Security & Compliance
Enterprise-grade security built into every layer of the platform
Data handling & isolation
Every customer's data is completely isolated at the infrastructure level. Multi-tenant architecture ensures strict boundaries between customer environments, with no cross-tenant data access possible.
- Logical and physical data separation per tenant
- Dedicated encryption keys per customer
- Network-level isolation and segmentation
- Data residency controls for geographic compliance
Encryption & access control
All document data is encrypted both in transit and at rest using industry-standard protocols. Access is controlled through role-based permissions and fine-grained policies.
Encryption
- TLS 1.3 for data in transit
- AES-256 encryption at rest
- Key management via secure vaults
- Certificate pinning for API connections
Access control
- Role-based access control (RBAC)
- Multi-factor authentication (MFA)
- API key management and rotation
- IP allowlisting and restrictions
Audit logs & traceability
Complete visibility into every action taken on documents and within the platform. Immutable audit logs provide full traceability for compliance and security monitoring.
- Comprehensive audit trails for all document operations
- User activity logging and access history
- API call logging with request/response metadata
- Real-time security event monitoring
- Exportable logs for compliance reporting
Compliance posture
Doxentis is designed with compliance requirements in mind, following privacy-by-design principles and maintaining security best practices.
Data protection
- GDPR-ready architecture
- Data processing agreements (DPAs)
- Right to deletion and data portability
- Privacy impact assessments
Security standards
- SOC 2 Type II compliance
- Regular security audits and penetration testing
- Vulnerability management program
- Incident response procedures
Note: Specific compliance certifications and attestations are subject to ongoing audits. Contact us for the latest compliance documentation and security questionnaires.
Have security questions?
Request our security documentation, compliance reports, or schedule a security review.