Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Comprehensive technical documentation of our security architecture and practices
Version 1.0 | January 2026 | Classification: Public
Adaptrix provides an AI-powered business intelligence platform designed with security as a foundational principle. This whitepaper documents our comprehensive security architecture, controls, and practices implemented to protect customer data.
Our security program is built on defense-in-depth principles, implementing multiple layers of security controls across infrastructure, network, application, and data tiers. We maintain alignment with industry-leading security frameworks including SOC 2 Type II and ISO 27001.
Our security architecture implements multiple layers of defense, ensuring that no single point of failure can compromise the system. Each layer provides independent security controls that complement and reinforce others.
We apply zero trust security principles, meaning every access request is fully authenticated, authorized, and encrypted before granting access, regardless of network location.
| Data State | Encryption Method | Key Size |
|---|---|---|
| At Rest (Database) | AES-256-GCM | 256-bit |
| At Rest (Files) | AES-256-CBC | 256-bit |
| In Transit | TLS 1.3 | 256-bit (ECDHE) |
| Backups | AES-256-GCM | 256-bit |
Encryption keys are managed through a dedicated key management system with the following controls:
All data is classified according to sensitivity and handled according to classification-specific controls:
We support multiple authentication methods to meet diverse customer requirements:
Role-based access control (RBAC) enforces the principle of least privilege:
| Role | Permissions |
|---|---|
| Viewer | Read dashboards and reports |
| Analyst | Create/edit dashboards, run queries |
| Admin | User management, integrations, settings |
| Owner | Billing, full administrative access |
Our network architecture implements strict segmentation and isolation:
All external connections use TLS 1.3 with the following cipher suites:
Security is integrated throughout our software development lifecycle:
We implement specific controls for each OWASP Top 10 vulnerability:
Primary infrastructure is hosted in Hostinger cloud infrastructure located in Frankfurt, Germany, ensuring EU data residency for all customer data.
24/7 monitoring of all systems with automated alerting:
Comprehensive audit logging captures all security-relevant events:
Logs are stored in immutable storage with 365-day retention and protected against tampering through cryptographic verification.
In the event of a data breach affecting customer data:
| Framework | Status | Notes |
|---|---|---|
| SOC 2 Type II | Aligned | Audit planned 2026 |
| ISO 27001:2022 | Aligned | ISMS implemented |
| GDPR | Compliant | Self-certified |
| HIPAA | Available | BAA on request |
All sub-processors must meet our security requirements:
A complete list of sub-processors is available at adaptrix.ai/sub-processors
| Backup Frequency | Daily full, continuous incremental |
| Retention Period | 30 days standard, customizable |
| RPO (Recovery Point) | < 24 hours |
| RTO (Recovery Time) | < 4 hours |
| DR Testing | Quarterly |
For security inquiries, compliance documentation requests, or to report a vulnerability: