Security practices and enterprise controls.

Built for organizations that need audit trails, security questionnaire responses, and procurement documentation.

Security practices

Encryption at rest and in transit

All data is encrypted using industry-standard AES-256 at rest and TLS 1.3 in transit. Database backups are encrypted and stored in geographically distributed locations.

Cloud infrastructure & backups

Hosted on AWS with automated daily backups and point-in-time recovery. Multi-region redundancy ensures uptime and disaster recovery capabilities.

Uptime & reliability

99.9% uptime SLA for Enterprise customers. Real-time monitoring with automated alerts and incident response protocols. Status page available on request.

Application security

Regular security assessments, dependency scanning, and security updates. OWASP Top 10 mitigations in place. Vulnerability management program active.

Organizational controls

Access controls & SSO

Role-based access control (RBAC) with granular permissions. SAML/SSO support for Enterprise customers (Okta, Azure AD, Google Workspace). Audit logs for all user actions.

Audit trails & logging

Complete audit trails for all data access and modifications. Timestamped logs with user attribution. Configurable retention policies to meet your requirements.

Data ownership & export

You own all data collected through Autonix. Export data anytime via CSV or API. Delete your data on request. No vendor lock-in.

US-based hosting

Autonix is a US-based company with data hosted in AWS US regions. No offshore data processing. Meets data residency requirements for government and healthcare.

Procurement support

We work regularly with government agencies, healthcare systems, and enterprise organizations. We understand procurement processes and security review requirements.

  • Respond to security questionnaires (VSAs, SIGs, custom vendor assessments)
  • Provide security documentation (architecture diagrams, security practices documentation)
  • Sign DPAs and MSAs with appropriate legal review and terms negotiation
  • Work with .gov and .edu organizations - experienced with public sector procurement
  • Customer references available from government, healthcare, and enterprise deployments

Typical security review timeline: 1-2 weeks for questionnaire responses, 2-4 weeks for custom documentation requests.

Request Security Documentation

Compliance and certification programs

Autonix does not currently hold SOC2, HIPAA, FedRAMP, or similar certifications. However, we build with security best practices and can work within your organization's compliance frameworks.

We configure data handling, retention, and access controls based on your specific requirements and policies. Contact us to discuss your compliance needs.

Your data is your data

You own all data collected through Autonix. We provide tools and infrastructure; you control access, retention, and export. Delete your data anytime.