Home
/ Blog /
Navigating the Video Call API Landscape: Compliance & SecurityAugust 16, 202212 min read
Share
The simple fact of existing on the internet means that your data will be vulnerable to breach, theft, and unauthorized usage — malicious or otherwise. To prevent such occurrences, an audio-video infra provider’s security framework and compliance certifications become an essential point of consideration for prospective customers. You’d want to know that the tool you choose is serious about protecting your data from undesired access and legal complications.
As data breaches become more frequent, data security becomes a central concern for anyone seeking to use any software. Even the world’s largest companies (Weibo, Target, eBay, etc.) suffer the consequences of inadequate data protection. Vendors you choose must be able to shield the security and privacy of your data from malicious or undesirable parties.
In this regard, it’s essential to pay attention to a vendor’s IT security fabric. Gauging this requires observation of two aspects: compliance certifications and specific security features.
Compliance certifications denote that an organization and its infrastructure meet the industry standards for data security and privacy.
Specific security features such as access control and end-to-end encryption reveal the particular techniques used to guard your data and provide transparency to the right people. For example:
Close attention to IT security and compliance reveals how invested a company is in protecting its customers from invasions of privacy as well as the losses and failures that come with data theft or manipulation.
When evaluating vendors for purchase, keep an eye out for the following key security compliance standards and features.
SOC 2 Type I & SOC 2 Type II: A SOC 2 Type I report assesses the nature of security processes and control in an organization at a specific point in time. The report describes what said controls are, and evaluates if they are implemented effectively.
A SOC 2 Type II report assesses the efficacy of an organization’s controls over a certain period. The auditor will usually observe operations over a few months (minimum of six months). Unlike HIPAA or GDPR, SOC 2 reports are not legally mandated but voluntary. However, they are a significant marker of how well a company (SaaS, cloud computing orgs, IT-first providers) is protecting data within their information centers.
General Data Protection Regulation (GDPR): Drafted and passed by the European Union (EU), the GDPR is a set of legal obligations placed upon organizations worldwide that work with or accumulate data from or related to EU citizens. The regulations lay out meticulous privacy and security standards, and violating them results in penalties and heavy fines. GDPR intends to secure citizens’ information and ensure data privacy and security in an increasingly online world.
Health Insurance Portability and Accountability Act, 1996 (HIPAA): HIPAA is an American federal law passed by the US Department of Health and Human Services (HHS). It is a set of national standards created to safeguard sensitive patient data from being disclosed without the patient’s consent/knowledge. American healthcare providers, health plans, healthcare clearinghouses, and business associates working with individually identifiable health information have to follow HIPAA. HIPAA is mainly relevant for healthcare entities operating in the US or using the medical information of American citizens.
ISO/IEC 27001 Information Security Management (ISO/IEC 27001): This international standard defines a set of requirements for information security management. Complying with this framework ensures that an organization securely manages assets like intellectual property, financial data, employee information, or any information entrusted by third parties.
California Consumer Privacy Act (CCPA): CCPA is meant to secure privacy rights for California consumers by giving them greater control over the information businesses may collect about them. Among other things, it gives consumers the right to demand the deletion of personal data a company collected from them. They can also deny enterprises the right to sell their personal information to other parties.
Children's Online Privacy Protection Rule (COPPA): COPPA is an American federal law enforced by the Federal Trade Commission. It obligates specific requirements on websites and online services that intentionally collect personal information of children younger than 13 years of age. The FTC states that COPPA applies to:
Access control: The SDK must have an in-build ability to restrict who has access to active meeting rooms and the admin dashboard. For example, certain video apps admit every meeting participant into a virtual “waiting area” where they wait until the host or administrator allows them to join the meeting.
Role-Based Access Control (RBAC) is also a priority. Customers should be able to restrict dashboard access based on an individual’s role within the organization. For example, someone in an administrative role should be able to access sensitive data on the usage dashboard, but those permissions may not apply to regular employees.
Enterprise Authentication: Enterprise authentication mechanisms like SSO/SAML cut down on operational overhead by centrally managing user credentials. SSO offers a single system to authenticate users and grant them access to multiple applications across a company or organization.
End-to-End Encryption (E2E Encryption): End-to-end encryption ensures that the only people who can access data in a communication channel are the sender and intended receiver(s). No one else, be it hackers, unwanted third parties, or even the audio-video service used to communicate said data, can access the encrypted data.
Privacy of Recordings: Often, online meetings and calls are recorded with a recording feature provided by the vendor. If stored on the vendor’s cloud, the recordings must be private and inaccessible to anyone but authorized personnel — be it the customer or specific individuals on the vendor’s team.
Audit Trails: Audit trails track and present a record of all system and user activity so that any changes to app operations are captured and viewable by relevant administrators. With the right tools and protocols in place, audit trails are integral to identifying performance issues, security infractions, or unsanctioned process changes.
Note: All information in this piece is taken from publicly available product/vendor documentation.
Source: Agora Compliance & Privacy*
Access Control:
Enterprise Authentication: We examined Agora’s documentation and asked on Agora’s StackOverflow, but were unable to determine the answer with complete accuracy. We have contacted Agora for more data and will update the article when receiving more clarity. You can contact Agora Sales for more information.
End-to-End Encryption:
Agora does not support end-to-end encryption by default. It supports the same in limited use cases where server-side services (e.g., recording, transcoding, etc.) are not involved. It supports data and transmission encryption, and uses a proprietary secure transport layer, Agora Universal Transport (AUT), to ensure data confidentiality during transmission. Source.
All communication between a user and the Agora server is secured by numerous transmission protocols - the Agora private transmission protocol, Transport Layer Security (TLS), and Web Socket Secure (WSS). Users can choose to leverage the Advanced Encryption Standard (AES) or a customized encryption algorithm to guard audio and video data.
While data is being transmitted, the Agora SD-RTN™ does not communicate encryption key information of any kind. Data related to a call’s content will only be decrypted on the terminal device (the client app & the customer's on-premise recording server) via the client authorization key. Source.
With the SDK, devs can encrypt users' media streams during real-time communication using the media stream encryption Agora provides. They can call the API, choose the encryption mode, and set the encryption secret and salt.
Agora supports the following encryption modes:
"aes-128-xts"
: 128-bit AES encryption, XTS mode
"aes-256-xts"
: 256-bit AES encryption, XTS mode
"aes-128-gcm"
: 128-bit AES encryption, GCM mode
"aes-256-gcm"
: 256-bit AES encryption, GCM mode
"aes-128-ecb"
: 128-bit AES encryption, ECB mode
"sm4-128-ecb"
: 128-bit SM4 encryption, ECB mode
"aes-128-gcm2"
: 128-bit AES encryption, GCM mode, with salt. Only applicable to the Web SDK v3.6.0 or later
"aes-256-gcm2"
: 256-bit AES encryption, GCM mode, with salt. Only applicable to the Web SDK v3.6.0 or later
Source: Agora Media Stream Encryption*
Privacy & Encryption of Recordings:
Audit Trails:
Agora meticulously monitors and restricts access to its internal systems. Users have independent internal accounts with corresponding authorization procedures such as two-step verification. All the access details are recorded. Source.
Source: Twilio Security*
Access Controls:
Enterprise Authentication:
Twilio supports Single Sign-On, which lets customers allow log-ins using a corporate Identity Provider (Azure Active Directory, Okta, Onelogin, etc.).
SSO gives customers the ability to authenticate users via a single source. It lets them manage security and compliance requirements, such as establishing two-factor authentication.
Users who leave an organization can be entirely removed from a single dashboard.
Source: Twilio Single Sign-On*
End-to-End Encryption:
Privacy & Encryption of Recordings:
Audit Trails:
Source: Jitsi as a Service*
Access Control:
Moderators can secure meetings by adding a pin code on enabling the lobby option or doing both. With the latter, every participant will initially join the lobby area and ask to be admitted into the meeting (via a button in the UI). The moderator will be notified that a particular individual with a specific user name is requesting entry and can accept or reject their request.
Source: JaaS Meeting Security
Enterprise Authentication:
We examined JaaS’s documentation but were unable to determine the answer with complete accuracy. We have tried to contact JaaS and will update the article when we receive more clarity. You can contact JaaS Sales for more information.
End-to-End Encryption:
JaaS states that they provide “true end-to-end encryption even with video bridge for desktop video meetings.” No further details on the page.
Source: JaaS Pricing
Privacy & Encryption of Recordings:
We examined JaaS’s documentation but were unable to determine the answer with complete accuracy. We have tried to contact JaaS and will update the article when we receive more clarity. You can contact JaaS Sales for more information.
Audit Trails:
We examined JaaS’s documentation but were unable to determine the answer with complete accuracy. We have tried to contact JaaS and will update the article when we receive more clarity. You can contact JaaS Sales for more information.
Source: Zoom Legal Compliance*
Access Control:
Zoom offers multiple features to implement access control. Some of them include:
Each user with a Zoom account is automatically assigned a system role: owner, administrator, or member. Roles determine the default set of permissions; what users can do when they sign in to Zoom. Source.
Only account owners can change or reassign roles. Zoom offers role-based access control, which lets admins create additional user roles. These user roles can further restrict permissions by allowing individuals to access only specific pages. Owners can also change permissions for those in the Admin role. Source.
Enterprise Authentication:
End-to-End Encryption:
On Zoom, account owners and admins can enable E2E encryption for meetings, but all participants must join from the Zoom desktop client, mobile app, or Zoom Rooms.
However, activating E2E encryption disables server-side functions like recording, breakout rooms, polling, live streaming, transcription, etc.
It also prevents users from joining by telephone, SIP/H.323 devices, on-premise configurations, Zoom’s web client, third-party clients leveraging the Zoom Web SDK, or Lync/Skype clients.
Source: E2EE for meetings
Privacy & Encryption of Recordings:
Zoom allows encryption of a session’s audio, video, and screen sharing. The content is guarded by the Advanced Encryption Standard (AES) 256 with a one-time key, specific to each session while using a Zoom client.
Recordings stored on the host’s device must be encrypted separately using an external source. All cloud recordings are stored in the cloud right after a meeting ends. They can be password protected and made available to users within an organization.
Only a meeting host and the account admin can access the recording feature in meetings. They can allow others to access the recording as required.
Audit Trails:
Zoom’s Reports sections allow paid account owners and admins to view multiple layers of meeting, account, and webinar statistics. They can view who is attending meetings, get stats on registrations for webinars, track changes to Account & Group settings, roles, user license assignments, subscriptions, SSO config, who signed in or out, and much more. For a much deeper dive into what Zoom offers, have a look at the Zoom reporting page.
Note: VAPT tests are run every year by a third-party vendor to assess the 100ms infrastructure and tech stack.*
Access Control:
Enterprise Authentication:
The feature is unavailable at the time of writing.
End-to-End Encryption:
Transmissions are encrypted from peer to server and server to peer. The server is a private entity that cannot be accessed by unauthorized personnel, rendering all sessions and recordings immune from undesirable access and usage.
Privacy & Encryption of Recordings:
Call recordings are encrypted during transmission and in storage. In other words, customers can expect encryption at rest and at transmission.
Audit Trails:
The feature is not available at the time of writing. However, like RBAC, it is in the process of being developed and implemented.
COMPLIANCE & SECURITY | Agora | Twilio | Jitsi | Zoom | 100ms |
Certifications |
SOC 2 ✓
GDPR ✓ HIPAA ✓ ISO/IEC 27001 ✓ CCPA ✓ COPPA ✓ |
AICPA SOC 2 ✓ GDPR ✓
HIPAA ✓ ISO/IEC 27001 ✓ CCPA × COPPA × |
SOC 2 ×
GDPR ✓ HIPAA ✓ ISO/IEC 27001 × CCPA × COPPA × |
SOC 2 Type II ✓
GDPR ✓ HIPAA ✓ ISO/IEC 27001 ✓ CCPA × COPPA × |
SOC 2 (Type I & Type II) ✓
GDPR × HIPAA ✓ ISO/IEC 27001 × CCPA × COPPA × |
Access Control | ✓ | ✓ | ✓ | ✓ |
✓
RBAC × |
Enterprise Authentication | ? | ✓ | ? | ✓ | × |
E2E Encryption | In limited instances ✓ | In Peer-to-Peer Rooms ✓ | ✓ | In limited use cases ✓ | Peer to server, and server to peer ✓ |
Privacy of Recordings | ✓ | ✓ | ? | ✓ | ✓ |
Audit Trails | ✓ | ✓ | ? | ✓ | × |
Video
Share
Related articles
See all articles