Trust Center

Overview

Axonius has a formal cybersecurity program designed to safeguard the confidentiality, integrity, availability, and privacy of our systems and the data we store or process. To describe key aspects of our program, we decided to focus on those components that we ask about when speaking with our own vendors. Use this Trust Center to learn about our security posture and request access to our security documentation (some of which requires a signed NDA to download).

Frameworks & Certifications

SOC 2 Logo
SOC 2
ISO 27001 Logo
ISO 27001
HIPAA Logo
HIPAA
IRAP Logo
IRAP
AWS Qualified Software Logo
AWS Qualified Software
ISO 27001 SoA Logo
ISO 27001 SoA

Product Security Capabilities

Encryption at Rest
SSO Integrations
Pentest Summary Report
See more

Application Security Practices

Vulnerability Disclosure Program
Software Development Lifecycle (SDL)
Secure Development Training
See more

Infrastructure Security

AWS Single Tenant Architecture
Cloud Workload Protection
Separation of Production and Development
See more

Corporate Security

Account & Access Controls
Security Incident Response Process
Pentest Summary Report
See more

Self-Assessments

CAIQ for General Public
CAIQ for Prospects & Customers
SIG Lite
See more

Knowledge Base

  • Please describe the company/user data you require to provide your service: personal information, financial data, confidential/sensitive data, government data.
  • How do you keep aware of potential security vulnerabilities and threats that may affect your service?
  • Describe your secrets management strategy:(auth tokens, passwords, API credentials, certificates) .
  • Which processors (vendors) access your customer's information?
  • Please describe your general rules management in relation to role provisioning, deprovisioning, and recertification.
See more
Powered BySafeBase Logo