Our core commitment is to the security and integrity of your data. It’s no surprise, therefore, that we chose Amazon Web Services, the world’s leading cloud service platform, to host our infrastructure.
By using AWS to power our platform, we absorb the highest global standards of AWS architecture, server operations, and compliance regulations to host your data. When you run your business on Tadabase, you can do so confidently knowing that your data is secured by AWS best practices and the industry’s most advanced cloud security controls. You can read more about AWS security practices here.
Tadabase data is hosted in AWS data centers that have been certified as ISO 27001, PCI/DSS Service Provider Level 1, and/or SOC II compliance.
AWS data centers are secured by global AWS Security Operation Centers and advanced physical security measures which you can read more about here.
Our network security architecture consists of multiple security zones. We monitor and protect our network, to make sure no unauthorized access is performed using:
We use Sqreen, a third party network security solution, to monitor and protect our infrastructure from automated scanners, bots, and targeted attacks. It blocks attacks and alerts in case of critical threats. It also brings additional features like IP blocking and firewalls that monitor and control incoming and outgoing network traffic.
Dedicated Security Team
Tadabase staff includes a dedicated rapid-response security team for 24/7 prevention monitoring and reactive response to security alerts and events.
Application Security Monitoring
Tadabase uses Sqreen, a third party security monitoring solution to monitor our applications and get visibility into our application security, identify attacks, and respond quickly to a data breach. Security events are logged and notifications are sent in case of critical attacks to allow for fast remediation. Sqreen uses technologies to monitor exceptions and detect anomalies in our applications. We collect and store logs to provide an audit trail of our applications activity.
Application Security Protection
Tadabase uses Sqreen to integrate security in our applications and protect our users from data breaches. It integrates protections against the most critical attack categories like SQL injections, cross-site scripting, and adds security headers to our application. It blocks attacks in real-time and warns us when attackers start stressing our applications. Sqreen uses a runtime protection system that identifies and blocks OWASP Top 10 and business logic attacks in real-time.
Availability and Continuity
System Status Monitoring Tadabase maintains a publicly available status webpage which lists current system status stats, security event history details, and scheduled upgrade and/or maintenance details.
System Updates Tadabase maintains a publicly available updates webpage which lists a chronological history of all recent updates including new product features, improvements, and big fixes.
AWS Auto-Scaling and Load Balancing Tadabase uses AWS architecture features such as auto-scaling and elastic load balancing to automate our scalability and ensure that apps are always optimized for speed, high availability, and redundancy.
Tadabase stores data on multiple databases to eliminate single points of failure and increase availability. Data is stored in multiple locations to distribute availability across multiple geographic locations and time zones.
Tadabase employs daily backups of active apps for further redundancy and stores backups across multiple locations separate from the database servers.
Backup and Restore
All active Tadabase apps are backed up on a daily basis, encrypted with AES-256 encryption keys, and stored across multiple locations that are separate from the database servers.
All daily backups can be restored instantly by our support staff. We are currently in process of enabling users to see backup logs from within the builder. Users are free to manually backup their data at any time by exporting their data to a CSV file.
Disaster Recovery Tadabase enforces strict Disaster Recovery policies including daily encrypted backups, daily testing procedures, and strategic disaster recovery planning and training to ensure that data is available and restorable in case of disaster.
Data Export Easily create exportable templates or automate a data backup to export all your data easily from the platform.
Encryption in Transit All data sent to or from our infrastructure is encrypted in transit via industry best-practices using Transport Layer Security (TLS).
Encryption at Rest All our user data (including passwords) is encrypted using battled-proofed encryption algorithms in the database.
Government-Grade Encryption We use SHA-256 and AES-256 encryption, the strongest encryptions available used by governments, banks, and federal-level agencies around the world.
Product Security Features
IP Whitelisting With this feature you can enable IP address whitelisting within your app settings to ensure that your apps are only accessible by networks you’ve authorized.
Granular Page Controls
Assign roles for each of your users and define the data access permissions each role has. Restrict access to pages and parts of pages of your app to specific users who you deem relevant and authorized to view those pages or sections.
We recommend following the least-privilege approach with which you enable necessary pages vs blocking restricted pages. To learn more about maximizing user roles and permissions please contact email@example.com.
Record-level Security Create connections between users and records to ensure that logged-in users can only access records that are connected to them.
Password Protection Define custom password policies for each user and for each application, ensuring that users meet the password requirements you determine to be appropriate for specific apps and users.
Password Encryption All user passwords are encrypted and hashed.
Data Encryption All data is encrypted and secured with SSL.
Page time-out settings Tadabase customers can create custom time-out settings to ensure that devices left unattended for a specified amount of time to require re-logging in for continued access.
Login Logs Track all successful and failed logins to your application.
Block Failed Login Attempts Enable custom setetings to block an ip or user after x number of logins within x minutes.
2 Factor Authentication Require 2 Factor Authentication for your users to login into your app.
Singe Sign On (SSO) Use Single Sign On to require your users to login using a specified vendor such as Google
Whitelisted Email Domains Add whitelisting to only allow signing up from white-lsited domains.
Email Logs Track and monitor all emails sent from your app.
Builder Logs Track and monitor all changes made to your app from within the builder.
Record Chage Logs View all changes made in your app with additional meta data such as location, IP address and other browser and user details.
Delete Logs See and track all deleted records from within your app.
API Keys Secure your app with advanced permissions for your API keys such as enabling or disabling access to delete, edit, or get records. You can also enable or disable any API keys as needed.
Data Ownership Any data you store on Tadabase is owned by you and Tadabase claims no ownership on your data.
If you need support assistance from the Tadabase support team you can enable access for the Tadabase support team to access your account to troubleshoot any issues with your applications or account. By default, this support access is disabled and can only be enabled by an account admin in the security settings of your app.
Any support access to your account by the Tadabase support team is logged and time-stamped.
Any support access to your account by the Tadabase support team is done via a secure virtual private network that is continuously monitored by our dedicated security team for security alerts or events.
As part of our SOC 2 readiness for compliance, we have implemented best practices for employee onboarding and offboarding according to SOC standards and we conduct background checks for all our employees
Upon employment at Tadabase, all employees sign non-disclosure and confidentiality agreements to ensure that employees are legally bound to uphold our privacy policies and procedures.
Tadabase engineers conduct development and testing on a development platform completely separate from any live data. Bugs, errors, development kinks, etc. are fully tested in our separate “development sandbox” via comprehensive testing procedures to ensure that live data is not affected by bugs, errors, security vulnerabilities, or imperfect development.
Tadabase uses Sqreen to remediate vulnerabilities that were triggered by security tests, audits, or bug bounty programs. We are also warned when application components with known vulnerabilities are used in production (dependencies).
AWS Compliance Amazon is continuously audited by 3rd party compliance controls and holds compliance certifications from the strictest compliance programs including SOC 3 and ISO 27001. Learn more about AWS compliance here.
SOC 2 Type II Tadabase is currently undergoing SOC 2 Type II readiness. Certification of SOC 2 compliance will certify our best practices for security, availability, and confidentiality by an independent 3rd party auditing program and the leading standard for cloud security control. Please contact us at Security@tadabase.io for more information on our SOC 2 readiness and future compliance.
HIPAA Coming soon Tadabase will offer HIPAA compliant editions of our platform which will include field level encryption, password policies, and BAA agreements. Please contact us for more details at Security@tadabase.io.
Tadabase is currently undergoing GDPR readiness for GDPR compliance. The purpose of GDPR is to protect the private information of EU citizens and give them more control over their personal data. Please contact us at Security@tadabase.io for more information on our GDPR readiness and future compliance.
Tadabase has an available Data Processing Addendum for paid plans that can extend the terms of service to reflect the processing of personal data. Please contact Security@tadabase.io for more details on getting the DPA.
Penetration Testing Tadabase performs annual PenTesting on all production environments being utilized for storing and processing your data.
Tadabase respects intellectual property rights and publishes its Digital Millennium Copyright Act (DMCA) Copyright Policy.
Get started for free
Build the custom database your business deserves.