SafeBase Logo

Overview
Overview

SafeBase helps B2B SaaS companies close enterprise deals faster by streamlining the security assessment process. We take security seriously and have a dedicated internal security team. Our security team's controls and policies are detailed on this Security Status Page.

Risk Profile
Risk Profile

Data Access LevelInternal
Impact LevelModerate
Recovery Time Objective< 24 Hours
View 3 More Items

Product Security
Product Security

Role-Based Access Control
Audit Logging
Integrations
View 3 More Items

Certifications & Compliance
Certifications & Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
25 Documents
Network Diagram
Pentest Report
3 Documents
SOC 2 Report
Vulnerability Assessment Report
SOC 2
CAIQ Full
CAIQ Lite
VSA Core
VSA Full
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
BYOD Policy
Data Classification Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Internal and External Communication Policy
Password Policy
Physical Security
Risk Management Policy

Reports
Reports

Network Diagram
Pentest Report
SOC 2 Report
View 2 More Items

Completed Forms
Completed Forms

CAIQ Full
CAIQ Lite
VSA Core
View 1 More Item

Data Security
Data Security

Access Monitoring
Backups Enabled
Data Erasure
View 3 More Items

App Security
App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
View 3 More Items

Access Control
Access Control

Data Access
Logging
Password Security

Infrastructure
Infrastructure

Anti-DDoS
Google Cloud Platform
Infrastructure Security
View 1 More Item

Security Grades
Security Grades

Qualys SSL Labs
  • Main API Endpoint
    A+
  • Landing Page
    A

Endpoint Security
Endpoint Security

Endpoint Detection & Response
Mobile Device Management

Network Security
Network Security

IDS/IPS
Spoofing Protection

Corporate Security
Corporate Security

Employee Training
Incident Response
Internal Assessments
View 1 More Item

Policies
Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View 11 More Items

If you think you may have discovered a vulnerability, please send us a note.