Data Protection
We employ industry-standard encryption and isolation techniques to ensure your data remains confidential and tamper-proof.Encryption at Rest & Transit
All data is protected using AES-256 encryption at rest and TLS 1.3 in transit. This ensures that even in the event of physical theft or network interception, your information remains unreadable.
Hardware Security Modules
Key management is handled through HSM or cloud-native KMS solutions, providing a root of trust that is physically separated from the application environment.
Multi-Tenant Isolation
Workspaces provide strict logical isolation between different teams and projects. Data from one workspace is never accessible to another, preventing cross-tenant leakage.
Worker Pool Segregation
For sensitive workloads, you can deploy isolated worker pools. This allows you to process PII or regulated data on dedicated hardware within specific security zones.
Identity & Access Management (IAM)
Noxus provides robust tools to control who can access your resources and what actions they can perform.Authentication
We support modern authentication standards to ensure only authorized users can enter the platform:- Multi-Factor Authentication (MFA): Mandatory for all administrative accounts.
- Single Sign-On (SSO): Seamless integration with enterprise identity providers (SAML, OIDC).
- Granular API Keys: Scoped keys that follow the principle of least privilege.
Role-Based Access Control (RBAC)
Access is managed through a sophisticated permissions system:- Predefined Roles: Quick-start with roles like Admin, Developer, and Viewer.
- Custom Scopes: Create bespoke roles tailored to your organization’s specific workflow requirements.
- Audit Logging: Every action—from login to flow execution—is recorded in a tamper-proof audit trail.
Network & Infrastructure Security
Whether you are on our SaaS platform or running on-premises, your network perimeter is protected by multiple layers of defense.Perimeter Defense
Perimeter Defense
- DDoS Protection: Automated mitigation against large-scale network attacks.
- Web Application Firewall (WAF): Filters out common web exploits like SQL injection and cross-site scripting (XSS).
- VPC Isolation: All SaaS resources run within isolated Virtual Private Clouds.
Internal Communication
Internal Communication
- mTLS: Service-to-service communication is encrypted and authenticated using mutual TLS.
- Private Networking: Worker pools communicate with the control plane over secure, private tunnels.
- IP Allowlisting: Restrict access to the platform or specific APIs to known corporate IP ranges.
Compliance & Monitoring
We maintain a proactive security posture through continuous monitoring and adherence to global standards.Auditability
Noxus provides high-fidelity audit trails to ensure every action is accountable and traceable:- Comprehensive Audit Logs: Every administrative and management action—including resource creation, role updates, and flow executions—is recorded with full context (user identity, timestamp, and payload).
- API Call Logging: Detailed tracking of every incoming request, including response codes, duration, and the specific API key or user responsible.
- Tamper-Proof Storage: Logs are stored in a dedicated persistence layer and can be exported to external SIEM platforms for long-term retention and forensic analysis.
Certified Standards
- SOC 2 Type II: Verified operational security and data privacy.
- GDPR: Full compliance with European data protection regulations.
- HIPAA: Eligible for healthcare workloads in on-premises deployments.
- ISO 27001: Framework implementation currently in progress.
Proactive Monitoring
- Intrusion Detection (IDS): Real-time monitoring for suspicious system behavior.
- Anomaly Detection: AI-powered alerts for unusual usage patterns or access attempts.
- SIEM Integration: Export audit and system logs to your corporate security operations center.
Security Best Practices
Rotate Secrets
Regularly rotate API keys and integration credentials to minimize the impact of potential leaks.
Detailed Security Hardening Guide
Learn how to implement advanced security configurations for enterprise deployments.