Enterprise-grade security
Your data is protected by industry-leading security practices. We never use customer data to train models.
Security Architecture
Encryption at Rest
All data encrypted using AES-256 encryption. Database-level encryption with customer-managed encryption keys available for enterprise deployments.
- AES-256 encryption standard
- Encrypted backups with separate key hierarchy
- BYOK (Bring Your Own Key) available
Encryption in Transit
All data transmitted over TLS 1.3. Certificate pinning and perfect forward secrecy enabled across all endpoints.
- TLS 1.3 minimum (TLS 1.2 for legacy compatibility)
- HSTS enabled with preloading
- Perfect forward secrecy (PFS)
Key Management
Enterprise-grade key management with HSM-backed key storage and automated key rotation.
- HSM-backed key storage
- Automated key rotation (90-day cycle)
- Customer-managed keys (enterprise)
Tenant Isolation
Complete data isolation between customers at the database, compute, and network layers.
- Logical isolation (standard)
- Dedicated compute (enterprise)
- VPC peering available
Audit Logging
Comprehensive Audit Trail
Every action is logged with tamper-evident, immutable records. Full audit history exportable for compliance reviews.
What's logged: User logins, data access, configuration changes, API calls, model invocations, policy evaluations, approval workflows, and administrative actions.
Access Control
Authentication
- SSO via SAML 2.0 and OIDC
- Multi-factor authentication (MFA) enforced
- Integration with Okta, Azure AD, Google Workspace
- Session timeout and device management
Authorization
- Role-based access control (RBAC)
- Attribute-based access control (ABAC)
- Principle of least privilege
- Quarterly access reviews
Data Retention & Deletion
Clear Retention Windows
Transparent data lifecycle management with configurable retention and guaranteed deletion SLAs.
Retained for contract duration + 90 days
7-year retention (configurable)
30 days from request (certified)
Data Subject Rights: GDPR Article 17 compliant deletion with certification letter upon completion. Deletion requests processed within 30 calendar days with cryptographic proof of destruction.
Legal Agreements
Data Processing Agreement (DPA)
GDPR-compliant DPA available for all customers. Covers data processing terms, sub-processor obligations, and data transfer mechanisms.
Standard Contractual Clauses (SCC)
EU-approved SCCs for international data transfers. Transfer Impact Assessment available for EU customers.
Incident Response
Security Incident Management
24/7 security monitoring with defined incident response procedures. Our security team follows established playbooks for incident classification, containment, eradication, and recovery.
Security contact: security@lakkshionsit.com
For responsible disclosure, please include reproduction steps and impact assessment.
Service Level Agreement
Uptime Commitment
Support Hours
Pilot customers receive the same SLA guarantees as production deployments.
System Status & Incident Communications
Real-time platform status and incident history.
Incident Communications: Email notifications for P1/P2 incidents within 15 minutes. Post-incident reports within 5 business days.
Dedicated status page: status.axiomia.ai (launching Q1 2025)