Legal
Security Overview
Last Updated: March 2026
Our Commitment to Security
At Aexiz Solutions, security is foundational to everything we build. Our Zero Trust architecture, particularly in ZTA-AI, reflects our commitment to protecting sensitive data while enabling powerful AI capabilities.
Security Certifications & Compliance
| Certification | Status | Notes |
|---|---|---|
| ISO 27001 | Planned | Information Security Management |
| SOC 2 Type I | Planned | Service Organization Controls |
| SOC 2 Type II | Planned | Service Organization Controls |
| HIPAA | Planned | Healthcare compliance; BAAs available |
| PCI DSS | Planned | Payment card security |
| DPDP Act 2020 | Planned | Indian data protection |
| RBI Compliance | Planned | Financial sector requirements |
Infrastructure Security
Cloud Infrastructure
- Provider: Amazon Web Services (AWS)
- Primary Regions: Singapore, India
- Backup Location: European Union
- Redundancy: Multi-AZ deployment
- Data Residency: Customers can choose their preferred region
Network Security
- Virtual Private Cloud (VPC) isolation
- Web Application Firewall (WAF)
- DDoS protection
- Intrusion detection and prevention
- Network segmentation
Application Security
Secure Development
- Secure coding standards and guidelines
- Code review requirements
- Static and dynamic security testing
- Dependency vulnerability scanning
- Regular security training for developers
Vulnerability Management
- Penetration Testing: Quarterly
- Vulnerability Scanning: Yearly
- Responsible disclosure program (planned)
- Timely patching of vulnerabilities
Data Security
Encryption
- At Rest: AES-256 encryption
- In Transit: TLS 1.3
- Key Management: AWS KMS
Data Classification
We classify data based on sensitivity:
- Public
- Internal
- Confidential
- Restricted
Data Retention
- Account data: Duration of active account
- Transaction/usage data: 30 business days
- Log files: 90 business days
- Backup data: 90 business days
- Post-deletion: 7 business days
ZTA-AI: Zero Trust Architecture
Our flagship AI system implements true Zero Trust principles:
Data Abstraction
- LLM never sees raw data: All database data is abstracted before processing
- No schema exposure: Database schemas and table names are never passed to the LLM
- No credentials: The LLM never receives connection strings or credentials
- All data abstracted: All data is abstracted before LLM processing
Access Control
- RBAC: Role-Based Access Control for user permissions
- ABAC: Attribute-Based Access Control for fine-grained policies
- Time-based restrictions: Access controls based on time windows
- Location-based restrictions: Geographic access controls
- Claims-based: All data accessed through controlled claim payloads
Audit & Monitoring
- Comprehensive audit logging for all AI decisions
- Real-time anomaly detection
- Policy violation alerts
- Access pattern analysis
Access Control
Authentication
- Multi-factor authentication (MFA)
- Single Sign-On (SSO) support
- SAML 2.0 / OIDC integration
- Password policies and rotation
Authorization
- Principle of least privilege
- Role-based access control
- Regular access reviews
- Just-in-time access provisioning
Monitoring & Incident Response
Security Monitoring
- 24/7 security monitoring
- SIEM and log aggregation
- Threat intelligence integration
- Automated alerting
Incident Response
- Documented incident response plan
- Dedicated security response team
- Regular incident response drills
- Post-incident analysis and improvement
Notification
- Customer notification within 72 hours of confirmed breach
- Regular status updates during incidents
- Post-incident reports
Business Continuity
Backup & Recovery
- Automated daily backups
- Point-in-time recovery capability
- Geographically distributed backup storage (EU)
- Regular recovery testing
High Availability
- Multi-region deployment
- Automatic failover
- Load balancing
- 99.9% uptime target
Security Reporting
Responsible Disclosure
If you discover a security vulnerability:
- Email: security@aexiz.com
- Include: Description, reproduction steps, impact assessment
- Response: Acknowledgment within 48 hours
Bug bounty program planned for future implementation.
Contact
- Security Team: security@aexiz.com
- Compliance Questions: compliance@aexiz.com
- Data Protection: privacy@aexiz.com