This topic refers to functionality that is only available to accounts on the Quick Base Platform or Quick Base Unlimited plans. If you do not see the functionality described here, either your account or realm has not been configured to show it, or your account is not on one of those plans.
Once you have secured the data within the enterprise, you must take steps to protect it from the core to the edge of the enterprise. You can deploy Quick Base as part of an end-to-end encryption solution across databases, applications, networks, and endpoint devices.
To protect data, you can:
As a realm admin, you can configure IP whitelists to create lists of trusted IP addresses or IP ranges from which your users can access apps in a realm.
Best practice: IP whitelists should be part of your overall global security.
From the Policies page, scroll to the bottom to manage and configure an IP whitelist.
Data classification is an important element of achieving data privacy. When performing this task, you should:
Determine data confidentiality levels
Identify and classify sensitive data
- Determine where sensitive data is located
Determine data access models
As an app admin (you have full administration rights to control the app and its ownership), you should configure security options that are in line with the risk level determined by your overall enterprise data protection strategy.
To configure the level of data sensitivity in an app:
On the My Apps page, select the app to configure.
Select Settings, and then select App properties.
Scroll to the bottom of the page to the Advanced settings section.
Select the security options based on the level of data sensitivity you want to enforce for the app.
Best Practice: For highly sensitive date, Quick Base recommends the following settings:
- Prohibit app copy
- Prohibit non-admin export of data
- Require app tokens
- Force IP controls
Depending on the size of your enterprise, you may deploy dozens or thousands of apps on Quick Base. You should consider and manage your apps as IT assets.
Best Practice: Quick Base recommends that you:
Maintain an inventory of all critical apps containing confidential information within your enterprise.
Ensure that these critical apps are designed for security and reviewed by IT regularly for access and permissions.
Did this help you? Give us a rating:
© 1999-2019 QuickBase, Inc. All rights reserved. Legal Notices.