<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Nathan Loding</title>
    <description>The latest articles on DEV Community by Nathan Loding (@nloding).</description>
    <link>https://dev.to/nloding</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F831175%2Fbf8df1c2-3117-4e07-b3c5-e32a3e3e304d.jpeg</url>
      <title>DEV Community: Nathan Loding</title>
      <link>https://dev.to/nloding</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/nloding"/>
    <language>en</language>
    <item>
      <title>Simpler way to secure data with Ruby and Basis Theory</title>
      <dc:creator>Nathan Loding</dc:creator>
      <pubDate>Wed, 18 May 2022 19:03:24 +0000</pubDate>
      <link>https://dev.to/basis-theory/simpler-way-to-secure-data-with-ruby-and-basis-theory-2146</link>
      <guid>https://dev.to/basis-theory/simpler-way-to-secure-data-with-ruby-and-basis-theory-2146</guid>
      <description>&lt;p&gt;&lt;em&gt;This guest post walks through a community-built Ruby Gem that helps developers quickly secure and use their data with Basis Theory and the new Rails 7.0 upgrade.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Ruby on Rails built its reputation on its ease of use and simplicity. As an engineer, I look for ways to remove the complexity of encrypting and securing data within my projects. Recently, I’ve been using &lt;a href="http://developers.basistheory.com/"&gt;Basis Theory’s tokenization API&lt;/a&gt; to protect business-critical data without worrying if I’m missing some critical part of the encryption process.&lt;/p&gt;

&lt;p&gt;I use Basis Theory’s tokenization platform and compliant environment to quickly and compliantly secure and use sensitive data for my projects. By using its tokens, serverless functions, and SDKs, I have full control over their sensitive data without incurring the costs, delays, and risks of securing and maintaining it myself. (You can also get to production without a credit card).&lt;/p&gt;

&lt;p&gt;Want to jump straight into the gem? Check out the &lt;a href="https://github.com/scottolsen/basis_theory"&gt;Github repository&lt;/a&gt; or &lt;a href="https://rubygems.org/gems/basis_theory"&gt;RubyGem&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Basis Theory and the basis_theory gem?
&lt;/h2&gt;

&lt;p&gt;This gem eliminates the need to worry about building additional Key Management Services (KMS) infrastructure while securing your data in Basis Theory’s PCI Level 1 compliant vault. &lt;/p&gt;

&lt;h2&gt;
  
  
  Why is the basis_theory gem important?
&lt;/h2&gt;

&lt;p&gt;While native encryption helps everyday developers quickly secure their data within an application, a scaled implementation using public libraries will still require detailed knowledge of &lt;a href="https://edgeguides.rubyonrails.org/active_record_encryption.html#key-management"&gt;Key Management&lt;/a&gt; and infrastructure needs.&lt;/p&gt;

&lt;h2&gt;
  
  
  How does the basis_theory gem work?
&lt;/h2&gt;

&lt;p&gt;The example below shows how to start with Basis Theory.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Install the package.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gem &lt;span class="nb"&gt;install &lt;/span&gt;basis_theory
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Create a new Basis Theory client with your Basis Theory API Key
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ruby"&gt;&lt;code&gt; &lt;span class="n"&gt;client&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="no"&gt;BasisTheory&lt;/span&gt;&lt;span class="o"&gt;::&lt;/span&gt;&lt;span class="no"&gt;Client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;new&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="ss"&gt;api_key: &lt;/span&gt;&lt;span class="s1"&gt;'YOUR_API_KEY'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Protect the data by creating a new token
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ruby"&gt;&lt;code&gt; &lt;span class="n"&gt;token&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;tokens&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;create&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="ss"&gt;data: &lt;/span&gt;&lt;span class="s1"&gt;'some_data_to_encrypt'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="n"&gt;token&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;id&lt;/span&gt; &lt;span class="c1"&gt;# =&amp;gt; '467ca27f-bb2a-4d09-9e0e-8f8a69e7bbac'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;‍‍4. That’s it! You’re now ready to store the ids in your database and can retrieve the raw values whenever you need to use them by using the gem’s find method&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt; token = client.tokens.create(data: 'some_data_to_encrypt') token.id # =&amp;gt; '467ca27f-bb2a-4d09-9e0e-8f8a69e7bbac'
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What data am I encrypting with the the basis_theory gem?
&lt;/h2&gt;

&lt;p&gt;The gem takes all of the hard work of setting up Ruby encryption libraries. This allows you to generate and protect your encryption keys, or build out your own KMS. I’m using it for Government IDs, Social Security Numbers, and Tax ID Numbers. Additionally, I could also see the need to encrypt confidential or proprietary information, like CAD designs, pricing, and inventory, that, if leaked, could have a profound impact on my clients.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is next for the basis_theory gem?
&lt;/h2&gt;

&lt;p&gt;There are quite a few features within Basis Theory that would be great to expose through the gem, like:&lt;/p&gt;

&lt;h2&gt;
  
  
  Add Basis Theory’s Search on tokens
&lt;/h2&gt;

&lt;p&gt;The Basis Theory API allows for searching the underlying encrypted data without the need to decrypt that data and/or have the data touch your systems. This is a massive improvement over the built-in native encryption offered by Rails (as you’d need to turn on deterministic encryption which is less secure). An example of the feature might be:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ruby"&gt;&lt;code&gt;&lt;span class="n"&gt;client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;tokens&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;create&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="ss"&gt;type: &lt;/span&gt;&lt;span class="s1"&gt;'social_security_number'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="ss"&gt;data: &lt;/span&gt;&lt;span class="s1"&gt;'444-44-5555'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;tokens&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;create&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="ss"&gt;type: &lt;/span&gt;&lt;span class="s1"&gt;'social_security_number'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="ss"&gt;data: &lt;/span&gt;&lt;span class="s1"&gt;'444-44-5522'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="n"&gt;client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;tokens&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;search&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="ss"&gt;data: &lt;/span&gt;&lt;span class="s1"&gt;'5555'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="sr"&gt;/ returns only the first token
client.tokens.search(data: '444445522') /&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt; &lt;span class="n"&gt;returns&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="n"&gt;second&lt;/span&gt; &lt;span class="n"&gt;token&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Basis Theory EncryptableRecord for Encryption
&lt;/h2&gt;

&lt;p&gt;Native Rails encryption has come a long way and provides a default EncryptableRecord which is the foundation for encrypting data within ActiveRecord. The idea would be to enable a new EncryptableRecord to be exposed. This would allow Basis Theory to be used as the underlying datastore and store a tokenId in the database:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ruby"&gt;&lt;code&gt;&lt;span class="sr"&gt;//&lt;/span&gt; &lt;span class="no"&gt;Ability&lt;/span&gt; &lt;span class="n"&gt;to&lt;/span&gt; &lt;span class="n"&gt;override&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="no"&gt;Provider&lt;/span&gt;
&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="nc"&gt;Article&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="no"&gt;ApplicationRecord&lt;/span&gt;
  &lt;span class="n"&gt;encrypts&lt;/span&gt; &lt;span class="ss"&gt;:title&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="ss"&gt;:provider&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="no"&gt;BasisTheory&lt;/span&gt;
&lt;span class="k"&gt;end&lt;/span&gt;

&lt;span class="sr"&gt;//&lt;/span&gt;&lt;span class="no"&gt;Ability&lt;/span&gt; &lt;span class="n"&gt;to&lt;/span&gt; &lt;span class="n"&gt;easily&lt;/span&gt; &lt;span class="n"&gt;configure&lt;/span&gt; &lt;span class="n"&gt;tokenization&lt;/span&gt; &lt;span class="n"&gt;on&lt;/span&gt; &lt;span class="no"&gt;ActiveRecord&lt;/span&gt; &lt;span class="n"&gt;properties&lt;/span&gt;
&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="nc"&gt;Article&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="no"&gt;ApplicationRecord&lt;/span&gt;
  &lt;span class="n"&gt;tokenizes&lt;/span&gt; &lt;span class="ss"&gt;:title&lt;/span&gt;
&lt;span class="k"&gt;end&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  What would you like to see?
&lt;/h2&gt;

&lt;p&gt;Feel free to &lt;a href="https://github.com/scottolsen/basis_theory/issues"&gt;submit a GitHub issue&lt;/a&gt; for any ideas you may have for the next steps on the gem.&lt;/p&gt;

&lt;h2&gt;
  
  
  About the author
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;‍&lt;a href="https://www.linkedin.com/in/scottcolsen/"&gt;Scott Olsen&lt;/a&gt; is a Software Engineer at &lt;a href="https://www.doximity.com/"&gt;Doximity&lt;/a&gt;, an online networking service for medical professionals. He has spent the majority of his career building and investing in the Rails community. You can find Scott on &lt;a href="https://twitter.com/scottcolsen"&gt;Twitter&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ruby</category>
      <category>encryption</category>
      <category>security</category>
      <category>tokenization</category>
    </item>
    <item>
      <title>Why is Data Security a Developer Service Problem?</title>
      <dc:creator>Nathan Loding</dc:creator>
      <pubDate>Thu, 12 May 2022 20:38:09 +0000</pubDate>
      <link>https://dev.to/basis-theory/why-is-data-security-a-developer-service-problem-6gh</link>
      <guid>https://dev.to/basis-theory/why-is-data-security-a-developer-service-problem-6gh</guid>
      <description>&lt;p&gt;In 2011, Gabe Newell described software piracy “as a service problem.” His comment implied that until there was a better experience from a legitimate service, consumers would continue to engage in the illegitimate offerings—no matter how bad it was for the overall economy.&lt;/p&gt;

&lt;p&gt;We interviewed over a hundred developers on data security and reflected on our own experiences at Twilio, Klarna, and Dwolla in developing the &lt;a href="https://basistheory.com"&gt;Basis Theory&lt;/a&gt; platform. Like Newell, we found that the service and, more importantly, the experience provided by that service greatly influenced how well (or poorly) developers and organizations protected and used their most valuable data. &lt;/p&gt;

&lt;p&gt;We had a hunch that if we could abstract sensitive data and their compliance, security, and operational requirements, we could help developers fast track compliance. Last August, we launched our beta. Since then, the market's response has been incredible. &lt;/p&gt;

&lt;p&gt;We’re not only excited to announce the general availability of Basis Theory, but to share with you the insights and decisions that have guided us here today and are helping us think about tomorrow.&lt;/p&gt;

&lt;h1&gt;
  
  
  So, why is data security a developer service problem?
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JwaWNsiK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x1128rxtxxffjiy2g1xd.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JwaWNsiK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/x1128rxtxxffjiy2g1xd.jpeg" alt="Image description" width="880" height="502"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When talking to developers three trends tend to emerge:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Securing sensitive data is hard&lt;/li&gt;
&lt;li&gt;Using sensitive data is hard&lt;/li&gt;
&lt;li&gt;Managing sensitive data is hard&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Why is securing sensitive data hard?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Observation #1: Compliance competes for resources, priorities, and timelines.&lt;/strong&gt; Developers are responsible for ensuring systems and data usage meet existing policies and controls. Unfortunately, doing this correctly often comes with a cost that’s not always supported by the appropriate personnel, focus, or deadlines.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Observation #2: Security isn’t static.&lt;/strong&gt; Encryption libraries offer developers a great, lightweight, near-term solution. However, scaling this approach to encryption while still meeting the emerging security threats often becomes a continuous and resource-intensive challenge for organizations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Observation #3: Lots of early decisions with little certainty.&lt;/strong&gt; Developers face many data security decisions even before the first line of code is written. These questions are highly contextual and, with no straightforward answers, can become the source of anxiety and analysis paralysis. To compound matters, wrong answers can create security risks, maintenance costs, and limitations on future solutions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why is using sensitive data hard?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Observation #1: Compliance isn’t black and white.&lt;/strong&gt; Many believe compliance is binary, but policies and controls rarely account for the contextual factors developers face when writing code. Prescriptive requirements suddenly look like well-meaning suggestions, forcing developers to piece together who, what, when, where, why, and how a particular data type can be used. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Observation #2: Securing data locks up its value.&lt;/strong&gt; Storing data inside encrypted ciphertext or behind firewalls with access policies protects but also marginalizes its value. This duality between security and utility creates constant challenges for developers and organizations alike. &lt;/p&gt;

&lt;h2&gt;
  
  
  Why is managing sensitive data hard?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Observation #1: Data governance is ambiguous and decentralized.&lt;/strong&gt; Decentralized and inconsistent implementations of authorization and access controls result in bespoke solutions for the same problem across multiple systems. In addition, understanding and implementing new access policies in these environments generate complexity and cognitive overhead.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Observation #2: Manual security management can be terrifying.&lt;/strong&gt; Manually managing systems and controls exposes organizations to human error and limits the number of engineers capable of contributing and reviewing changes. This is especially risky for those systems and controls that handle sensitive data—where missteps can result in irreparable damages to an organization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Observation #3: Auditing of data access is inconsistent when it exists.&lt;/strong&gt; Auditing individual access across systems requires engineers to spend valuable time scouring logs and policies. In addition, most logging in place is typically capturing system activity, transactions, and errors—not necessarily user or system behavior. This proves challenging for teams trying to satisfy compliance requirements.&lt;/p&gt;

&lt;h1&gt;
  
  
  Why [not] Basis Theory?
&lt;/h1&gt;

&lt;p&gt;Our interviews and experiences established Basis Theory’s problem-set, but they didn’t set the bar for the user experience we needed to create for developers. To guide future decisions, we began asking a simple question—one that was both aspirational and practical. We came up with:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;“Why wouldn’t you secure all data?,”&lt;/em&gt;&lt;/strong&gt; which we later simplified to, &lt;strong&gt;&lt;em&gt;“Why not Basis Theory?”&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Over the last year, we focused on simplifying and abstracting the challenges we captured from developers. &lt;/p&gt;

&lt;h2&gt;
  
  
  Making it simpler to secure your sensitive data
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Compliant environments.&lt;/strong&gt; Complexity is accommodating the nuances of every single compliance and security requirement. By extending our PCI Level 1, SOC 2, and HIPAA compliant environment to developers, we abstract the compliance burdens faced when trying to store nearly every sensitive data type. &lt;a href="https://developers.basistheory.com/concepts/what-are-tenants/"&gt;Tenants&lt;/a&gt;, which allow developers to segment their data, also inherit these benefits and can be freely spun up in seconds.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Providing static tokens.&lt;/strong&gt; Original values are encrypted and stored within a developer’s Basis Theory environment. In exchange, we pass back &lt;a href="https://docs.basistheory.com/#tokens"&gt;Tokens&lt;/a&gt;, or undecipherable aliases that reference the original value, for developers to use within their code. This allows sensitive data to be stored in an encrypted state for as long as possible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption management.&lt;/strong&gt; Abstracting the complexities of encrypting, managing, and rotating keys were high on our list, but not just for the developer experience: When coupled with tokens, the approach allows Basis Theory to update encryption algorithms over time without disrupting developers’ systems. &lt;/p&gt;

&lt;h2&gt;
  
  
  Making it simpler to use your sensitive data
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Tokens provide utility &lt;em&gt;and&lt;/em&gt; security.&lt;/strong&gt; Tokens protect data by keeping the original raw values encrypted at rest. In addition, a Token’s attributes—like user-defined metadata, &lt;a href="https://developers.basistheory.com/concepts/what-are-fingerprints/"&gt;fingerprinting&lt;/a&gt;, and custom masking—make them usable &lt;em&gt;and&lt;/em&gt; &lt;a href="https://docs.basistheory.com/#tokens-search-tokens"&gt;searchable&lt;/a&gt;, allowing developers to reveal all or partial raw values, recognize token contents, create associations, and query their parameters in milliseconds.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools to interact with your data.&lt;/strong&gt; Developers already know how to write code to solve problems. &lt;a href="https://developers.basistheory.com/concepts/what-are-reactors/"&gt;Reactors&lt;/a&gt; provide a secure, compliant environment to execute code against an organization’s sensitive data—without exposing its systems to the underlying raw value. Similarly, our &lt;a href="https://developers.basistheory.com/concepts/what-is-the-proxy/"&gt;Proxy&lt;/a&gt; solution allows you to use your existing HTTP client to &lt;a href="https://docs.basistheory.com/detokenization/#introduction"&gt;detokenize&lt;/a&gt; data in-flight and forward it to the desired destination.&lt;/p&gt;

&lt;h2&gt;
  
  
  Making it simpler to manage your sensitive data
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Granular access controls and permissioning.&lt;/strong&gt; Assigning &lt;a href="https://docs.basistheory.com/#tokens-token-classifications"&gt;classifications&lt;/a&gt; and &lt;a href="https://docs.basistheory.com/#tokens-token-impact-levels"&gt;NIST impact levels&lt;/a&gt; to your data allows developers to tailor access, visibility, and functionality to the underlying data. Tenants provide an additional control layer, allowing developers to segment data by the environment, customer, use case, or business unit. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enable automation.&lt;/strong&gt; 100% of the engineers we interviewed want to automate their jobs' mundane and error-prone responsibilities, so we ensured that engineers could manage their entire experience through our API. As a bonus, we also built a &lt;a href="https://registry.terraform.io/providers/Basis-Theory/basistheory/latest"&gt;Terraform Provider&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Centralized operations.&lt;/strong&gt; This one is pretty straightforward. Engineering, security, and support teams can access logs, search their data, debug, and manage user access, all via the Web Portal or the API.&lt;/p&gt;

&lt;h1&gt;
  
  
  Last thing
&lt;/h1&gt;

&lt;p&gt;We have a long journey to helping all developers secure their data, but you can get started today. Check out our &lt;a href="http://developers.basistheory.com/"&gt;dev docs&lt;/a&gt;, visit our &lt;a href="https://github.com/Basis-Theory"&gt;GitHub&lt;/a&gt;, or take a few seconds to spin up your own PCI-compliant environment by &lt;a href="http://portal.basistheory.com/register"&gt;creating a free account&lt;/a&gt; (you can get to production without a card on file). &lt;/p&gt;

&lt;p&gt;Special thanks to our incredible team and group of investors, Bessemer Venture Partners, Kindred Ventures, Conversion Capital, Offline Ventures, Ludlow Ventures, BoxGroup, and Good Friends!&lt;/p&gt;

</description>
      <category>security</category>
      <category>datasecurity</category>
      <category>encryption</category>
    </item>
  </channel>
</rss>
