Overview
Axonius has a formal cybersecurity program designed to safeguard the confidentiality, integrity, availability, and privacy of our systems and the data we store or process. To describe key aspects of our program, we decided to focus on those components that we ask about when speaking with our own vendors. Use this Trust Center to learn about our security posture and request access to our security documentation (some of which requires a signed NDA to download).
Frameworks & Certifications


Product Security Capabilities
Encryption at Rest
SSO Integrations
Pentest Summary Report
See more
Application Security Practices
Vulnerability Disclosure Program
Software Development Lifecycle (SDL)
Secure Development Training
See more
Infrastructure Security
AWS Single Tenant Architecture
Cloud Workload Protection
Separation of Production and Development
See more
Corporate Security
Account & Access Controls
Security Incident Response Process
Pentest Summary Report
See more
Self-Assessments
CAIQ for General Public
CAIQ for Prospects & Customers
SIG Lite
See more
Legal Matters
Subprocessors
Data Processing Addendum (DPA)
Cybersecurity Insurance
See more
Knowledge Base
- Please describe the company/user data you require to provide your service: personal information, financial data, confidential/sensitive data, government data.
- How do you keep aware of potential security vulnerabilities and threats that may affect your service?
- Describe your secrets management strategy:(auth tokens, passwords, API credentials, certificates) .
- Which processors (vendors) access your customer's information?
- Please describe your general rules management in relation to role provisioning, deprovisioning, and recertification.
See more