If you’re already on the Slack bandwagon, then you have probably experienced first-hand how it can make communications between teams far simpler and more streamlined. With 8 million daily active users, it’s clear Slack has come to dominate the team chat world, especially in tech and tech-savvy industries.
From a security perspective, Slack has done a solid job of keeping its assets on lock. The company adheres to several stringent compliance regulations, including SOC 3, SOC 2, NIST 800-53, HIPAA, and more. In addition, the company has outlined in detail its GDPR compliance plan. With security features including data encryption at rest, SAML-based SSO, SCIM provisioning, and additional enterprise security software support, it’s clear that the company takes its approach to securing customer data very seriously.
So, we feel that it’s perfectly possible for companies of all shapes and sizes to lean on Slack for team chat and ops without worrying too much about security. But, we also believe in the shared responsibility model when it comes to any form of online security. No one’s perfect, and Slack’s ubiquity and popularity mean that it will always be a target for cybercriminals looking to steal information.
There’s no need to run scared, but you do need to be smart about how you use this valuable tool. Here are our tips for running Slack securely at your organization.
Require Two-Factor Authentication
Slack’s included security precautions won’t do you much good unless you actually put them into practice. One great example is two-factor authentication (or 2FA). It’s up to team owners and admins to require this of their users (otherwise, it will be optional, and most users won’t bother). We strongly suggest that you take advantage of this feature, which makes it much harder for hackers to tap into your organization’s Slack channels. Need some help getting started?
Set Up User Provisioning and Deprovisioning
Organizations today need to think about and work around insider threats. This includes employees who leave the company, whether on their own terms or due to an incident.
To ensure that you do not have any “lurkers” who might be able to take advantage of company information shared on Slack after they have left the company, it’s a good idea to plan ahead for user provisioning and deprovisioning.
In fact, this should be built into your process for onboarding and offboarding employees, just like it would be for email or any other company asset. If possible, you should automate the process, so the moment someone leaves the company, they no longer have access to Slack. For your reference, here’s Slack’s guide to provisioning and deprovisioning users.
Don’t Share Secrets
Slack is a great place to have secure conversations, but that doesn’t mean you should treat it like it’s watertight. Never use Slack to share secrets such as passwords, sensitive customer data, or valuable corporate IP. Anything highly confidential should be kept off the platform. Here’s a good rule of thumb: If a piece of information could be dangerous in a hacker’s hands, it doesn’t belong on Slack. Instead, use encrypted communication channels, like PGP-enabled email.
None of the tips above will do your organization any good if no one knows about them. So make sure that you regularly educate your users about steps they need to take to stay secure while using Slack (like never sharing passwords there). You should hold user security training whenever new employees come on board, and also make sure to do a refresher now and again with the entire company.
Additionally, if you change security protocols around tools like Slack, make sure that employees are given a head’s up and reminded when new measures go into effect so they know what to expect. Remember: Educated and informed users are one of your strongest security assets.
Bonus: Use Slack for SecOps!
We love Slack’s approach to distributed security alerting. It’s part of the reason we built a custom integration between Threat Stack and Slack. With Threat Stack integrated into your Slack organization, all team members can share in the responsibility of keeping your company secure.
Your security operations likely include members of the DevOps team as well as dedicated security folks, and Slack can help all team members integrate security into their workflows seamlessly. For example, since my focus is on DevOps, I rarely log into the Threat Stack platform directly. However, any relevant alerts or notifications will come my way via Slack, where I can review them and quickly decide whether further action is needed — all without having to step outside my daily workflow. This means security tasks don’t pose an extra headache, but are just a natural part of the way our company’s operations run.
Don’t Slack on Security
Slack is a great platform with all kinds of benefits for teams. As long as you take the right security precautions, there’s no reason why it can’t be used to its full potential on your team, whether you’re a small shop or a multinational enterprise. As with any other tool, the shared responsibility model is key. Take responsibility for your half of the security equation, and you’ll be well on your way to a secure Slack implementation.