The permissions are a critical part of security as you’d be only allowing trusted users access to your data. The collaborator permissions allow users to give access to certain users at the workspace or base level. The code and configuration changes are rigorously evaluated during the quality assurance process to ensure the smooth running of the application across all devices and platforms. Along with this, they ensure package dependency scans are done weekly and endpoint scans every month. Web app securityĪirtable has designed automated solutions to run application-level security scans periodically. The recent audit report can be easily furnished by contacting the Airtable team. Airtable underwent a Service Organization Controls audit (SOC 2 type 2) in order to receive its certification. The standard states how organizations should manage customer data, and it’s based on four Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy. SOC 2 compliance is a voluntary standard for service organizations, developed by the American Institute of CPAs (AICPA). When you use Airtable, you can rest assured that they have an ISMS in place that meets the requirements of ISO 27001:2013, meaning they perform risk assessments, implement controls, monitor the systems for compliance, and track changes to their policies. To protect your data from malicious hackers, Airtable has managed to implement and undergo some of the highest security and privacy standards. Regular system updates and patches (to maintain optimal performance).Īirtable security certifications and compliance Security and privacy standards.
0 Comments
Leave a Reply. |