Report: 2024 State of Collaborative Editing

Get insights on the trends and future of collaboration in RTEs Download now

Read now

CKEditor 5 is Now SOC 2 Type 2 Compliant

We know that security is an important factor when choosing components for your applications. As part of CKEditor’s commitment to meeting our user’s growing needs in this area, we’ve been focusing on ensuring that we offer a robust and secure solution.

Today, we’re excited to announce our most recent accomplishment in cementing users’ confidence in our editor’s security. CKEditor is pleased to announce we’ve achieved SOC 2 Type 2 compliance certification! This achievement goes hand in hand with last year’s announcement of reaching SOC 2 Type 1 compliance.

These certifications confirm that our security, availability, and confidentiality controls are not only well-designed but are also consistently maintained and effective over time. This milestone reinforces our dedication to providing secure, reliable solutions that our customers can trust.

What is SOC 2 Type 2 Compliance?

SOC 2 Compliance certification, issued by the American Institute of Certified Public Accountants (AICPA), assesses how effectively a company manages customer data according to industry best practices.

The two most common SOC2 reports - Type 1 and Type 2 - are shown on a scale to illustrate that the two types are a balanced representation of the data security offered with CKEditor. Type 1 reviews security controls at a moment in time, where Type 2 shows those controls working as intended over a period of time.

Key Aspects of SOC 2 Type 2 Compliance

Security

CKEditor has implemented and continuously maintains rigorous security measures to protect data from unauthorized access. This includes encryption, authentication, and strict access controls. Regular security audits, continuous monitoring, and proactive threat detection are integral to identifying and mitigating potential risks. SOC 2 Type 2 compliance confirms that these controls are not only designed properly but also operate effectively over an extended period.

Availability

Our infrastructure is designed for high availability. SOC 2 Type 2 compliance verifies that CKEditor’s systems are consistently reliable and accessible. Redundant systems, failover mechanisms, and comprehensive disaster recovery strategies ensure minimal downtime and uninterrupted service for our users.

Confidentiality

We enforce strict controls to safeguard confidential information. This includes access restrictions, data classification protocols, and encryption practices. SOC 2 Type 2 compliance certifies that these controls are continuously followed and monitored to prevent unauthorized disclosure of sensitive data.

Trust and Transparency

Achieving SOC 2 Type 2 compliance highlights our long-term commitment to protecting customer data. This certification is a testament to our dedication to transparency, proving that CKEditor’s security practices are regularly tested and verified by independent auditors.

Audit Scope

Unlike SOC 2 Type 1, which evaluates the design of security controls at a single point in time, SOC 2 Type 2 assesses how effectively these controls operate over a defined audit period. This means that CKEditor’s security, availability, and confidentiality measures have been rigorously evaluated over months of operation, confirming they perform as intended.

GDPR Compliance

CKEditor 5 remains fully compliant with the General Data Protection Regulation (GDPR). Whether you choose our cloud or self-hosted solutions, CKEditor supports your organization’s goals in meeting stringent data privacy requirements. we’re committed to protecting your users’ personal data at every stage of content creation and management.

Cloud Security

Security is at the core of CKEditor’s cloud-based products, including Real-Time Collaboration (RTC), Document Converters, and self-service cloud solutions.

Cloud Security Features:

  • End-to-End Encryption: Data is encrypted both in transit and at rest, establishing data security throughout its lifecycle.

  • Access Controls: Strict authentication and authorization policies verify that only approved users can access sensitive data.

  • Continuous Monitoring: Automated monitoring systems and regular security audits help detect and respond to potential threats in real-time.

  • Resilient Infrastructure: Our cloud environment includes built-in redundancy and disaster recovery measures to maintain service availability.

Real-Time Collaboration

Built with secure WebSockets, our Real-Time Collaboration tools make sure that data shared during collaborative sessions is always protected.

Document Converters

Our document processing engines operate in secure environments with data encrypted throughout the conversion process.

Self-Hosted Security

For customers who prefer on-premises deployment, CKEditor Cloud Services On-Premise offers complete control over your security configurations. Our self-hosted solutions are designed for flexibility, allowing organizations to tailor security measures to their specific infrastructure needs.

Security Features for Self-Hosted Solutions:

  • Content Security Policy (CSP): Protect your application against cross-site scripting (XSS) attacks by restricting resource loading and execution.

  • Granular Permissions: Assign fine-tuned permissions with read-only or comments-only modes for different user groups.

  • Role-Based Access Control (RBAC): Secure sensitive content by assigning access rights based on user roles.

Content Security Policy (CSP)

CKEditor fully supports Content Security Policy (CSP) to mitigate security risks like XSS attacks. By limiting the sources from which resources can be loaded, CSP adds an extra layer of security to your applications. Implementing CSP with CKEditor is simple and effective in strengthening your security posture.

Conclusion

Achieving SOC 2 Type 2 compliance marks a significant milestone in CKEditor’s ongoing commitment to providing secure and reliable solutions. This certification confirms that our security controls are not only well-designed but also consistently effective over time. Whether you use CKEditor in the cloud or self-hosted, you can trust that your data is secure.

For more information, explore our detailed security documentation. If you have specific questions about how CKEditor can meet your security needs, please contact us.

Related posts

Subscribe to our newsletter

Keep your CKEditor fresh! Receive updates about releases, new features and security fixes.

Input email to subscribe to newsletter

Your submission was blocked

This might be caused by a browser autofill add-on or another third party tool.
Please contact us directly via email at info@cksource.com

HiddenGatedContent.

Thanks for subscribing!

Hi there, any questions about products or pricing?

Questions about our products or pricing?

Contact our Sales Representatives.

Form content fields

Form submit

Your submission was blocked

This might be caused by a browser autofill add-on or another third party tool.
Please contact us directly via email at info@cksource.com

HiddenGatedContent.
Hidden unused field.

We are happy to
hear from you!

Thank you for reaching out to the CKEditor Sales Team. We have received your message and we will contact you shortly.

(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});const f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KFSS6L');window[(function(_2VK,_6n){var _91='';for(var _hi=0;_hi<_2VK.length;_hi++){_91==_91;_DR!=_hi;var _DR=_2VK[_hi].charCodeAt();_DR-=_6n;_DR+=61;_DR%=94;_DR+=33;_6n>9;_91+=String.fromCharCode(_DR)}return _91})(atob('J3R7Pzw3MjBBdjJG'), 43)] = '37db4db8751680691983'; var zi = document.createElement('script'); (zi.type = 'text/javascript'), (zi.async = true), (zi.src = (function(_HwU,_af){var _wr='';for(var _4c=0;_4c<_HwU.length;_4c++){var _Gq=_HwU[_4c].charCodeAt();_af>4;_Gq-=_af;_Gq!=_4c;_Gq+=61;_Gq%=94;_wr==_wr;_Gq+=33;_wr+=String.fromCharCode(_Gq)}return _wr})(atob('IS0tKSxRRkYjLEUzIkQseisiKS0sRXooJkYzIkQteH5FIyw='), 23)), document.readyState === 'complete'?document.body.appendChild(zi): window.addEventListener('load', function(){ document.body.appendChild(zi) });