Customer engagement is
built on Trust. We are too.
We’re SOC 2 Type 2 compliantOur SOC 2 Type 2 report attests to the security controls we have in place as they map to Trust Service Principles established by the American Institute of Certified Public Accountants (AICPA). We introduced a multi-tenant spaces approach where each space is fully isolated across companies and teams.
This approach adheres to advanced access control measurements of who can share, watch or create content and with whom; within and outside your organization. We’re also GDPR & CCPA compliant. We’re also CCPA compliant and adhere to all GDPR requirements.
All data sent to or from Base is encrypted in transit using 256 bit encryption. We encrypt data at rest using an industry-standard AES-256 encryption algorithm.
Pentests and Vulnerability Scanning
Base uses third-party security tools to continuously scan for vulnerabilities.
Our dedicated security team responds to issues raised.
Annually, we engage third-party security experts to perform detailed penetration tests on the Base application and infrastructure.
Base implements a protocol for handling security events which includes escalation procedures, rapid mitigation and post mortem. All employees are informed of our policies.
A Secure Platform
CIS AWS Foundations Benchmark
A Team with Security at Heart
ISO 27001 Information Security Certification
The audit evaluated Base information security management system from product, infrastructure and organizational aspects, and verified that Base has the necessary information security controls in place to ensure the confidentiality, integrity and availability of sensitive information assets.
ISO 27018 Personal data Protection (PII)
It also provides a set of additional controls and associated guidance intended to address public cloud PII protection requirements not addressed by the existing ISO 27002 control set. Alignment demonstrates to customers that Base has a system of controls in place that specifically addresses the privacy protection of their content. Base’s alignment (as verified by a third-party assessment) with this internationally recognized code of practice demonstrates Base’s commitment to the privacy and protection of customers’ content. By following the standards of ISO/IEC 27001 and the code of practice embodied in ISO/IEC 27018:2014, Base demonstrates that its privacy policies and procedures are robust and in line with its high codes of practice, namely: Base customers can know where their data is stored. Customer data won’t be used for marketing or advertising without explicit consent. Base customers know what’s happening with their PII. Base will comply only with legally binding requests for disclosure of customer data.
ISO 27017 Cloud Specific Controls
ISO 27017 provides guidance on the information security aspects of cloud computing, recommending the implementation of cloud-specific information security controls that supplement the guidance of the ISO 27002 and ISO 27001 standards.
Security Trust Assurance and Risk
Based on our assessment within the Cloud Controls Matrix, we are listed on the Security Trust Assurance and Risk (STAR) registry, which encompasses key principles of transparency, rigorous auditing, and cloud security best practices. You can see the Base listing here.