Security & Compliance
Enterprise-grade security for your on-chain data.
How we protect customer data, manage access and respond to incidents — and what we're building toward on the compliance side.
Practices
Security is built into the platform, not bolted on.
Encryption in transit & at rest.
TLS 1.2+ on every public endpoint. Database storage and backups are encrypted at rest using industry-standard ciphers managed by our cloud provider.
Role-based access control.
Production access is gated by SSO with hardware-backed second factor. Permissions follow least-privilege; access reviews run on a recurring cadence.
Tenant isolation.
Customer data is logically isolated per tenant. Nexus query paths enforce tenant scoping at the API layer and at the storage layer.
Incident response.
Documented runbooks for ingestion, query, and security incidents. On-call rotation with defined severity levels, communication channels and post-mortem process.
Vulnerability management.
Dependencies scanned continuously. Critical findings are triaged and patched on a defined SLA. External pen-tests planned before GA.
Certifications
Where we are on formal certifications.
We don't claim certifications we don't hold. Below is the current state of our compliance roadmap; ask us in contact for the latest evidence pack.
SOC 2 Type II
In progressISO 27001
PlannedGDPR
In progressSecurity inquiries
Found a vulnerability? Need our security pack for a vendor review? Reach the security team directly.
We aim to acknowledge reports within 2 business days.