Login
Enterprise Security

Customer engagement is built on Trust. We are too.

Base is committed to the security of our customers and their data. As a cloud-based company entrusted with some of your most valuable data, we are focused on keeping you and your data safe. Base undergoes periodic penetration testing, and encrypts data at rest and in-transit. Keeping customer data safe is our priority.

Trusted & Certified

Our SOC 2 Type 2 report attests to the security controls we have in place as they map to Trust Service Principles established by the American Institute of Certified Public Accountants (AICPA). We introduced a multi-tenant spaces approach where each space is fully isolated across companies and teams. This approach adheres to advanced access control measurements of who can share, watch or create content and with whom, within and outside your organization.

GDPR Ready badge
GDPR Ready

We adhere to all GDPR requirements ensuring full compliance with EU General Data Protection Regulation.

SOC 2 Type 2 badge
SOC 2 Type 2

Annual audits ensure the highest security standards across Trust Service Principles.

CCPA Ready badge
CCPA Ready

We're CCPA compliant and adhere to all California Consumer Privacy Act requirements for data protection rights.

Infrastructure & Reliability

Base services and data are hosted in Amazon Web Services (AWS) facilities. We built our platform with disaster recovery and business continuity in mind. All of our infrastructure and data centers are spread across different AWS availability zones and will continue to work should any one of those data centers fail.

Encryption

All data sent to or from Base is encrypted in transit using 256-bit encryption. We encrypt data at rest using an industry-standard AES-256 encryption algorithm.

Pentests & Vulnerability Scanning

Base uses third-party security tools to continuously scan for vulnerabilities. Our dedicated security team responds to issues raised. Annually, we engage third-party security experts to perform detailed penetration tests on the Base application and infrastructure.

Incident Response

Base implements a protocol for handling security events which includes escalation procedures, rapid mitigation and post mortem. All employees are informed of our policies.

Sparkle icon

Built on a Secure Platform

Data Encryption

AES-256 encryption for all data at rest and in transit.

SOC2 Compliant

Annual audits ensure the highest security standards.

Access Control

Role-based access with SSO and MFA support.

Audit Logging

Complete audit trail for every action and event.

Team Security

Our security commitment extends beyond technology to every member of our team. We ensure that all employees understand and follow our comprehensive security practices.

Training

All employees complete an Information Security & Privacy awareness training annually. Base maintains an auditable log of all employee training.

Policies

Base has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with all employees. Base maintains a published information security program containing documented policies, controls and implementation guidance.

Confidentiality

All employee contracts include a confidentiality agreement. Key data and information can be accessed only by those authorized to do so.

Internationally Recognized Certifications

Our security practices meet the highest international standards. Base has received multiple ISO certifications verified by third-party assessments.

ISO 27001 Certified badge
ISO 27001

Base received the ISO 27001:2013 certification. The audit evaluated our information security management system from product, infrastructure and organizational aspects, verifying that Base has the necessary controls in place to ensure the confidentiality, integrity and availability of sensitive information assets.

ISO 27018 Certified badge
ISO 27018

ISO 27018 focuses on protection of personal data in the cloud. It provides implementation guidance on controls applicable to public cloud personally identifiable information (PII). Base's alignment, verified by third-party assessment, demonstrates our commitment to the privacy and protection of customers' content.

ISO 27017 Certified badge
ISO 27017

ISO 27017 provides guidance on the information security aspects of cloud computing, recommending the implementation of cloud-specific information security controls that supplement the guidance of the ISO 27002 and ISO 27001 standards.

STAR Registry Level One badge
STAR Registry

Based on our assessment within the Cloud Controls Matrix, we are listed on the Security Trust Assurance and Risk (STAR) registry, which encompasses key principles of transparency, rigorous auditing, and cloud security best practices.