Security & Compliance

Security you can trust

Your data security is our top priority. We employ industry-leading practices and undergo rigorous third-party audits to ensure your assets are protected.

Compliance

Industry-recognized certifications

We maintain compliance with the highest industry standards to give you confidence in our security posture.

SOC 2 Type II

In Progress

Annual third-party audit of security controls

GDPR

Compliant

EU data protection regulation compliance

ISO 27001

In Progress

Information security management certification

HIPAA

Ready

Healthcare data protection standards

Security

How we protect your data

Multiple layers of security ensure your asset data remains private, secure, and available when you need it.

Data Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Your sensitive information is protected at every stage.

  • AES-256 encryption at rest
  • TLS 1.3 for all data in transit
  • Encrypted database backups
  • Secure key management

Access Control

Granular role-based access control ensures users only see what they need to see.

  • Role-based access control (RBAC)
  • Single Sign-On (SSO) support
  • Native multi-factor auth (MFA)
  • Organization-scoped isolation

Audit Logging

Complete audit trail of all actions for compliance and forensic analysis.

  • Comprehensive action logging
  • Immutable audit records
  • Exportable audit reports
  • Real-time activity monitoring
Data

Your data, your control

We believe you should have complete control over your data. Here is how we handle it responsibly.

Data Ownership

You own your data. We are just the custodians. Export all your data anytime in standard formats.

Data Retention

We retain your data only as long as you need it. Upon account termination, data is securely deleted.

Data Location

By default, data is stored in secure data centers. Regional hosting is available for Pro plans.

Zero Trust Architecture

Every request is authenticated and authorized. We never assume trust based on network location.

FAQ

Security questions

Common questions about our security practices and policies.

How is my data encrypted?

All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3. Database backups are also encrypted.

Do you support Single Sign-On (SSO)?

Yes, we support SSO via SAML 2.0 and OpenID Connect (OIDC) on our Professional plan.

How often do you perform security audits?

We are working towards SOC 2 Type II. We also conduct quarterly penetration tests and continuous scanning.

Do you have a bug bounty program?

We do not currently have a bug bounty program. We plan to launch one at a later stage as our security program matures. In the meantime, if you have discovered a security issue, please report it to security@flottix.app and we will investigate promptly.

Have security questions?

Our security team is here to help. Whether you need our SOC 2 report or have questions about our security practices.