Security practices and enterprise controls.
Built for organizations that need audit trails, security questionnaire responses, and procurement documentation.
Security practices
Encryption at rest and in transit
All data is encrypted using industry-standard AES-256 at rest and TLS 1.3 in transit. Database backups are encrypted and stored in geographically distributed locations.
Cloud infrastructure & backups
Hosted on AWS with automated daily backups and point-in-time recovery. Multi-region redundancy ensures uptime and disaster recovery capabilities.
Uptime & reliability
99.9% uptime SLA for Enterprise customers. Real-time monitoring with automated alerts and incident response protocols. Status page available on request.
Application security
Regular security assessments, dependency scanning, and security updates. OWASP Top 10 mitigations in place. Vulnerability management program active.
Organizational controls
Access controls & SSO
Role-based access control (RBAC) with granular permissions. SAML/SSO support for Enterprise customers (Okta, Azure AD, Google Workspace). Audit logs for all user actions.
Audit trails & logging
Complete audit trails for all data access and modifications. Timestamped logs with user attribution. Configurable retention policies to meet your requirements.
Data ownership & export
You own all data collected through Autonix. Export data anytime via CSV or API. Delete your data on request. No vendor lock-in.
US-based hosting
Autonix is a US-based company with data hosted in AWS US regions. No offshore data processing. Meets data residency requirements for government and healthcare.
Procurement support
We work regularly with government agencies, healthcare systems, and enterprise organizations. We understand procurement processes and security review requirements.
- Respond to security questionnaires (VSAs, SIGs, custom vendor assessments)
- Provide security documentation (architecture diagrams, security practices documentation)
- Sign DPAs and MSAs with appropriate legal review and terms negotiation
- Work with .gov and .edu organizations - experienced with public sector procurement
- Customer references available from government, healthcare, and enterprise deployments
Typical security review timeline: 1-2 weeks for questionnaire responses, 2-4 weeks for custom documentation requests.
Request Security DocumentationCompliance and certification programs
Autonix does not currently hold SOC2, HIPAA, FedRAMP, or similar certifications. However, we build with security best practices and can work within your organization's compliance frameworks.
We configure data handling, retention, and access controls based on your specific requirements and policies. Contact us to discuss your compliance needs.
Your data is your data
You own all data collected through Autonix. We provide tools and infrastructure; you control access, retention, and export. Delete your data anytime.