Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Slack, your compliance team needs documented proof they can be trusted. ThirdProof investigated Slack across 27 intelligence sources — here's what we found.
⚠ FedRAMP Status: Not found in the FedRAMP Marketplace. Vendors handling government data or CUI must be FedRAMP authorized.
27 sources queried. 100% confidence. Every Slack investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Slack's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 49% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q38
ISO 27001 claim found on trust page (Vendor attested)
Q41
FedRAMP authorized: Product: Slack; Provider: Slack Technologies; Status: Compliant; Impact Level: Moderate; Authorization Date: 2023-03-06T05:00:00.000Z
Q40
HIPAA compliance / BAA claim found on trust page (Vendor attested)
Q42
GDPR compliance / DPA claim found on trust page (Independently verified)
+ 4 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Slack's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Organizations with federal compliance requirements should verify this directly at marketplace.fedramp.gov.
Slack (Salesforce) is not independently listed on the FedRAMP Marketplace. Salesforce Government Cloud is FedRAMP authorized separately.
Moderate Risk
Vendor Risk Assessment
Based on data availability and source coverage
27
Sources Queried
27
Sources With Data
April 17, 2026
Last Assessed
AI-generated analysis for Slack
Slack (slack.com) is a widely deployed enterprise SaaS collaboration platform assessed at Risk Tier 3 (Moderate Risk), reflecting a strong foundational security posture tempered by a small number of residual concerns that warrant buyer attention before deployment. Slack presents several meaningful positive signals across its security program:
Independence Statement
All evidence in this assessment was independently sourced from public registries, threat intelligence databases, domain analysis tools, certificate transparency logs, adverse media scans, and web archives without vendor participation or disclosure.
6 findings identified for Slack
Article from www.csoonline.com: "Nikkei's Slack breach leaks sensitive data from more than 17,000 users | CSO Online"
2 article(s) reference security or regulatory concerns for "Slack": "Nikkei’s Slack breach leaks sensitive data from more than 17,000 users" (csoonline.com) https://news.google.com/rss/articles/CBMitgFBVV95cUxNOWl3Zml6UjB1RTQyWVBKT2lodG1taUVKN3B3ZTY3UFRuczNoOHdVUW1pVW1URUMzMTFGRlVvNkNpVDgzc2xLWjRhOG95N01haGF5eE1HWGhLTkpBMHI0NmVxQUVlYllqUHV0ZV9BSmYySEFXYXhmbUZhNFdjZWF3SGRmWUVZZ2hqbkxYWXQ0WGNCc2FOTU9laW5BNGF6NmFOcWhtUm9mRzBVR1ZMMEZnekYxZlVDUQ?oc=5; "Japanese media giant Nikkei reports Slack breach exposing employee and partner r..." (The Record from Recorded Future News) https://news.google.com/rss/articles/CBMiXkFVX3lxTE1FUHRJZmVtdjFLWjUyU3NfOXFsX0ZicEVCMnpUODBIQmJOc3hlLTBkVmtOdDFOXy13YUJYdHpyMS14RkZJa2ZzZUNZLVJoQXZ4XzVMd3B2cFZQa2hSX1E?oc=5
1 article(s) reference significant concerns for "Slack": "Nikkei Suffers Slack Breach After Employee PC Malware Infection" (CyberInsider) https://news.google.com/rss/articles/CBMikwFBVV95cUxOcmFZbi1pNm9FaUpzV3dtWTBmSTF3ajBUcDZmSVFxRjZuakRYQWFSemFmS0xVNEppZ0pLeWE1TV9UYkZSdkhld1NGbFBWbTd5MWs4QUhJdVhDUGR5Z3A4WVpodmwzQjZDSTdDQUVJSV9iV1dvZUpvT3RCckhxYUNkZ2RQNDhMLWVLS0lHQ0ZtdlhPQm8?oc=5
slack.com received a mediocre grade (C+). Some security headers are configured but improvements are needed. Note: This scan was performed on the marketing site (slack.com). The application endpoint (app.slack.com) may have different security headers. Verify the application domain separately.
slack.com has certificates from 10 different Certificate Authorities. This may indicate inconsistent certificate management practices.
slack.com may use customer data for AI training unless customers opt out. Review the opt-out process.
34 positive signals verified
Tech Community Discussion: financial
Tech Community Sentiment →Legal Entity Actively Registered
Business Registration →[Filtered] LEI Registration Lapsed
Business Registration →Sanctions Data Incomplete
Sanctions & Watchlist Screening →Low-Confidence Sanctions Matches Only
Sanctions & Watchlist Screening →No Adverse Media Signals
Adverse Media Scan (Fallback) →Firmographic Data Available
Company Intelligence →Domain Infrastructure Healthy
Domain Analysis →Valid SSL Certificate
Domain Analysis →2 Open Ports Detected
Infrastructure Exposure →Established Domain (33+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →Tech Community Discussion: legal
Tech Community Sentiment →Large Certificate Footprint (2449 subdomains)
Certificate Transparency →Established Web Presence (27+ years)
Web Archive History →Domain in 50 Threat Intelligence Pulses
Threat Intelligence (OTX) →Clean IP Reputation
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →FedRAMP Authorization Independently Verified
Trust & Compliance Page Scan →Certification Claimed: GDPR
Trust & Compliance Page Scan →Certification Claimed: CCPA
Trust & Compliance Page Scan →Certification Claimed: ISO 27001
Trust & Compliance Page Scan →Certification Claimed: ISO 27018
Trust & Compliance Page Scan →Certification Claimed: SOC 2
Trust & Compliance Page Scan →Certification Claimed: HIPAA
Trust & Compliance Page Scan →Subprocessor Page Found, No Entries Parsed
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →FedRAMP Authorization Confirmed via Registry
Certification Registry Verification →HITRUST Directory Match — Manual Verification Required
Certification Registry Verification →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →AI Data Retention Policy Not Specified
AI Data Usage Policy →Deep Document Crawler Results
Deep Document Analysis →Steps to address findings for Slack
Obtain Slack's current SOC 2 Type II report — request it from your Slack account team or check the compliance portal at https://slack.com/trust/compliance. Many enterprise agreements entitle customers to a copy under NDA. Ask for a bridge letter if the report period ended more than 6 months ago.
Resolve the AI training opt-out immediately: if your organization handles sensitive, confidential, or regulated data in Slack, submit an opt-out request to feedback@slack.com with your Workspace/Org URL and subject line 'Slack Global…' as specified in the published policy at https://slack.com/trust/data-management/privacy-principles. Document the confirmation for your data processing records.
Verify ISO 27001 certification status directly with Slack's security team — request the certificate number, issuing body, scope, and valid-through date, then cross-check with the certifying body. Do not rely on the security practices page reference as confirmation of active certification.
Manually review the current subprocessor list at https://slack.com/help/subprocessors and document the entries for your GDPR Article 30 records. For each material subprocessor, confirm they are not subject to sanctions using your organization's preferred screening tool.
Review the Nikkei breach incident reported in November 2025 and assess your organization's endpoint device management posture — specifically whether non-enterprise-managed devices can authenticate to your Slack workspace, and whether MDM enrollment or device trust policies are enforced. The incident was attributed to a malware-infected non-managed endpoint, a risk your organization controls independently of Slack.
Document this assessment report with a reviewer signature and retention date to satisfy SOC 2 Trust Services Criterion CC9.2 third-party risk management evidence requirements. Retain through your next SOC 2 audit cycle.
27 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Slack? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Slack on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Slack's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Slack a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Slack appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Slack's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Slack's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Slack claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Slack depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Slack appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Slack (now part of Salesforce) processes internal communications, file sharing, and integration data that often includes sensitive business information. Slack claims SOC 2, FedRAMP, HIPAA, GDPR, and CCPA compliance. Since the Salesforce acquisition, Slack's security program benefits from Salesforce's enterprise compliance infrastructure, but organizations should verify certification scope independently. For organizations also evaluating Salesforce products, consider assessing both vendors holistically to understand shared compliance boundaries.
ThirdProof investigated Slack across 27 intelligence sources. Domain reputation is clean across 94 security engines with a 33-year domain history. Sanctions screening returned clear with no matches. No malware, phishing indicators, or IP reputation issues were detected. The HTTP security grade of C+ (60/100) reflects header configuration gaps that are common in complex enterprise applications but should be documented in your vendor risk register.
Seeing this in an audit? ThirdProof lets you investigate Slack and every other vendor in your stack — average report time: 7 minutes. Get Slack's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Slack across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.