ISO/IEC 27001 certification

Airtable utilizes industry-leading Amazon Web Services (AWS) hosting infrastructure. Backups are geo-redundantly replicated across multiple availability zones for data durability. Airtable maintains business continuity and disaster recovery plans. Airtable provides powerful ways to go back in time with record-level revision history and base snapshots. View a living history of all the changes that have been made to a single record and jump back in time and restore your base to a previous state. We provide a limited history for free plans, with extended histories for our premium plans. Airtable integration options This guide outlines Airtable features that allow you to connect and exchange data with external services or programmatically manipulate data within Airtable.

Aws Airtable

ISO/IEC 27001:2013 is a specification for an information security management system (ISMS), which is a framework for an organization's information risk management processes.

SOC 2 compliance

Airtable has undergone a Service Organization Controls audit (SOC 2 type 2). Please contact your account manager or [email protected] to request Airtable's most recent report.

Privacy compliance and data processing addendum

We take our privacy obligations — and the protection of your information — seriously, and we comply with all applicable privacy laws and regulations.

You can learn more about Airtable’s privacy practices in our Privacy Policy, and learn more about Airtable’s commitment to compliance with the General Data Protection Regulation (“GDPR”) here.


You can sign our Data Processing Addendum by entering your information at this link. You will be able to download and review the DPA before signing it. In addition, you can find a current list of Airtable’s data subprocessors at the end of the DPA and at this link.

At any time, you may export data from Airtable to CSV files or by using the Airtable API.

Network and system security

When you visit the Airtable website or use one of the Airtable apps, the transmission of information between your device and our servers is protected using 256-bit TLS encryption. At rest, Airtable encrypts data using AES-256.

Airtable servers are located in the US, in data centers that are SOC 1, SOC 2 and ISO 27001 certified. Airtable’s data centers have round-the-clock security, automatic fire detection and suppression, fully redundant power systems, and strict controls for physical access.

We regularly install security updates and patches to keep servers up to date. Servers are segmented based on role and protected using restrictive firewalls.

Service reliability and durability

Airtable utilizes industry-leading Amazon Web Services (AWS) hosting infrastructure. Backups are geo-redundantly replicated across multiple availability zones for data durability. Airtable maintains business continuity and disaster recovery plans. Components of the disaster recovery plan include multiple site operations playbooks, which are regularly reviewed and rehearsed. Airtable implements extensive service monitoring, and our operations team is on call 24x7x365.

Product security

Within the Airtable product, collaborator permissions can be managed at the workspace level or the base level. These permissions allow you to control who you share a workspace or base with and whether they can modify the workspaces or bases that you’ve shared with them. Airtable also enables you to restrict access to a base or view share link with a password or with an email domain.

Airtable also provides record-level revision history that shows a visual activity feed of the changes made to each record.

Airtable recommends enabling two-factor authentication (2FA) for your account if you’re using password-based authentication. For more details and instructions to configure 2FA, please see our docs.

Airtable supports SAML-based Single Sign On (SSO) and additional administration features for teams on the Enterprise Plan. Additional information is available here.

Organizational and information security

Aws Air Tablet

Airtable vets employees and performs background checks in accordance with local laws. Employees complete annual security training which covers topics such as data privacy, information security, and password security.

Employee workstations are configured with full-disk encryption, strong passwords, and automatic locking. Employees are prohibited from installing unauthorized software or using portable media. Djay pro 2 spotify not working.

Airtable maintains separate production and testing environments.

Airtable operates a “bug bounty” program to work with the security community in identifying potential issues.

Application security

Airtable runs automated application-level security scans on a daily basis, package dependency security advisory scans on a weekly basis, and endpoint scans on a monthly basis. In addition to internal scans, Airtable commissions external penetration tests on a regular basis.

Aws Air Tables

As part of the software development process, code and configuration changes are thoroughly reviewed. Before being deployed, these changes are tested during the quality assurance process to help ensure a consistent experience across all devices, platforms, and browsers that are supported by Airtable.

Airtable Aws Lambda

How to report an issue

Aws Airtable

If you believe you've discovered a security-related issue, please report the issue on our HackerOne bug bounty program or contact us at [email protected]