Pendo Hardening Guide
Product experience platform hardening for Pendo including SAML SSO, subscription access, and data privacy controls
Overview
Pendo is a product experience platform providing analytics, in-app guidance, and feedback tools. As a platform collecting user behavior data and enabling in-app messaging, Pendo security configurations directly impact data privacy and application security.
Intended Audience
- Security engineers managing product experience platforms
- IT administrators configuring Pendo
- Product teams managing analytics and guidance
- GRC professionals assessing data security
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Pendo security including SAML SSO, subscription access, API security, and data privacy controls.
Table of Contents
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication for Pendo users.
Prerequisites
- Pendo admin access
- Enterprise plan
- SAML 2.0 compatible IdP
ClickOps Implementation
Step 1: Access SSO Settings
- Navigate to: Settings → Subscription Settings → Single Sign-On
- Enable SAML SSO
Step 2: Configure SAML
- Configure IdP settings:
- SSO URL
- Entity ID
- Certificate
- Download Pendo metadata for IdP
Step 3: Test and Enforce
- Test SSO authentication
- Enable SSO enforcement
- Configure admin fallback
Time to Complete: ~1-2 hours
1.2 Enforce Two-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require 2FA for all Pendo users.
ClickOps Implementation
Step 1: Configure via IdP
- Enable MFA in identity provider
- All SSO users subject to IdP MFA
- Use phishing-resistant methods for admins
2. Access Controls
2.1 Configure User Roles
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Implement least privilege using Pendo roles.
ClickOps Implementation
Step 1: Review Roles
- Navigate to: Settings → Users
- Review available roles:
- Admin
- User
- Read-only
- Assign minimum necessary role
Step 2: Apply Least Privilege
- Use Read-only for viewers
- Limit Admin access
- Regular access reviews
2.2 Configure Subscription Access
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Control access to different subscriptions/apps.
ClickOps Implementation
Step 1: Configure Access
- Separate production and development apps
- Limit access per subscription
- Apply role restrictions
2.3 Limit Admin Access
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Minimize and protect administrator accounts.
ClickOps Implementation
Step 1: Inventory Admins
- Review admin accounts
- Document admin access
- Identify unnecessary privileges
Step 2: Apply Restrictions
- Limit admins to 2-3 users
- Require SSO for admins
- Monitor admin activity
3. Data Security
3.1 Configure Integration Key Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Secure Pendo integration keys.
ClickOps Implementation
Step 1: Review Keys
- Navigate to: Settings → Subscription Settings
- Review integration keys
- Document key usage
Step 2: Secure Keys
- Store keys securely
- Never expose in client-side code publicly
- Rotate if compromised
3.2 Configure Data Privacy
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.1 |
| NIST 800-53 | AC-3 |
Description
Configure data privacy controls.
ClickOps Implementation
Step 1: Configure Data Collection
- Review collected metadata
- Exclude sensitive fields
- Configure data masking
Step 2: Support Privacy Requests
- Configure deletion workflow
- Support GDPR/CCPA requests
- Document data handling
4. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Pendo Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/2FA | 1.1 |
| CC6.2 | User roles | 2.1 |
| CC6.7 | Key security | 3.1 |
NIST 800-53 Rev 5 Mapping
| Control | Pendo Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| AC-6 | User roles | 2.1 |
| SC-12 | Key security | 3.1 |
Appendix A: References
Official Pendo Documentation:
API Documentation:
Compliance Frameworks:
- SOC 2 Type II, ISO 27001, ISO 42001, HIPAA, GDPR, CCPA — via Trust Center
Security Incidents:
- No major public security incidents identified. Pendo conducts annual third-party security audits and penetration testing twice per year.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO and access controls | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide