DocuSign Hardening Guide
eSignature platform hardening for DocuSign including SSO configuration, session security, and admin controls
Overview
DocuSign is the leading eSignature platform used by over 1 million customers worldwide for digital agreements, contracts, and document workflows. As a repository for sensitive business documents and legally binding agreements, DocuSign security configurations directly impact document integrity and regulatory compliance.
Intended Audience
- Security engineers managing business applications
- IT administrators configuring DocuSign Enterprise
- GRC professionals assessing document security
- Legal/compliance teams managing agreement workflows
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers DocuSign eSignature security configurations including admin tools, SSO, security settings, and compliance features.
Table of Contents
- Authentication & SSO
- Security Settings
- Admin Controls
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication and enforce organizational security policies.
Rationale
Why This Matters:
- Enterprise SSO ties DocuSign access to corporate identity
- Enables enforcement of MFA through IdP
- Supports just-in-time provisioning
- Critical for SOC 2 and ISO 27001 compliance
Prerequisites
- DocuSign Enterprise plan
- Domain verified in DocuSign Admin
- SAML 2.0 compatible IdP
ClickOps Implementation
Step 1: Access SSO Configuration
- Navigate to: DocuSign Admin → Identity Providers
- Click Add Identity Provider
- Select SAML 2.0
Step 2: Configure IdP Settings
- Enter IdP metadata:
- Entity ID
- SSO URL
- Certificate
- Download DocuSign SP metadata for IdP configuration
Step 3: Configure IdP Application
- Create SAML application in IdP
- Configure attribute mappings:
- Email (required)
- First name, last name (optional)
- Assign users/groups
Step 4: Enforce SSO
- Test SSO authentication
- Check Require all users to login with SSO only
- Configure backup admin access
Time to Complete: ~1 hour
1.2 Enforce Multi-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require MFA for all DocuSign users.
ClickOps Implementation
Step 1: Enable MFA via SSO
- Configure MFA enforcement in your IdP
- All SSO users will require MFA
- Verify MFA is enforced before login
Step 2: Native DocuSign MFA (if not using SSO)
- Navigate to: Admin → Security Settings
- Enable two-factor authentication
- Configure allowed methods
Step 3: Session Control
- Configure conditional access policies in IdP
- Enable session control for data protection
- Configure re-authentication requirements
1.3 Configure User Provisioning
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.3 |
| NIST 800-53 | AC-2 |
Description
Configure automated user provisioning and deprovisioning.
ClickOps Implementation
Step 1: Enable JIT Provisioning
- Configure SSO with JIT provisioning enabled
- User accounts created on first login
- Roles assigned based on IdP attributes
Step 2: Configure SCIM (if available)
- Navigate to: Admin → User Management → SCIM
- Generate SCIM token
- Configure IdP SCIM integration
Step 3: Configure Automatic Deprovisioning
- Ensure disabled IdP users lose DocuSign access
- Test deprovisioning workflow
- Document offboarding procedures
2. Security Settings
2.1 Configure Session Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.2 |
| NIST 800-53 | AC-12 |
Description
Configure session timeout and security settings.
ClickOps Implementation
Step 1: Configure Session Timeout
- Navigate to: Admin → Security Settings
- Configure session settings:
- Idle timeout: 15-30 minutes
- Maximum session: 8 hours
- Apply to all users
Step 2: Configure Fixed Web Session Length
- Set fixed session length if needed
- Configure re-authentication for sensitive operations
2.2 Configure Document Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-8, SC-28 |
Description
Configure document encryption and security settings.
ClickOps Implementation
Step 1: Verify Encryption
- DocuSign uses AES 256-bit encryption at rest
- TLS 1.2+ for data in transit
- Verify certificate-based signatures
Step 2: Configure Access Permissions
- Navigate to: Admin → Permissions
- Configure who can:
- Send envelopes
- Access templates
- View audit trails
- Apply least privilege
Step 3: Configure Retention
- Set document retention policies
- Configure automatic purging if needed
- Comply with legal holds
2.3 Configure Envelope Security
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-8 |
Description
Configure enhanced security for sensitive envelopes.
ClickOps Implementation
Step 1: Configure Signing Authentication
- Navigate to: Account → Signing Settings
- Configure signer authentication:
- Email verification
- Access code
- Phone authentication
- SMS verification
- Knowledge-based authentication
Step 2: Configure Envelope Expiration
- Set default expiration periods
- Configure reminders
- Enable notifications
3. Admin Controls
3.1 Implement Role-Based Access Control
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Configure role-based permissions for DocuSign administration.
ClickOps Implementation
Step 1: Review Permission Profiles
- Navigate to: Admin → Permission Profiles
- Review available profiles:
- Account Administrator
- Sender
- Viewer
- Create custom profiles as needed
Step 2: Assign Appropriate Roles
- Limit Account Administrator to essential personnel
- Use Sender for standard users
- Use Viewer for read-only access
Step 3: Configure Permission Settings
- Configure granular permissions:
- Template management
- User management
- Branding settings
- API access
3.2 Centralize Admin Management
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Use DocuSign Admin Tools for centralized management across accounts.
ClickOps Implementation
Step 1: Configure Admin Tools
- Navigate to: DocuSign Admin
- Link multiple accounts if applicable
- Configure centralized policies
Step 2: Configure Bulk Operations
- Use bulk user management
- Apply consistent security settings
- Manage SSO centrally
3.3 Configure API Security
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Secure DocuSign API access and integrations.
ClickOps Implementation
Step 1: Manage Integration Keys
- Navigate to: Apps and Keys
- Review existing integration keys
- Remove unused integrations
Step 2: Configure API Permissions
- Grant minimum required scopes
- Use OAuth 2.0 authentication
- Rotate keys regularly
Step 3: Monitor API Usage
- Review API call logs
- Alert on unusual patterns
- Set rate limiting
4. Monitoring & Compliance
4.1 Configure Audit Trails
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable comprehensive audit logging for compliance.
ClickOps Implementation
Step 1: Access Audit Trails
- Navigate to: Reports → Audit Trail
- Review envelope audit certificates
- Export for compliance documentation
Step 2: Configure Admin Activity Logs
- Review admin actions
- Track configuration changes
- Monitor user management
Key Events to Monitor:
- User login events
- Envelope sends and completions
- Template changes
- Admin configuration changes
- Permission modifications
4.2 Configure Compliance Features
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 8.11 |
| NIST 800-53 | CA-7 |
Description
Enable compliance-specific features for regulated industries.
ClickOps Implementation
Step 1: Enable Advanced Audit
- Configure advanced audit features
- Enable tamper-evident logging
- Configure certificate of completion
Step 2: Configure Retention
- Set retention policies per document type
- Configure legal holds
- Enable compliance exports
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | DocuSign Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/MFA | 1.1 |
| CC6.2 | RBAC | 3.1 |
| CC6.7 | Encryption | 2.2 |
| CC7.2 | Audit trails | 4.1 |
| CC7.3 | Compliance features | 4.2 |
NIST 800-53 Rev 5 Mapping
| Control | DocuSign Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| IA-2(1) | MFA | 1.2 |
| AC-2 | User provisioning | 1.3 |
| AC-6 | Least privilege | 3.1 |
| AU-2 | Audit logging | 4.1 |
Appendix A: Plan Compatibility
| Feature | Personal | Standard | Business Pro | Enterprise |
|---|---|---|---|---|
| SSO | ❌ | ❌ | ❌ | ✅ |
| MFA | Basic | Basic | Basic | ✅ |
| Admin Tools | ❌ | ❌ | ✅ | ✅ |
| Advanced Authentication | ❌ | ❌ | ✅ | ✅ |
| API Access | ❌ | ❌ | ✅ | ✅ |
Appendix B: References
Official DocuSign Documentation:
- Trust Center
- Support Center
- Security Settings Guide
- Product Security
- Security for DocuSign eSignature
- Security Recommendations and Best Practices
- DocuSign Trust and Security Overview (PDF)
API & Developer Documentation:
Compliance Frameworks:
- SOC 1 Type II, SOC 2 Type II, ISO 27001:2022, ISO 27017, ISO 27018 — via Certifications
- PCI DSS v4.0 compliant
- Annual business continuity and disaster recovery testing per ISO 27001 controls
- Compliance Overview
Security Incidents:
- No major public security incidents identified affecting the DocuSign platform directly. DocuSign has been a frequent target of phishing campaigns impersonating the service, but these are social engineering attacks against end users rather than platform compromises.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, security settings, and admin controls | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide