Skip to main content
Noxus is built on a foundation of defense-in-depth, ensuring that security is integrated into every layer of the platform—from the physical infrastructure to the application code and user access controls.

Data Protection

We employ industry-standard encryption and isolation techniques to ensure your data remains confidential and tamper-proof.

Encryption at Rest & Transit

All data is protected using AES-256 encryption at rest and TLS 1.3 in transit. This ensures that even in the event of physical theft or network interception, your information remains unreadable.

Hardware Security Modules

Key management is handled through HSM or cloud-native KMS solutions, providing a root of trust that is physically separated from the application environment.

Multi-Tenant Isolation

Workspaces provide strict logical isolation between different teams and projects. Data from one workspace is never accessible to another, preventing cross-tenant leakage.

Worker Pool Segregation

For sensitive workloads, you can deploy isolated worker pools. This allows you to process PII or regulated data on dedicated hardware within specific security zones.

Identity & Access Management (IAM)

Noxus provides robust tools to control who can access your resources and what actions they can perform.

Authentication

We support modern authentication standards to ensure only authorized users can enter the platform:
  • Multi-Factor Authentication (MFA): Mandatory for all administrative accounts.
  • Single Sign-On (SSO): Seamless integration with enterprise identity providers (SAML, OIDC).
  • Granular API Keys: Scoped keys that follow the principle of least privilege.

Role-Based Access Control (RBAC)

Access is managed through a sophisticated permissions system:
  • Predefined Roles: Quick-start with roles like Admin, Developer, and Viewer.
  • Custom Scopes: Create bespoke roles tailored to your organization’s specific workflow requirements.
  • Audit Logging: Every action—from login to flow execution—is recorded in a tamper-proof audit trail.

Network & Infrastructure Security

Whether you are on our SaaS platform or running on-premises, your network perimeter is protected by multiple layers of defense.
  • DDoS Protection: Automated mitigation against large-scale network attacks.
  • Web Application Firewall (WAF): Filters out common web exploits like SQL injection and cross-site scripting (XSS).
  • VPC Isolation: All SaaS resources run within isolated Virtual Private Clouds.
  • mTLS: Service-to-service communication is encrypted and authenticated using mutual TLS.
  • Private Networking: Worker pools communicate with the control plane over secure, private tunnels.
  • IP Allowlisting: Restrict access to the platform or specific APIs to known corporate IP ranges.

Compliance & Monitoring

We maintain a proactive security posture through continuous monitoring and adherence to global standards.

Auditability

Noxus provides high-fidelity audit trails to ensure every action is accountable and traceable:
  • Comprehensive Audit Logs: Every administrative and management action—including resource creation, role updates, and flow executions—is recorded with full context (user identity, timestamp, and payload).
  • API Call Logging: Detailed tracking of every incoming request, including response codes, duration, and the specific API key or user responsible.
  • Tamper-Proof Storage: Logs are stored in a dedicated persistence layer and can be exported to external SIEM platforms for long-term retention and forensic analysis.

Certified Standards

  • SOC 2 Type II: Verified operational security and data privacy.
  • GDPR: Full compliance with European data protection regulations.
  • HIPAA: Eligible for healthcare workloads in on-premises deployments.
  • ISO 27001: Framework implementation currently in progress.

Proactive Monitoring

  • Intrusion Detection (IDS): Real-time monitoring for suspicious system behavior.
  • Anomaly Detection: AI-powered alerts for unusual usage patterns or access attempts.
  • SIEM Integration: Export audit and system logs to your corporate security operations center.

Security Best Practices

1

Enforce MFA

Require multi-factor authentication for all users across the organization.
2

Least Privilege

Assign users only the minimum permissions necessary for their specific role.
3

Rotate Secrets

Regularly rotate API keys and integration credentials to minimize the impact of potential leaks.
4

Audit Regularly

Review audit logs and user access permissions on a monthly basis.

Detailed Security Hardening Guide

Learn how to implement advanced security configurations for enterprise deployments.