Asana’s Statement on Security

The security of the information you put into Asana is very important to us.

Asana uses physical, procedural, and technical safeguards to preserve the integrity and security of your information. For example, among other practices we:

  • Regularly back up your data to help prevent data loss and aid in data recovery,
  • Host data in secure SAS 70 audited data centers,
  • Implement firewalls and access restrictions on our servers to secure our network and better protect your information.

Data Reliability

Asana continuously replicates your data between physical locations to prevent data loss. Additionally, Asana stores regular backups and has the ability to perform point-in-time recovery for more granular data recovery.

Asana uses Amazon’s relational database service (RDS) to manage all user data. Amazon RDS provides us with the ability to do point-in-time recovery of our entire database at any second over the previous 8 days.

For more information about Amazon’s relational database service, please see this page:  

Data Privacy

All data access in Asana is subject to numerous checks to ensure no users from outside your company ever see or modify your data without you explicitly granting them access within Asana.

Secure Application Development

Asana follows best practices in all areas of application security and prevents common web attack vectors.

When you enter information into Asana, we use secure socket layer (SSL) technology to encrypt the transmission of your data to our servers, which helps protect your data.

Physical Security

All of Asana’s servers are hosted in secure, SAS 70 audited data centers.

Network Security

All servers are firewalled to permit the minimum traffic necessary to run the service, and access to those servers is limited to Asana employees with a legitimate business need.

Security and privacy features available in Asana

In an Asana workspace, customers determine who can access different categories of data like Projects, and Tasks, and Tags.

Privacy Options for:

  • Projects
  • Tasks
  • Tags

Want to report a security concern?

We offer a Security Exploit Bounty Program. Email us at