Our core commitment is to the security and integrity of your data. It’s no surprise, therefore, that we chose Amazon Web Services, the world’s leading cloud service platform, to host our infrastructure.
By using AWS to power our platform, we absorb the highest global standards of AWS architecture, server operations, and compliance regulations to host your data. When you run your business on Tadabase, you can do so confidently knowing that your data is secured by AWS best practices and the industry’s most advanced cloud security controls. You can read more about AWS security practices here.
Tadabase data is hosted in AWS data centers that have been certified as ISO 27001, PCI/DSS Service Provider Level 1, and/or SOC II compliance.
AWS data centers are secured by global AWS Security Operation Centers and advanced physical security measures which you can read more about here.
Our network security architecture consists of multiple security zones to protect against unauthorized access at all times.
We use Sqreen, a third party network security solution, to monitor and protect our infrastructure from automated scanners, bots, and targeted attacks. It blocks attacks and alerts in case of critical threats. It also brings additional features like IP blocking and firewalls that monitor and control incoming and outgoing network traffic.
Dedicated Security Team
Tadabase staff includes a dedicated rapid-response security team for 24/7 prevention monitoring and reactive response to security alerts and events.
Application Security Protection
Tadabase uses Sqreen to integrate advanced protections within our applications and protect our users from data breaches. It integrates protections against the most critical attack categories, such as SQL injections and cross-site scripting, and adds security headers to our applications. It blocks attacks in real-time and warns us when attackers start stressing our applications. Sqreen uses a runtime protection system that identifies and blocks OWASP Top 10 and business logic attacks in real-time.
System Status Monitoring
Tadabase maintains a publicly available status webpage which lists current system status stats, security event history details, and scheduled upgrade and/or maintenance details.
AWS Auto-Scaling and Load Balancing
Tadabase uses AWS architecture features such as auto-scaling and elastic load balancing to automate our scalability and ensure that apps are always optimized for speed, high availability, and redundancy.
Tadabase maintains a publicly available updates webpage which lists a chronological history of all recent updates including new product features, improvements, and big fixes.
Tadabase stores data on multiple databases to eliminate single points of failure and increase availability. Data is stored in multiple locations to distribute availability across multiple geographic locations and time zones.Tadabase employs daily backups of active apps for further redundancy and stores backups across multiple locations separate from the database servers.
Backup and Restore
All active Tadabase apps are backed up on a daily basis, encrypted with AES-256 encryption keys, and stored across multiple locations that are separate from the database servers.All daily backups can be restored instantly by our support staff. We are currently in process of enabling users to see backup logs from within the builder. Users are free to manually backup their data at any time by exporting their data to a CSV file.
Tadabase enforces strict Disaster Recovery policies including daily encrypted backups, daily testing procedures, and strategic disaster recovery planning and training to ensure that data is available and restorable in case of disaster.
Easily create exportable templates or automate a data backup to export all your data easily from the platform.
Encryption in Transit
All data sent to or from our infrastructure is encrypted in transit via industry best practices using Transport Layer Security (TLS).
Encryption at Rest
All our user data (including passwords) is encrypted using battled-proofed encryption algorithms in the database.
We use SHA-256 and AES-256 encryption, the strongest encryption available used by governments, banks, and federal-level agencies around the world.
With this feature you can enable IP address whitelisting within your app settings to ensure that your apps are only accessible by networks you’ve authorized.
Granular Page Controls
Assign roles for each of your users and define the data access permissions each role has. Restrict access to pages and parts of pages of your app to specific users who you deem relevant and authorized to view those pages or sections.
We recommend following the least-privilege approach with which you enable necessary pages vs blocking restricted pages. To learn more about maximizing user roles and permissions please contact firstname.lastname@example.org.
Create connections between users and records to ensure that logged-in users can only access records that are connected to them.
Define custom password policies for each user and for each application, ensuring that users meet the password requirements you determine to be appropriate for specific apps and users.
All user passwords are encrypted and hashed.
All data is encrypted and secured with SSL.
Record Change Logs
View all changes made in your app with additional meta data such as location, IP address and other browser and user details.
Page time-out settings
Tadabase customers can create custom time-out settings to ensure that devices left unattended for a specified amount of time to require re-logging in for continued access.
Track all successful and failed logins to your application.
Block Failed Login Attempts
Enable custom settings to block an ip or user after x number of logins within x minutes.
2 Factor Authentication
Require 2 Factor Authentication for your users to login into your app.
Singe Sign On (SSO)
Use Single Sign On to require your users to login using a specified vendor such as Google
Whitelisted Email Domains
Add whitelisting to only allow signing up from white-listed domains.
Track and monitor all emails sent from your app.
Track and monitor all changes made to your app from within the builder.
See and track all deleted records from within your app.
Secure your app with advanced permissions for your API keys such as enabling or disabling access to delete, edit, or get records. You can also enable or disable any API keys as needed.
Any data you store on Tadabase is owned by you and Tadabase claims no ownership on your data.
If you need support assistance from the Tadabase support team you can enable access for the Tadabase support team to access your account to troubleshoot any issues with your applications or account. By default, this support access is disabled and can only be enabled by an account admin in the security settings of your app.Any support access to your account by the Tadabase support team is logged and time-stamped.Any support access to your account by the Tadabase support team is done via a secure virtual private network that is continuously monitored by our dedicated security team for security alerts or events.
Tadabase engineers conduct development and testing on a development platform completely separate from any live data. Bugs, errors, development kinks, etc. are fully tested in our separate “development sandbox” via comprehensive testing procedures to ensure that live data is not affected by bugs, errors, security vulnerabilities, or imperfect development.Tadabase uses Sqreen to remediate vulnerabilities that were triggered by security tests, audits, or bug bounty programs. We are also warned when application components with known vulnerabilities are used in production (dependencies).
Amazon is continuously audited by 3rd party compliance controls and holds compliance certifications from the strictest compliance programs including SOC 3 and ISO 27001. Learn more about AWS compliance here.
Tadabase is SOC 2 Type 1 compliant and will be SOC2 Type 2 compliant no later than January, 2022. Certification of SOC 2 compliance will certify our best practices for security, availability, and confidentiality by an independent 3rd party auditing program and the leading standard for cloud security control. Please contact us at Security@tadabase.io for more information on our SOC 2 readiness and future compliance.
Tadabase offers HIPAA compliant editions of our platform which will include field level encryption, password policies, and BAA agreements. Please contact us for more details at Security@tadabase.io.
Tadabase is GDPR ready. The purpose of GDPR is to protect the private information of EU citizens and give them more control over their personal data. Please contact us at Security@tadabase.io for more information on our GDPR readiness and future compliance. Tadabase has an available Data Processing Addendum for paid plans that can extend the terms of service to reflect the processing of personal data. Please contact Security@tadabase.io for more details on getting the DPA.
Tadabase performs annual PenTesting on all production environments being utilized for storing and processing your data.