Procurement
Enterprise Procurement Pack
Everything your procurement and security teams need to evaluate AXIOMIA.
Security Controls
Encryption at restAES-256
Encryption in transitTLS 1.3
Tenant isolationLogical + dedicated compute option
AuthenticationSSO (SAML 2.0, OIDC)
ProvisioningSCIM 2.0
MFAEnforced for all users
Access controlRBAC + ABAC
Audit loggingComprehensive, tamper-evident
Key managementCustomer-managed keys (BYOK)
Network securityVPC peering available
Data Handling & Retention
Data locationUS (AWS us-east-1), EU available
Retention periodConfigurable (default 7 years)
DeletionAutomated purge on request
BackupsDaily, encrypted, geo-redundant
AI trainingNever used for model training
PII handlingEncrypted, access-controlled
Sub-processors
| Provider | Purpose | Location |
|---|---|---|
| AWS | Cloud infrastructure | US/EU |
| Supabase | Database + Auth | US/EU |
| Anthropic | AI inference (optional) | US |
| SendGrid | Transactional email | US |
Full sub-processor list available upon request. Notifications provided 30 days before any changes.
Incident Response
Response SLAs
- P1 (Critical): < 1 hour initial response
- P2 (High): < 4 hours initial response
- Customer notification: within 72 hours
- Post-incident report: within 5 business days
Monitoring
- 24/7 security monitoring
- Automated threat detection
- Regular penetration testing
- Vulnerability scanning
Support Tiers
| Tier | Response Time | Included In |
|---|---|---|
| Standard | < 8 hours (business days) | All plans |
| Priority | < 4 hours (business days) | Enterprise |
| Critical (P1) | < 1 hour (24/7) | Enterprise |
Compliance Roadmap
Current
- SOC 2 Type II aligned controls
- GDPR compliant
- CCPA compliant
Roadmap (2025)
- SOC 2 Type II certification (Q2)
- ISO 27001 certification (Q3)
- HIPAA BAA available (Q4)
Implementation Methodology
30
Days: Foundation
- • SSO configuration
- • Data source connections
- • Initial snapshot
60
Days: Validation
- • Policy configuration
- • User training
- • First analysis cycle
90
Days: Production
- • Full deployment
- • Automation enabled
- • Success metrics review
Security & Procurement Contact
For security questionnaires, DPA requests, or procurement inquiries:
security@lakkshionsit.com