Build protects your knowledge and your data with enterprise-grade security and compliance.
Production permissions are restricted to the minimum necessary, with quarterly access reviews and multi-factor authentication required for all production platform access.
Security policies and procedures are documented and reviewed annually, with comprehensive controls monitored across 25 categories.
Centralized log collection and intrusion detection monitor production systems, with alerts routed to security personnel to investigate and respond to events.
Sensitive databases are encrypted at rest, and data in transit is encrypted using industry-standard protocols to prevent interception over public networks.
Annual penetration testing identifies vulnerabilities, and regular vulnerability scans track high-risk findings for remediation per documented timelines.
Sensitive data is classified and restricted to authorized personnel. Retention policies define holding periods, and customer data is anonymized or deleted after contract termination.
Security is embedded across Build's product, infrastructure, and operations. Production access is governed by least-privilege controls and multi-factor authentication, data is encrypted in transit and at rest, and centralized log collection with intrusion detection monitors systems continuously.
Our security program is audited annually against SOC 2 Type II, with penetration testing and vulnerability scans driving ongoing remediation. Full details are available in our Trust Center.