Access control

Last updated: 2026-04-11 • ← Security program

Backbuild enforces access control at every layer of the platform. Authorization is evaluated on every request, multi-tenant isolation is enforced in the database, and privileged access is limited, logged, and reviewed on a recurring schedule.

Role-based access control

Multi-tenant isolation

Least privilege

Access reviews

User and administrative access is reviewed quarterly. The review covers human accounts (including contractors and vendors), service accounts, and any elevated or break-glass access. Outcomes are recorded in an internal runbook and fed back into the access provisioning workflow. Material findings are tracked through remediation.

Separation of duties

Privileged access monitoring

All privileged actions — administrative logins, role changes, policy updates, break-glass usage — are logged with user attribution, correlation identifiers, and timestamps. Logs are forwarded to the central audit store and monitored for anomalous patterns.

Contact

Access control questions or role configuration help: