Security for Docusign CLM
Security is in Docusign’s DNA, and like all of our products, Docusign CLM is researched, designed, and developed with security as a top priority.
This document outlines the security technologies, policies, and practices that protect your documents and data within Docusign CLM. For security details common to all Docusign products, visit product security on the Trust Center.
Physical and logical security
Docusign maintains around-the-clock onsite security with strict physical access control that complies with industry-recognized standards, such as SOC 1, SOC 2, and ISO 27001.
We also use world-class security software and hardware to protect the physical integrity of Docusign CLM and all associated computer systems and networks that process customer data. We do this through a centralized management system that controls access to the production environment through a global two-factor authentication process.
This isolated production environment is protected by industry-leading network management systems, anti-virus software, and malware detectors. The anti-virus software is integrated with processes that automatically generate alerts to Docusign’s cyber incident response team if potentially harmful code is detected.
Security testing and vulnerability management
The quality and integrity of Docusign CLM is ensured by a formal product development lifecycle that includes secure coding practices in accordance with OWASP and related standards. Rigorous automated and manual code reviews are designed to pinpoint security weaknesses. We also perform internal and external vulnerability scans and penetration tests against the Docusign CLM production environment. Any identified weaknesses from these industry-compliant tests are remedied in a commercially reasonable manner and in a timeframe commensurate with their severity.
Security monitoring
We monitor Docusign CLM from both an operational and a security perspective. Intrusion prevention and detection events are logged, and tailored alerts are sent to our operations and security teams to ensure that Docusign CLM can be used without security exposure from any location by those authorized to access it.
Storage, encryption, and disposal
To ensure your data stays protected, Docusign follows industry best practices to
Logically separate individual customer data
Encrypt customer data—all data access and transfer activities use HTTPS and other secure protocols, such as SSL, SSH, IPsec, SFTP, or secure channel signing and sealing
Support only recognized cipher suites
Encrypt all documents with AES 256-bit encryption or the most recent FIPS-approved methods
Provide non-repudiation for all documents generated and signed using Docusign via a Certificate of Completion
Maintain a data disposal and re-use policy for managing data assets
Implement processes for equipment management and secure media disposal
Destroy media and render it unrecoverable in accordance with the National Institute of Standards’ Guidelines for Media Sanitization, SP800-88
Business continuity and disaster recovery
Docusign maintains written business continuity and disaster recovery plans that ensure the continuing availability of Docusign CLM. The continuity plan includes crisis management, business recovery, and infrastructure elements, and we test both plans on an annual basis in accordance with ISO 27001 controls.
Configurable security features
Docusign CLM offers the following customer-configurable features:
Multi-factor authentication provides an additional level of assurance that only those authorized to access Docusign CLM and associated documents can access them
Role-based authorization for all business transaction types enables you to designate access to specific individuals
Allowlists for Docusign CLM service
Our top priority is to make your Docusign CLM experience safe and secure, and it’s our intention to provide the most robust and reliable service possible to enable your business transactions. We also want to proactively share information that may be of interest to you regarding our service and understand the requirement to configure security to the needs of your organization.
Docusign customers should configure their spam filters and other software to allow for the following allowlisted domains to be accepted. They should also explicitly allow Internet addresses advertised by Docusign CLM. It’s important to keep up-to-date with our current IP address ranges.
Domains
We recommend allowlisting all subdomains under the following domains:
.docusign.com
.docusign.net
Notifications to Docusign CLM.DS accounts now come from the @springcm.docusign.net email domain. CLM.CM accounts come from the @springcm.net email domain. Customers must add these domains to their allowlists and must add any applicable IP ranges to their trusted IP ranges.
CLM IP addresses
Customers need to allowlist the following IP addresses for CLM:
North America-based and UAT/demo accounts (current and continuing):
IP range: 209.112.106.0 - 209.112.107.255
CIDR notation: 209.112.106.0/23IP range: 20.12.134.144 - 20.12.134.159
CIDR notation: 20.12.134.144/28IP range: 20.253.118.128 - 20.253.118.143
CIDR notation: 20.253.118.128/28IP range: 20.7.89.192 - 20.7.89.207
CIDR notation: 20.7.89.192/28IP range: 20.171.224.80 - 20.171.224.95
CIDR notation: 20.171.224.80/28IP range: 20.12.135.144 - 20.12.135.159
CIDR notation: 20.12.135.144/28IP range: 20.253.118.160 - 20.253.118.175
CIDR notation: 20.253.118.160/28IP range: 20.7.90.48 - 20.7.90.63
CIDR notation: 20.7.90.48/28IP range: 20.40.31.128 - 20.40.31.143
CIDR notation: 20.40.31.128/28IP range: 20.12.135.160 - 20.12.135.175
CIDR notation: 20.12.135.160/28IP range: 20.253.118.176 - 20.253.118.191
CIDR notation: 20.253.118.176/28IP range: 20.7.90.64 - 20.7.90.79
CIDR notation: 20.7.90.64/28IP range: 20.171.224.16 - 20.171.224.31
CIDR notation: 20.171.224.16/28IP range: 52.177.241.22 - 52.177.241.23
CIDR notation: 52.177.241.22/31IP range: 20.236.201.102 - 20.236.201.103
CIDR notation: 20.236.201.102/31IP range: 20.241.243.190 - 20.241.243.191
CIDR notation: 20.241.243.190/31IP range: 20.125.64.104 - 20.125.64.105
CIDR notation: 20.125.64.104/31
European Union-based accounts (current and continuing):
IP range: 185.81.100.1 - 185.81.103.254
CIDR notation: 185.81.100.0/22IP range: 192.103.120.1 - 192.103.123.254
CIDR notation: 192.103.120.0/22IP range: 20.93.100.0 - 20.93.100.15
CIDR notation: 20.93.100.0/28IP range: 20.4.162.48 - 20.4.162.63
CIDR notation: 20.4.162.48/28IP range: 20.93.100.208 - 20.93.100.223
CIDR notation: 20.93.100.208/28IP range: 20.4.162.32 - 20.4.162.47
CIDR notation: 20.4.162.32/28IP range: 20.93.100.64 - 20.93.100.79
CIDR notation: 20.93.100.64/28IP range: 20.4.162.64 - 20.4.162.79
CIDR notation: 20.4.162.64/28IP range: 20.23.72.48 - 20.23.72.49
CIDR notation: 20.23.72.48/31IP range: 20.223.8.20 - 20.223.8.21
CIDR notation: 20.223.8.20/31
Docusign email and CLM Notification IP addresses
If customers need to allowlist Docusign’s email IP addresses, the following apply:
North America-based and demo accounts (current and continuing):
IP range: 209.112.104.1 - 209.112.107.254
CIDR notation: 209.112.104.0/22IP range: 64.207.216.1 - 64.207.219.254
CIDR notation: 64.207.216.0/22IP range: 162.248.184.1 - 162.248.187.254
CIDR notation: 162.248.184.0/22IP range: 54.240.32.183
CIDR notation: 54.240.32.183/32
European Union-based accounts (current and continuing):
IP range: 185.81.100.1 - 185.81.103.254
CIDR notation: 185.81.100.0/22IP range: 192.103.120.1 - 192.103.123.254
CIDR notation: 192.103.120.0/22
Additional third-party providers email IP addresses
Customers that use static email IP range filters on their incoming email servers will need to add new IP addresses in the allowlist to prevent rejection of legitimate Docusign emails.
North America-based and demo accounts
IP range 54.240.115.126 - 54.240.115.137 and IPs:
161.38.201.204
161.38.201.205
161.38.201.202
161.38.201.203
European Union-based accounts
IP range 54.240.54.89 - 54.240.54.92 and IPs:
204.220.160.187
204.220.160.199
Support for Sender Policy Framework (SPF) record checking
To flag and quarantine malicious spam on mail servers, enable both Sender Policy Framework (SPF) lookup functionality and Domain-based Message Authentication, Reporting & Conformance (DMARC). The combination of these technologies helps protect against malware spam attacks. Learn more about SPF at http://www.open-spf.org/ and DMARC at http://www.dmarc.org/.