Trust Center

Overview

Axonius has a formal cybersecurity program. It’s designed to safeguard the confidentiality, integrity, availability, and privacy of our systems and data that we store or process. When deciding how to describe key aspects of the security program, we decided to focus on those components that we ask about when talking with our own vendors. With this in mind, this site outlines what we thought you might want to know about our security program.

Frameworks & Certifications

SOC 2 Logo
SOC 2
ISO 27001 Logo
ISO 27001
HIPAA Logo
HIPAA
IRAP Logo
IRAP
AWS Qualified Software Logo
AWS Qualified Software
ISO 27001 SoA Logo
ISO 27001 SoA
SOC 3 Logo
SOC 3

Product Security Capabilities

Encryption at Rest
SSO Integrations
Pentest Summary Report
See more

Application Security Practices

Software Development Lifecycle (SDL)
Secure Development Training
Vulnerability Disclosure Program
See more

Infrastructure Security

AWS Single Tenant Architecture
Cloud Workload Protection
Separation of Production and Development
See more

Corporate Security

Account & Access Controls
Security Incident Response Process
Pentest Summary Report
See more

Self-Assessments

CAIQ for General Public
CAIQ for Prospects & Customers
SIG Lite
See more

Knowledge Base

  • Please describe the company/user data you require to provide your service: personal information, financial data, confidential/sensitive data, government data.
  • How do you keep aware of potential security vulnerabilities and threats that may affect your service?
  • Describe your secrets management strategy:(auth tokens, passwords, API credentials, certificates) .
  • Which processors (vendors) access your customer's information?
  • Please describe your general rules management in relation to role provisioning, deprovisioning, and recertification.
See more
Powered BySafeBase Logo