AxAxixOS

Security

How we handle data, protect systems, and plan for enterprise-grade security posture.

Data Minimization

We collect the minimum data required to deliver product functionality. We don't harvest analytics, sell data, or build ad profiles. If we don't need it, we don't store it.

Encryption

All data in transit is encrypted via TLS 1.3. Data at rest is encrypted using AES-256. We follow industry-standard key management practices and never store encryption keys alongside encrypted data.

Key Handling

API keys, tokens, and credentials are never exposed in client-side code or browser storage. Where API keys are necessary, they are server-side only with strict scoping and rotation policies.

Audit Logging

Products that handle sensitive operations maintain structured audit logs. These logs record who performed an action, what changed, when it happened, and from what context. Logs are append-only and tamper-evident.

Responsible Disclosure

If you discover a security vulnerability in any AxixOS product, please report it to security@axixos.com. We commit to acknowledging receipt within 48 hours and providing an initial assessment within 5 business days.

Incident Response

We maintain an incident response plan for security events. In the event of a breach, affected users will be notified within 72 hours with clear information about what happened, what data was affected, and what steps we're taking.

Security Roadmap

We are transparent about where we are and where we're going. The following certifications and compliance frameworks are on our roadmap but not yet achieved.

SOC 2 Type IIPlanned
ISO 27001Planned
GDPR ComplianceIn Progress
Penetration TestingPlanned