Account Deprovisioning, including automatic user lockout options, and automatic inactive user deletion options

Get Instant Access to and Start Collaborating and Automating

The button below will take you to our Free Trial signup page. Click on the white "Start My Free Trial" button, fill out the short form on the next page, get your account activated instantly, and start setting up your Files and Workflows immediately.

Start My Free Trial