Overview
Axonius has a formal cybersecurity program. It’s designed to safeguard the confidentiality, integrity, availability, and privacy of our systems and data that we store or process. When deciding how to describe key aspects of the security program, we decided to focus on those components that we ask about when talking with our own vendors. With this in mind, this site outlines what we thought you might want to know about our security program.
Frameworks & Certifications



Product Security Capabilities
Encryption at Rest
SSO Integrations
Pentest Summary Report
See more
Application Security Practices
Software Development Lifecycle (SDL)
Secure Development Training
Vulnerability Disclosure Program
See more
Infrastructure Security
AWS Single Tenant Architecture
Cloud Workload Protection
Separation of Production and Development
See more
Corporate Security
Account & Access Controls
Security Incident Response Process
Pentest Summary Report
See more
Self-Assessments
CAIQ for General Public
CAIQ for Prospects & Customers
SIG Lite
See more
Legal Matters
Subprocessors
Data Processing Addendum (DPA)
Cybersecurity Insurance
See more
Knowledge Base
- Please describe the company/user data you require to provide your service: personal information, financial data, confidential/sensitive data, government data.
- How do you keep aware of potential security vulnerabilities and threats that may affect your service?
- Describe your secrets management strategy:(auth tokens, passwords, API credentials, certificates) .
- Which processors (vendors) access your customer's information?
- Please describe your general rules management in relation to role provisioning, deprovisioning, and recertification.
See more