Skip to main content

Core Concepts

Platform Architecture

Bastion is built on a modular architecture that allows organizations to adopt only the security capabilities they need while maintaining a unified view of their security posture. Every subscription includes the full platform and a dedicated virtual CISO (vCISO) who works with your team over Slack.

Compliance
87%
Overall Progress
12
Controls Passing
3
Action Required
Framework Progress
SOC 2 Type II
92%
ISO 27001
78%
HIPAA
45%
GDPR
68%

Workspaces

A Workspace represents a single organization or customer environment in Bastion. Each workspace contains:

  • Employees and compliance groups
  • Integrations and connected services
  • Compliance frameworks and evidence
  • Security configurations and policies
  • Device inventory and MDM settings

Modules Overview

Bastion's functionality is organized into distinct modules:

Compliance

Purpose: Achieve and maintain compliance certifications

Components:

  • Frameworks - SOC 2, ISO 27001, HIPAA, and custom frameworks
  • Audits - Manage audit cycles with evidence bundles
  • Policies - Create, version, and distribute security policies
  • Vendors - Third-party vendor risk management
  • Risk Register - Track and treat organizational risks
  • Access Reviews - Periodic access control audits
Customer Trust

Purpose: Build and demonstrate trust with customers

Components:

  • Trust Center - Public-facing security information portal
  • Security Questionnaires - Automated questionnaire responses
  • Status Page - Public incident and status communication
Employees

Purpose: Manage employee security posture

Components:

  • People - Employee directory synced from identity providers
  • Groups - Organize employees for training and access management
  • Awareness Training - Security education programs
  • Phishing Campaigns - Simulated phishing exercises
  • Data Leak - Monitor for employee credential breaches
SaaS

Purpose: Manage cloud application security

Components:

  • Third-Party Apps - Inventory of SaaS applications
  • Shadow IT Detection - Discover unauthorized apps
  • Risk Assessment - Evaluate app security posture
Devices

Purpose: Endpoint management and security

Components:

  • Device List - Enrolled endpoint inventory
  • Policies - MDM configuration policies
  • Vulnerabilities - Device vulnerability scanning
  • MDM Query - OSQuery-based device interrogation
  • DNS Filtering - Block malicious domains
Infrastructure

Purpose: Attack surface management

Components:

  • Assets - Domain, subdomain, and IP inventory
  • Issues - Security vulnerability tracking
  • Penetration Testing - Pentest campaign management
  • Typosquatting - Domain squatting detection
Code

Purpose: Software supply chain security

Components:

  • Code Security - Scan repositories for secrets and security issues
  • Dependencies - SBOM management and dependency vulnerability scanning

Integrations

Integrations connect Bastion to your existing tools:

Identity Providers

  • Azure Active Directory
  • Google Workspace

Cloud Services

  • AWS
  • Azure
  • GCP
  • OVH
  • Scaleway
  • DigitalOcean

Version Control

  • GitHub
  • GitLab
  • Azure DevOps
  • Bitbucket

See All Integrations

View the complete list of supported integrations

Next Steps