Best Practices to Secure Your Workspace

Maintaining a secure workspace is crucial to protect your organization's data and maintain productivity.

As an admin, there are several steps you can take to enhance the security of your workspace.

1. Manage Team Member Roles Appropriately

Properly managing the roles of your team members is the first step in ensuring security. Assign roles based on the principle of least privilege, which means giving team members the minimum level of access necessary to perform their jobs. This reduces the risk of accidental or intentional data breaches. Please check this article to learn more on how to Manage Team Members.

2. Additional Security Settings for Enterprise Clients

As an Enterprise client, you gain access to advanced security controls within your workspace. In the Workspace Settings, a dedicated "Security" tab allows workspace admins to manage and enhance security configurations.

Key Security Settings Available:

  1. Request to Join Workspace

    Allow or restrict users outside the @{companydomain} from requesting access via shared animation links.
  2. External Sharing
    Control whether users can create external links. Disabling this feature can prevent unauthorized sharing of sensitive information outside the workspace.

  3. Publish to Community

    Control whether users can share content publicly, reducing the risk of unintentional data exposure.
  4. AI Features

    Enable or disable access to AI-powered tools like Motion Copilot and AI Prompt to Vector.

3. Access & SSO Settings

Enterprise clients have access to Access & SSO Settings security features that provide enhanced protection for their workspaces. These measures include:

  • SAML/SSO Login: Enable SAML (Security Assertion Markup Language) or Single Sign-On (SSO) for seamless and secure user authentication. This feature allows users to log in using their existing enterprise credentials, reducing the risk of password-related security breaches and simplifying the login process.

  • Access Logs: Maintain comprehensive access logs to monitor and track user activities within your workspace. Access logs provide detailed records of who accessed or edited data, when it occurred, and what changes were made. This level of transparency helps in auditing and identifying any unauthorized activities promptly.

By following these steps and regularly reviewing your security practices, you can maintain a secure and productive workspace.

Updated

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.