Skip to content


Customer trust and data security are critical to everything we do at Intercom.
  • SOC2

    Service Organization Controls (Soc2) (Type II) Trust Services Principles

  • Escudo de la Privacidad

    EU-US Privacy Shield

  • CSA

    Cloud Security Alliance


    Health Insurance Portability and Accountability Act

  • ISO 27001

    ISO 27001:2013 Certification

  • ISO 27018

    ISO 27018:2019 Certification

  • Product security

    SSO & 2FA

    El inicio de sesión único de SAML (SSO) te permite autenticar a los usuarios en sus sistemas sin necesidad de que introduzcan credenciales de acceso adicionales.  Si utilizas la autenticación basada en contraseña, puedes activar la autenticación de dos factores (2FA). Más detalles en nuestra documentación.


    We enable permission levels within the app to be set for your teammates. Permissions can be set to include app settings, billing, user data or the ability to send or edit messages.

    Password and Credential Storage

    Intercom enforces a password complexity standard and credentials are stored using a PBKDF function (bcrypt).


    We have uptime of 99.9% or higher. You can check our past month stats at

    Customer Best Practices

    There are simple steps you can take to increase the security of your app. Check out the Staying Secure section on our docs site.

    Network and application security

    Alojamiento y almacenamiento de datos regionales

    Los servicios y datos de Intercom están alojados en las instalaciones de Amazon Web Services (AWS) en Estados Unidos (us-east-1), en Dublín, Irlanda (eu-west-1) y en Sídney, Australia.

    Failover and DR

    Intercom was built with disaster recovery in mind. All of our infrastructure and data are spread across 3 AWS availability zones and will continue to work should any one of those data centers fail.

    Virtual Private Cloud

    All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACLs) that prevent unauthorized requests getting to our internal network.

    Back Ups and Monitoring

    On an application level, we produce audit logs for all activity, ship logs to Graylog for analysis and use S3 for archival purposes. All actions taken on production consoles or in the Intercom application are logged.

    Permissions and Authentication

    Solo tienen acceso a los datos de cliente aquellos empleados autorizados que los necesitan para desempeñar su trabajo. Intercom opera al 100 % vía https y ha implementado una red corporativa de confianza cero. Formar parte de la red de Intercom no da derecho a ningún recurso corporativo o privilegio adicional. Contamos con inicio de sesión único de SAML (SSO), autenticación de dos factores (2FA) y políticas de contraseñas seguras en GitHub, Google, AWS e Intercom para garantizar la protección del acceso a los servicios en la nube.


    All data sent to or from Intercom is encrypted in transit using 256 bit encryption. Our API and application endpoints are TLS/SSL only and score an “A+” rating on Qualys SSL Labs‘ tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled. We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.

    Pentests, Vulnerability Scanning and Bug Bounty Program

    Intercom uses third party security tools to continuously scan for vulnerabilities. Our dedicated security team responds to issues raised. Twice yearly we engage third-party security experts to perform detailed penetration tests on the Intercom application and infrastructure. Intercom also runs a ‘bug bounty’ program with Bugcrowd, which gives security researchers a platform for testing and submitting vulnerability reports.

    Incident Response

    Intercom implements a protocol for handling security events which includes escalation procedures, rapid mitigation and post mortem. All employees are informed of our policies.

    Additional Security features


    All employees complete Security and Awareness training annually.


    Intercom has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with all employees.

    Employee Vetting

    Intercom performs background checks on all new employees in accordance with local laws. The background check includes employment verification and criminal checks for US employees.


    All employee contracts include a confidentiality agreement.

    PCI Obligations

    All payments made to Intercom go through our partner, Stripe. Details about their security setup and PCI compliance can be found at Stripe’s security page.