Dropbox Business Security Whitepaper
Table of Contents
Apps for Dropbox .......................................................................................................................................................28
Pre-built components .........................................................................................................................................................................28
Dropbox for Teams API integrations .................................................................................................................................................29
API partnerships................................................................................................................................................................................... 31
Dropbox integrations.................................................................................................................................................32
Product security ........................................................................................................................................................32
Content controls ..................................................................................................................................................................................33
Content visibility ..................................................................................................................................................................................35
Team controls ....................................................................................................................................................................................... 37
Managed devices and log-in...............................................................................................................................................................40
Key storage .................................................................................................................................................................49
Local authentication .................................................................................................................................................49
Dropbox Passwords.................................................................................................................................................. 50
Zero-knowledge encryption ..............................................................................................................................................................50
Encryption details................................................................................................................................................................................50
Keys and recovery words ................................................................................................................................................................... 51
Device enrollment ................................................................................................................................................................................ 51
Privacy certifications, attestations, and regulatory compliance.....................................................................52
Compliance .................................................................................................................................................................54
Summary .....................................................................................................................................................................58
Dropbox Dash 59
Encryption...................................................................................................................................................................59
Under the hood...........................................................................................................................................................59
Connector platform .............................................................................................................................................................................60
Search and metadata databases......................................................................................................................................................60
AI / Ranking service..............................................................................................................................................................................60
ACL service............................................................................................................................................................................................ 61
Query service........................................................................................................................................................................................ 61
Users & devices .................................................................................................................................................................................... 61
Connector data storage...................................................................................................................................................................... 61
Natural language services .................................................................................................................................................................. 61
Application security .................................................................................................................................................. 61
Dash user interfaces ........................................................................................................................................................................... 61
Web browser extension ......................................................................................................................................................................62
Desktop..................................................................................................................................................................................................62
Integrations...........................................................................................................................................................................................62
Privacy ........................................................................................................................................................................ 63
Use of artificial intelligence (AI).........................................................................................................................................................63
Data transfers.......................................................................................................................................................................................63
Compliance ................................................................................................................................................................ 64
Compliance certifications, attestations, and regulatory compliance.......................................................................................64
3