search icon

Standards and compliance

We take the security of our customers' data very seriously. Explore how Sage is committed to industry-recognised standards and maintaining regulatory compliance which contributes to the robust security of your data and software.

We understand your role in security

In today's complex tech landscape, our understanding of legal requirements, international certifications, and standards is vital to keep our customers secure and compliant.

Security governance

Good governance is critical for effective security. At Sage, this starts at the top with our CEO and Board and extends throughout our organisation. Our practices are independently validated by external reviews and certifications.

Risk assessments

Cyber risks are a strategic issue at Sage and are subject to robust oversight and practices. Our regular and comprehensive cyber risk assessments help determine the security protocols and controls we prioritise.

Shared security model

We utilise the security features provided by our cloud hosting partners, AWS and Microsoft Azure, and augment them with our own tools and capabilities. We do this to minimise the security burden on customers.

Sage commitment to security standards

Our meticulous approach to compliance is what sets us apart.

Security Frameworks: Sage has built its information security management system using the international standard ISO 27001. We use standards and frameworks such as ISO 27002, NIST, and AICPA when selecting and designing security controls and processes required for achieving our cyber security risk objectives.

Policies: Sage ensures compliance with security standards and regulations through rigorous corporate governance. This means policies covering information security, secure development, acceptable use of our internal systems, personal data protection, and data handling are routinely reviewed, updated, and embedded in the organisation.

Legal: Sage supports legal compliance by regularly reviewing the regulatory and legal landscape for new or potential updates, conducting audits of legal compliance and maintaining a record of processing activities (ROPA) as required under Article 30 of the GDPR.

GDPR and CCPA: Sage is compliant with the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) and all other relevant data privacy regulations in the jurisdictions where we process data.

ISO 27001: the only auditable international standard that defines the requirements of an information security management system (ISMS) which is a set of policies, procedures, processes and systems that manage information security risks, such as cyber attacks. We’re certified to ISO 27001 for the secure development and operations of our cloud-based accounting, financial management, HR & people and business management software as a service (SaaS) within the Sage Business Cloud.

SOC 2: an internal controls report that captures how a company safeguards customer data and how well those internal controls are operating. At Sage, we are continually expanding the scope of these reports to include more products and services.

The Payment Card Industry Data Security Standard (PCI DSS): a set of policies and procedures designed to optimise the security of credit, debit, and cash card transactions. Sage is compliant with PCI DSS at Level 1, ensuring the protection of cardholders against misuse of their personal data.

The Health Insurance Portability and Accountability Act (HIPAA): it sets the standard for sensitive patient data protection. Sage Intacct is certified to meet the requirements of the HIPAA.

Control assurance: we maintain a comprehensive security control assurance programme that seeks to ensure our products meet our product security standards and are regularly reviewed against this standard so that we understand the effectiveness of our security controls.

Change management: all updates, patches, or new software releases are governed by change or release management processes and strict standards.

Access controls: the principle of 'least privilege' is central to our access control processes, from provisioning access, managing privileged access to data and systems, and the requirements and contractual agreements with our suppliers.

Cryptography: we formalise our cryptography requirements in mandatory policies and standards. We define the cryptographic algorithms and schemes approved for use in Sage products and solutions.

Incident response, business continuity, and disaster recovery: we regularly test and exercise our incident response and business continuity policies and procedures and data backup and recovery plans against various scenarios to ensure we can respond effectively in the face of any incident.

Security of third-parties and suppliers

Our partnerships are built on trust, and we ensure they stand on a foundation of stringent security standards.

  • Assessing Third-party Security : Sage operates a comprehensive supply chain assurance programme to ensure any data or critical services are protected at all times.
  • Vendor Management : before integrating third party services or components, we conduct a thorough security assessment to identify any security issues and address them upfront.
  • Contractual Agreements and Audits : vendors can be subject to annual re-assessments and we work with several third-party security ratings services, utilising AI technologies to continually monitor our suppliers and take appropriate action to remediate any changes in their security.

Ensuring data security

Your data is your most valuable asset, and we're committed to protecting it.

  • Data security measures: traffic to and from Sage applications and websites is encrypted using the latest versions of internationally recognised Transport Layer Security (TLS) protocol. TLS ensures the confidentiality, integrity and availability of sensitive data as it flows across the internet.
  • Access Controls: the principle of least privilege always applies, therefore access is granted to users on an essential need basis. Access control procedures and controls have to be documented and regularly audited.
  • Cloud hosted: by partnering with industry-leading cloud service providers, we offer multiple layers of security controls, ensuring that your data is not only accessible but also secure.

Continue your journey

Learn more about our unwavering commitment to cyber security. Dive deeper with our dedicated pages on monitoring operations and secure development.

Monitoring and operations

Explore the depth of our 24/7 monitoring and operations strategy, dedicated to ensuring the utmost security and reliability of your data and systems.

Secure development

Discover how we approach software development, where every piece of code is meticulously crafted with security built-in from the outset.

Give Feedback