Compliance
We adhere to the highest standards of security

SOC 2 Type 2
Service Organization Controls (SOC 2) (Type II) trust services principles
CPRA
California Consumer Privacy / Privacy Rights Act, is legislation designed to improve the data privacy of California residents
Governance & Assurance
Program-level safeguards that ensure trust, compliance, and accountability across all operations.
Independent Audits & Testing
Annual SOC 2 Type 2 audits and third-party penetration tests validate that our security controls are designed and operating effectively.
Vendor Risk Management
All vendors undergo security due diligence before onboarding and annual reviews to ensure they continue to meet our standards.
Employee Security Training
All employees complete onboarding and annual security training, with ongoing updates on emerging threats.
Data Retention & Deletion
We retain data only as long as necessary and securely delete or anonymize it according to policy and contractual requirements.
Privacy & CPRA
Our practices align with privacy laws including the California Privacy Rights Act (CPRA). We uphold strict privacy rights and data protection commitments.
Data Location
All customer data is hosted in secure, enterprise-grade cloud environments located within the United States.
Cloud Infrastructure Security
Technical safeguards protect our platform and customer data at every layer.
Encryption
All data is encrypted in transit (TLS 1.2+) and at rest (AES-256).
Access Controls
Least-privilege access, MFA enforcement, and regular reviews protect system and data access.
Logging & Monitoring
Centralized logging, automated alerts, and continuous monitoring ensure threats are detected and investigated quickly.
Vulnerability Management
Regular scans, timely patches, and annual third-party penetration tests reduce risk exposure.
Business Continuity & Disaster Recovery
Tested business continuity and disaster recovery plans ensure service resilience during disruptions.
Incident Response
Clear escalation paths and defined roles support rapid detection, containment, and remediation of incidents.
Our Security Practices
We maintain a comprehensive security program aligned to SOC 2 and industry best practices. The following sections describe how policies, processes, and responsibilities are implemented across our company.
Information Security Program
Our company-wide Information Security Program is aligned to the AICPA SOC 2 framework. It governs how systems and data are protected through documented policies, processes, and controls.
- Policies for access control, encryption, incident response, and vendor management
- Secure development, deployment, and operations standards
- Regular risk assessments with tracked remediation
Independent Audits & Penetration Testing
Our controls are validated by independent auditors through an annual SOC 2 Type 2 examination and third-party penetration testing. These assessments confirm the design and operating effectiveness of our security measures.
- Annual SOC 2 Type 2 audit with independent attestation
- Annual penetration tests covering external and application layers
- Findings remediated and validated based on risk severity
- Reports and executive summaries available under NDA
Roles & Responsibilities
Security responsibilities are clearly defined across the organization, ensuring accountability and effective governance at all levels.
- Dedicated security ownership and cross-functional support
- Change approval, code review, and deployment oversight
- Escalation paths for incidents, vulnerabilities, and exceptions
Employee Security Awareness
All employees complete onboarding and annual security awareness training, reinforced with continuous reminders to keep security top-of-mind.
- Core topics include data handling, phishing, and incident reporting
- Completion tracked with automated reminders
- Ongoing communication of emerging threats and best practices
Data Confidentiality
Employees, contractors, and vendors sign confidentiality agreements. Data is classified and protected according to sensitivity, with strict retention and disposal practices.
- Data classification with handling rules by sensitivity
- Least-privilege access to confidential data
- Retention and secure disposal per policy
Vendor Risk Management
We operate a Third-Party Risk Management (TPRM) program to assess vendors before onboarding and through annual reviews. Vendors with access to customer data must meet our standards and contractual requirements.
- Security due diligence before onboarding
- Annual vendor risk and compliance reviews
- List of subprocessors available in the Trust Center
Access Security
Strong access controls protect sensitive systems and data. Access is regularly reviewed to maintain compliance with least-privilege principles.
- MFA enforced for sensitive and remote access
- Quarterly reviews of privileged accounts
- Centralized monitoring of access events
Subprocessors
AWS
Cloud Hosting Services
Databricks
Data Warehouse and Analytics Platform
Neo4j
Graph Database Platform
Jira
Ticket management
Grafana
Data Visualization & Monitoring
Google Workspace
File Storage & Collaboration
Airtable
Data and Workflow Management Platform
Hubspot
Customer Relationship Management
Slack
Communication
FAQs
Resources
SOC 2 Type II
Our SOC 2 Type II report is an independent audit of our commitment to security. It verifies that our controls effectively protect your data from unauthorized access. The full report is available upon request under an NDA
Terms of Service
This legal agreement governs your use of our services. It outlines your rights, our responsibilities, and the rules for using the Axiom Cloud platform.
Privacy Policy
Your privacy is a priority. This policy explains what data we collect, how we use and protect it, and your rights regarding your personal information.
Common Axiom IT Security Questionnaire Responses
Pre-prepared answers to the most common security and compliance questions, designed to support your due diligence process quickly and consistently.
Monitoring
We use Secureframe to continuously monitor controls and evidence for SOC 2 Type 2.
