Security & Compliance Glossary

Clear, practical definitions of key security and compliance terms for B2B SaaS teams. Each entry explains what the term means, why it matters, and how Trailbase helps.

Security

Audit Log

An audit log is a chronological record of system activities and user actions within a software application. Audit logs capture who did what, when, and to which ...

Hash Chain

A hash chain is a cryptographic data structure where each entry contains the hash of the previous entry, creating a tamper-evident sequence. If any entry is mod...

Encryption at Rest

Encryption at rest is the encryption of data while it is stored on disk, as opposed to encryption in transit (during transmission). It protects data from unauth...

Compliance Frameworks

SOC 2

SOC 2 (Service Organization Control 2) is an auditing framework developed by the AICPA that evaluates how a service organization manages customer data. It cover...

HIPAA

HIPAA (Health Insurance Portability and Accountability Act) is a US federal law that sets standards for protecting sensitive patient health information. For Saa...

GDPR

The General Data Protection Regulation (GDPR) is a European Union regulation governing the collection, processing, and storage of personal data. It grants indiv...

ISO 27001

ISO 27001 is an international standard for information security management systems (ISMS). It provides a systematic framework for managing sensitive company and...

Compliance Automation

Compliance automation uses software tools to continuously monitor, document, and enforce regulatory requirements instead of manual processes. It reduces the tim...

Access Control

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a security model that restricts system access based on the roles assigned to individual users within an organization. Users ...

Data Management

Data Residency

Data residency refers to the physical or geographic location where data is stored and processed. Many regulations (GDPR, data sovereignty laws) and enterprise c...

Ready to Implement?

Deploy audit logs, RBAC, and compliance automation in five minutes.

Get Early Access