Your Trust is Our Priority

GuardAxion is committed to maintaining the highest standards of security, privacy, and compliance. This Trust Center provides transparent access to our security practices, certifications, and compliance documentation.

99.97%
Platform Uptime
AES-256
Data Encryption
24/7
Security Monitoring
< 1hr
Incident Response

πŸ† Certifications & Compliance

Industry-recognized security and compliance certifications

πŸ”’

SOC 2 Type II

IN PROGRESS

Currently undergoing SOC 2 Type II certification audit. Expected completion: Q2 2026.

  • βœ“ Security controls documented
  • βœ“ Audit period underway
  • βœ“ Independent auditor engaged
πŸ‡ͺπŸ‡Ί

GDPR Compliance

COMPLIANT

Fully compliant with General Data Protection Regulation requirements for EU data processing.

  • βœ“ Data Processing Agreements
  • βœ“ Right to erasure implemented
  • βœ“ Privacy by design
πŸ₯

HIPAA Ready

AVAILABLE

HIPAA-compliant deployment options available for healthcare customers with BAA support.

  • βœ“ BAA agreements available
  • βœ“ PHI encryption standards
  • βœ“ Audit logging
🌐

ISO 27001

ROADMAP

ISO 27001 certification planned for 2026 to ensure international security standards.

  • ⏳ Gap analysis complete
  • ⏳ ISMS implementation started
  • ⏳ Scheduled for Q4 2026
πŸ‡ΊπŸ‡Έ

CCPA Compliance

COMPLIANT

California Consumer Privacy Act compliant with consumer data rights implementation.

  • βœ“ Data access requests
  • βœ“ Opt-out mechanisms
  • βœ“ Sale disclosure
πŸ”

PCI DSS Ready

AVAILABLE

PCI DSS-compliant infrastructure available for payment card data processing requirements.

  • βœ“ Secure payment processing
  • βœ“ Network segmentation
  • βœ“ Quarterly scanning

πŸ›‘οΈ Security Practices

Comprehensive security measures protecting your data

πŸ”

Data Encryption

At Rest: AES-256 encryption for all stored data

In Transit: TLS 1.3 for all data transmission

Key Management: HSM-backed key storage and rotation

πŸ‘₯

Access Control

Authentication: Multi-factor authentication (MFA) required

Authorization: Role-based access control (RBAC)

SSO: SAML 2.0 and OAuth 2.0 support

πŸ“Š

Monitoring & Logging

24/7 Monitoring: Real-time security event monitoring

Audit Logs: Comprehensive activity logging

SIEM Integration: Security information and event management

🏰

Infrastructure Security

Cloud Providers: AWS, Azure, GCP tier-1 data centers

Network: DDoS protection and WAF

Isolation: Multi-tenant data isolation

πŸ”

Vulnerability Management

Scanning: Automated vulnerability scanning

Pen Testing: Annual penetration testing

Bounty Program: Responsible disclosure program

πŸ‘¨β€πŸ’»

Development Security

SDLC: Secure development lifecycle

Code Review: Security-focused code reviews

Dependencies: Automated dependency scanning

πŸ”’ Privacy & Data Handling

How we protect and manage your data

Data Collection & Usage

We collect only the data necessary to provide our services. Personal data is never sold or shared with third parties for marketing purposes.

  • Minimal data collection principles
  • Transparent usage policies
  • User consent management
  • Data retention policies (90 days default)

Data Location & Residency

Customer data is stored in geographically distributed data centers with options for regional data residency.

  • US, EU, and APAC regions available
  • Customer-selectable data residency
  • Cross-border transfer safeguards
  • Standard Contractual Clauses (SCCs)

Data Subject Rights

We support comprehensive data subject rights including access, rectification, erasure, and portability.

  • Right to access personal data
  • Right to rectification and erasure
  • Data portability (JSON/CSV export)
  • Response within 30 days

Subprocessors & Third Parties

We maintain a transparent list of subprocessors and third-party service providers.

🎯 Security Testing

Independent verification of our security posture

Annual Penetration Testing

Last Conducted: November 2025 | Firm: Independent Security Partners

Our infrastructure undergoes annual penetration testing by independent third-party security firms to identify and remediate vulnerabilities.

Test Scope:

  • External infrastructure penetration testing
  • Web application security assessment
  • API security testing
  • Social engineering assessment
  • Cloud configuration review

Latest Results (November 2025):

Critical Findings: 0 | High: 0 | Medium: 2 (Remediated) | Low: 5 (Scheduled)

Contact us for executive summary or detailed findings under NDA.

🚨 Incident Response

Our commitment to rapid incident detection and response

Security Incident Response Plan

GuardAxion maintains a formal incident response plan with defined procedures for detection, containment, eradication, and recovery.

Response Time Commitments:

< 1hr
Critical Incidents
< 4hr
High Priority
< 24hr
Medium Priority

Customer Notification:

  • Immediate notification for data breaches
  • Status page updates for service incidents
  • Post-incident reports within 72 hours
  • Regulatory reporting as required

Report a Security Issue

If you discover a security vulnerability, please report it responsibly:

Email: security@guardaxion.com

PGP Key: Download Public Key

Response SLA: Within 24 hours

We appreciate responsible disclosure and do not pursue legal action against security researchers who follow coordinated disclosure practices.

πŸ“„ Documentation & Resources

Download compliance and security documentation

πŸ“‹

Security Overview

Comprehensive overview of our security architecture, controls, and practices.

Download PDF
πŸ“

Data Processing Agreement

GDPR-compliant DPA for customer data processing activities.

Download PDF
πŸ”

Subprocessor List

Current list of third-party subprocessors and their purposes.

Download PDF
πŸ₯

HIPAA BAA Template

Business Associate Agreement for healthcare customers.

Download PDF
πŸ“Š

SOC 2 Report

SOC 2 Type II report (available under NDA upon completion).

Request Access
🎯

Penetration Test Summary

Executive summary of latest penetration test results.

Request Access

Questions About Our Security?

Contact our security team for detailed information or compliance questions

Contact Security Team