SECURITY

Security Initiatives

With Hexabase, robust security
comes from the start!

For any system at any time, such as when building a new system or replacing it.
We respond immediately to all your security needs.

View development service details

Through the following initiatives, we are strengthening our system and
organizational management structure so that our customers can use our services with peace of mind.

01

Safety of default values
(No user intervention required)

Highly secure settings are used as system default values.

  • Always encrypted communication: SSL /HTTPS and API access via third parties.
  • API security model protects applications with modern primitives, fine-grained role-based access control (RBAC).
  • Ensures fail-safe data redundancy: strong consistency of global or regional data without compromising latency and scale (to be supported in the future).
  • The Open Web Application Security Project (OWASP) proposes OWASP Top 10 Web Application Security Protections.

02

Compliance and privacy

We increase reliability through accurate system operation and organizational structure.

  • Infrastructure engineers adopt a control governance model.
  • Every cluster or resource has a different namespace and access control.
  • All organizations can use multi-factor authentication (MFA) and automate token expiration.
  • Deterrent against human leakage: Important operation history is saved, and administrative users can view the operation history of their own users, preventing leakage that cannot be covered by the system.

03

System monitoring

Accurate system monitoring, detection, and notification.

  • 24/7 monitoring and alerts.
  • Incident history and reports.
  • SSL/domain expiration monitoring.

04

Secure data access

Security is ensured by increasing storage redundancy. Additionally, the encryption makes it impossible for a malicious third party to decipher the data even if they try to view it.

  • Full backup twice a day.
  • Storage encryption
  • Connection source IP address restriction: You can restrict the IP address that connects to Hexabase (optional).
  • Restrictions can be set for each role associated with an account.

05

Data center security (AWS)

We use highly reliable and proven global cloud services.

  • Physical security
  • Global certification and compliance for cloud infrastructure.