Security & Trust

Your data is safe with us

Security is at the heart of everything we do. Discover the measures we take to protect your data and ensure your trust.

Last updated: February 22, 2026

GDPR Compliant

Full compliance with European privacy legislation

EU Data Residency

All data is stored within the EU

ISO 27001 Partners

Our infrastructure partners are ISO 27001 certified

Section 1

Security Overview

Better Desk is built with security as a core principle. We understand that you trust us with sensitive business data and take this responsibility very seriously.

Our security principles

Defense in depth: multiple security layers
Least privilege: minimal access rights
Zero trust: always verify, never blindly trust
Privacy by design: built-in privacy protection
Section 2

Data Encryption

All your data is protected with strong encryption, both in transit and at rest.

TLS 1.3 Encryption

In transit

All communication between your device and our servers is encrypted with TLS 1.3, the latest and most secure encryption standard.

AES-256 Encryption

At rest

All stored files and documents are encrypted with AES-256 encryption, the same standard used by banks.

Database Encryption

At rest

The database is fully encrypted, including backups. Even with physical access, data is unreadable.

End-to-End Signing

Integrity

Digital signatures are cryptographically secured and cannot be forged or altered.

Section 3

Infrastructure

Hetzner Cloud - Germany

Our infrastructure runs entirely on Hetzner servers in Germany. This guarantees that your data stays within the EU and complies with the strictest German privacy legislation.

ISO 27001 certified datacenter
Physical security with biometric access
Redundant power supply and network
DDoS protection and WAF firewall
Daily encrypted backups
Geographically separated backup location
Section 4

Authentication

Secure and user-friendly authentication via your existing Microsoft account.

Microsoft Entra ID (OAuth 2.0)

Secure single sign-on via your existing Microsoft account. We never receive your password.

Multi-Factor Authentication

Support for MFA via your organization's Microsoft 365 configuration.

Session Security

Automatic session expiration, secure tokens, and ability to terminate sessions remotely.

Section 5

Access Control

Strict access controls ensure that only authorized users have access to relevant data.

Role-Based Access Control

Users only have access to data relevant to their role within the organization.

Organization Isolation

Strict separation between organizations. Data is never accessible to other organizations.

Audit Logging

All data access is logged for compliance and security monitoring.

Administrator Privileges

Only authorized administrators can change organization settings or manage users.

Section 6

Incident Response

We have a comprehensive incident response plan to respond quickly and effectively to security incidents.

1

Detection

Automatic monitoring detects anomalies and potential security incidents.

2

Classification

Incidents are classified by severity and priority for rapid response.

3

Containment

Immediate measures to limit impact and prevent further damage.

4

Investigation

Thorough analysis of the cause and scope of the incident.

5

Communication

Transparent communication to affected parties within 72 hours (per GDPR).

6

Recovery & Evaluation

Full recovery and evaluation to prevent recurrence.

Section 7

Audits & Penetration Tests

Regular security assessments ensure our security stays up-to-date and meets the highest standards.

Code Reviews

Every code change is reviewed for security risks before going to production.

Vulnerability Scanning

Automatic scans detect known vulnerabilities in dependencies and configurations.

Penetration Tests

Periodic penetration tests by external security experts to identify vulnerabilities.

Compliance Audits

Regular audits to ensure we comply with GDPR and other regulations.

Section 8

Employee Security

Our employees are trained in security awareness and follow strict protocols to protect your data.

Regular security training for all employees
Strict access restrictions based on 'need-to-know'
Mandatory strong passwords and MFA
Clean desk policy and encrypted laptops
Background checks on hiring
Signed confidentiality agreements

Questions about our security?

We're ready to answer all your security questions. Feel free to contact us.

security@better-desk.app