Security Policy

How we maintain architectural integrity.

Last Updated: March 2026
AxonAtlas Global Operations

1. Data Encryption

All data transmitted between the Axon software and our platform is encrypted via TLS 1.3. Sensitivity tokens and secrets are brokered using platform-signed JWTs and encrypted at rest using AES-256 standards.

2. Local-First Architecture

To ensure maximum security for your proprietary code, Axon's core graph analysis engine runs strictly on your local infrastructure. No source code is ever uploaded to AxonAtlas servers unless explicitly requested for cloud-based collaboration featurs.

3. Infrastructure Protection

Our cloud infrastructure is hosted on ISO 27001 compliant providers (Supabase/AWS) with strict identity and access management (IAM) controls and 24/7 monitoring for anomalous architectural access patterns.

4. Vulnerability Disclosure

If you discover a potential security vulnerability in the Axon platform, please report it immediately to our security team via security@axonatlas.pro. We operate a coordinated disclosure program to ensure system safety.