Buzzy is devoted to protecting application code and data stored in the Buzzy platform and is accessible only by authorized individuals. Security best practices are always used and evolve to meet the needs of our customers.

Buzzy utilizes operating system, networking, database and Docker isolation mechanisms. Buzzy provides various features, such as authentication, access control, encryption, to secure your data.

Buzzy uses a role-based security model to control access to the platform. A user is an account assigned to an individual person which the person uses to authenticate to Buzzy. A role is a collection of permissions that grant or deny access to different parts of the system. Roles reflect the kinds of interactions that a user has with the system.

Table of contents

Last updated