TRUST · SECURITY · COMPLIANCE · THE VAULT
The operating axis was built to be trusted before it was built to be fast.
Aixys runs on an event-sourced memory bus. That substrate is the same surface we use for audit, access control, grounded AI, and data residency. Trust is architectural — not a badge we bolt on at the end.
- 99.982Availability · trailing 12 monthsProduction control plane
- 34Median incident resolutionminutes
- 04Customer-data regionsUS · EU · UK · APAC
- AES-256Encryption at reston every partition
CERTIFICATIONS · AUDITED OR IN AUDIT
What we certify against.
- SOC 2 Type IILive
Audited annually by an independent AICPA-registered firm.
- ISO 27001Live
Certified scope covers the control plane, data plane and corporate.
- GDPRLive
DPA available on request; sub-processor registry published.
- HIPAAAvailable on request
BAA available for qualifying healthcare customers.
- ISO 42001 (AI)In audit
Stage 2 scheduled for Q3 2026.
- Third-party pentestLive
Externally tested every six months; summary report under NDA.
TRUST ARCHITECTURE · SIX PILLARS
How the vault is built.
Identity & access
Every action in Aixys carries an actor identity, and every identity is auditable in one log.
- SAML SSO with SCIM provisioning, on every plan.
- Just-in-time admin access with time-boxed grants.
- Per-actor audit trail of every event in the memory bus.
Data protection
Customer data is encrypted in flight and at rest, partitioned per tenant, and never mingled between tenants.
- TLS 1.3 on every network boundary, internal and external.
- AES-256-GCM at rest, per-tenant KMS keys, rotated quarterly.
- Zero customer data in logs, unless explicitly opted in.
Grounded AI
Every AI answer in Aixys cites the event it was derived from — and inherits the actor identity of the operator asking.
- Citations are URIs against the event stream, not strings.
- Drift budget surfaced in every AI-authored block.
- No customer data used to train foundation models, ever.
Residency & sovereignty
Customer data is pinned to the region you choose, with a documented path for regulated workloads.
- Four regional deployments: US-East, EU-West, UK, APAC.
- Data does not cross regional boundaries without explicit, logged consent.
- Private-region deployments available for enterprise contracts.
Operations & incident response
A small team, a clear runbook, and an operator-first incident posture.
- 24/7 on-call rotation; tiered S0-S3 severity model.
- Public status page, with incident post-mortems within 72 hours.
- Customers with S0-class incidents get a named IR lead within 15 minutes.
Privacy & retention
You own your data, all of it. Export is always available, retention is explicit, deletion is real.
- One-click full export in JSON + CSV formats.
- Per-collection retention policies, auditable by customer admins.
- Deletion is propagated to backups within 30 days; certificate available.
INCIDENT LEDGER · HONEST POSTURE
What we’ve broken, and how we fixed it.
We publish incidents. Not because we like them, but because customers deserve to see the posture behind the uptime number. Every S0–S2 incident gets a post-mortem within 72 hours.
- S22026-03-11 · 14:22 UTC
Degraded projection rebuild in EU-West
- IMPACT
- Dashboards in EU-West were 4-7 minutes behind for 38 minutes.
- RESOLUTION
- Rolled back the affected projection build; added a projection-freshness gauge with tighter alerting.
- S22025-11-02 · 09:41 UTC
Elevated latency on the connector gateway (US-East)
- IMPACT
- P99 latency rose from 210ms to 820ms for 19 minutes.
- RESOLUTION
- Failed over to secondary gateway; identified a misconfigured connection pool. Pool limits now provisioned from Terraform.
- S12025-07-19 · 22:04 UTC
Auth provider partial outage
- IMPACT
- Upstream IdP outage prevented 11% of SAML logins for 52 minutes.
- RESOLUTION
- Activated break-glass login flow; co-published post-mortem with the IdP.
Older incidents (pre-2025) available under NDA on request.
CONTACT · SECURITY & COMPLIANCE
Need the paperwork?
- Security inbox
For vulnerability reports and security research. We respond within one business day, and we run a coordinated-disclosure policy.
Email the security team → - DPA & GDPR
Request our Data Processing Agreement, sub-processor registry, or EU Standard Contractual Clauses — all countersigned by our DPO.
Request DPA → - SOC 2 & pentest
Under mutual NDA we will share our current SOC 2 Type II report, ISO 27001 certificate, and our most recent third-party pentest summary.
Request audit package →
NEXT STEP · YOUR SECURITY TEAM