Skip to main content

Workspace Security: Explain the security of a shared Room to customers

Written by Gal
Updated today

Tell customers that the shared workspace is powered by Aligned, a platform built for customer-facing collaboration. Aligned stores customer data in AWS, follows high security standards, and has completed penetration tests and SOC 2. When you share sensitive information, control access with stricter Room permissions such as Require Email Address to Enter, Only Permitted Users Can View, or Password Protection. Buyers open the workspace in a browser, with no special software required.

Prerequisites & Requirements

  • Plan: All plans

  • Permissions: User with permission to share the Room

  • Technical Specs:

    • Customer data is stored in AWS

    • Aligned has completed penetration tests

    • Aligned is SOC 2 compliant

    • Rooms use encryption and other measures to protect shared information

    • Rooms are web-based and open in a browser

How to explain Room security to a customer

  1. Tell the customer the workspace is managed by Aligned.

  2. Explain the core security points:

    • Customer data is stored in AWS

    • Aligned has completed penetration tests

    • Aligned is SOC 2 compliant

  3. Explain that you can control access before you share the Room.

  4. In Share, choose the permission level that fits the sensitivity of the content:

    • Anyone with a Link

    • Anyone with the Link (Ask for Name)

    • Require Email Address to Enter

    • Only Permitted Users Can View

    • Password Protection

  5. Use stricter access settings when you share pricing, legal documents, security materials, or other sensitive content.

What the Buyer sees

  • With Anyone with a Link, the buyer enters directly.

  • With Anyone with the Link (Ask for Name), the buyer can enter a name or email.

  • With Require Email Address to Enter, the buyer must enter a valid email before entry.

  • With Only Permitted Users Can View, only approved email addresses can enter.

  • With Password Protection, the buyer must enter the Room password.

Troubleshooting & Error States

Q: Can anyone with the link access this workspace?

Answer: No, not if you choose Require Email Address to Enter, Only Permitted Users Can View, or Password Protection.

Q: Which permission should I use for sensitive content?

Answer: Use Only Permitted Users Can View or Password Protection.

Q: Do buyers need to install anything to access the workspace?

Answer: No. Buyers open the Room in a browser.

Q: How do I make the workspace more secure after I already shared it?

Answer: Open Share and raise the Room permission level.

Security & Operations

  • SOC 2 reflects Aligned’s commitment to security, availability, processing integrity, confidentiality, and privacy.

  • Aligned monitors and maintains its security practices continuously.

  • Room access is controlled at the sharing level, so you can match the access model to the content you share.

Pro-Tips

  • Start with lighter permissions for early-stage content, then raise access before you add pricing, legal, or security documents.

  • Use Require Email Address to Enter when you want visitor identification, and use Only Permitted Users Can View when you need a strict allowlist.

Did this answer your question?