Skip to main content
All Systems Operational

Security & Compliance

Technical documentation of Waxell's security architecture, controls, and compliance posture.

AES-256-GCMEncryption at Rest
TLS 1.3Encryption in Transit
AWS KMSKey Management
SOC 2 Type IIIn Progress

Encryption Architecture

Encryption at Rest

AlgorithmAES-256-GCM
Key ManagementAWS KMS (FIPS 140-2 Level 3)
Key HierarchyEnvelope encryption with per-tenant DEKs
Key RotationAutomatic, annual (configurable)
DatabaseRDS encryption + field-level encryption
Object StorageS3 SSE-KMS with bucket keys
BackupsEncrypted with separate backup keys

Encryption in Transit

ProtocolTLS 1.3 (TLS 1.2 minimum)
Cipher SuitesAEAD only (GCM, ChaCha20-Poly1305)
Certificate AuthorityAWS ACM (auto-renewal)
HSTSEnabled, max-age=31536000, includeSubDomains
Internal TrafficmTLS between services

Field-Level Encryption

PII and sensitive data is encrypted at the application layer before database storage. Each field uses a unique data encryption key (DEK) wrapped by tenant-specific KMS keys.

# Sensitive fields are encrypted at the application layer
# before reaching the database using AWS KMS envelope encryption

encrypted_fields = [
"user.email",
"user.phone",
"agent.api_keys",
"workflow.input_data",
"workflow.output_data",
"audit.request_body",
]

# Each tenant has isolated KMS keys
# Key rotation: automatic, every 365 days
# Key deletion: 7-day waiting period enforced

Network & Compute Security

Network Architecture

Cloud ProviderAWS (primary)
Regionsus-east-1, eu-west-1
VPC IsolationDedicated VPC per environment
SubnetsPublic, Private, Isolated (DB)
NATManaged NAT Gateway (HA)
DNSRoute53 with DNSSEC

Edge Security

CDNCloudFront (all edges)
DDoS ProtectionAWS Shield Standard
WAFAWS WAF v2 with managed rules
Rate LimitingPer-IP and per-tenant limits
Bot ProtectionAWS WAF Bot Control
Geo BlockingConfigurable per tenant

Compute Security

Container RuntimeECS Fargate (serverless)
No SSH AccessImmutable infrastructure
Image ScanningECR scanning on push
SecretsAWS Secrets Manager
IAMTask-level roles, least privilege
PatchingAutomated via CI/CD

Network Flow


┌─────────────────────────────────────────────────────────────────────────────┐
│                              INTERNET                                        │
└─────────────────────────────────────────────────────────────────────────────┘
                                    │
                                    ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│  CloudFront (CDN + WAF + Shield)                                            │
│  ├─ TLS 1.3 termination                                                     │
│  ├─ AWS WAF rules (OWASP, rate limits, bot control)                        │
│  └─ Geographic restrictions                                                 │
└─────────────────────────────────────────────────────────────────────────────┘
                                    │
                                    ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│  Application Load Balancer (Private Subnets)                                │
│  ├─ mTLS to backend services                                                │
│  └─ Health checks, connection draining                                      │
└─────────────────────────────────────────────────────────────────────────────┘
                                    │
                                    ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│  ECS Fargate Services (Private Subnets)                                     │
│  ├─ API Gateway    ├─ Agent Runtime    ├─ Workflow Engine                  │
│  └─ No public IPs, egress via NAT Gateway                                  │
└─────────────────────────────────────────────────────────────────────────────┘
                                    │
                                    ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│  Data Layer (Isolated Subnets - No Internet Access)                         │
│  ├─ RDS PostgreSQL (Multi-AZ, encrypted)                                   │
│  ├─ ElastiCache Redis (encrypted, auth token)                              │
│  └─ S3 (VPC endpoint, no public access)                                    │
└─────────────────────────────────────────────────────────────────────────────┘
            

Authentication & Authorization

Authentication

ProtocolOAuth 2.0 / OpenID Connect
SSO SupportSAML 2.0, OIDC (Okta, Azure AD, Google)
MFATOTP, WebAuthn/FIDO2, SMS (optional)
MFA EnforcementConfigurable per org (required for admin)
Session Duration24h default, configurable 1h-7d
Session BindingIP + User-Agent fingerprint
Password Policy12+ chars, complexity, breach check
Brute Force ProtectionAccount lockout after 5 failures

API Authentication

API KeysSHA-256 hashed, prefix visible
Key ScopesRead, Write, Admin (granular)
Key RotationNo expiry, manual rotation
JWT TokensRS256, 15min access, 7d refresh
Rate LimitsPer-key, configurable

Authorization

ModelRBAC + ABAC hybrid
Default RolesOwner, Admin, Developer, Viewer
Custom RolesSupported (Enterprise)
Resource ScopingOrg → Project → Agent → Workflow
Policy EvaluationDeny-by-default, explicit grants

User Provisioning

SCIM 2.0Supported (Okta, Azure AD)
JIT ProvisioningVia SAML/OIDC attributes
Group SyncIdP groups → Waxell roles
DeprovisioningImmediate on IdP removal

Agent & Model Security

Data Isolation

Tenant IsolationLogical isolation at DB level
Agent SandboxingPer-execution container isolation
Context BoundariesNo cross-tenant data in prompts
Memory IsolationAgent memory scoped to tenant

Model Provider Security

Training DataNever used for training
Data Retention0-day retention (API agreements)
ProvidersOpenAI, Anthropic (enterprise)
BYOKBring your own API keys supported

Prompt Security

Injection DetectionMulti-layer input validation
Output FilteringPII detection, content filtering
GuardrailsConfigurable output constraints
Token BudgetsPer-agent, per-workflow limits
Zero Training Guarantee

Your data is never used to train any AI models. We maintain enterprise agreements with all LLM providers (OpenAI, Anthropic) that contractually prohibit training on customer data. All prompts and completions are ephemeral and not retained by providers.

Audit Logging & Monitoring

Audit Logs

CoverageAll API calls, auth events, admin actions
FormatStructured JSON (CloudWatch Logs)
Retention90 days hot, 1 year cold (S3)
ImmutabilityS3 Object Lock (compliance mode)
ExportSIEM integration (Splunk, Datadog)

Logged Events

  • Authentication (login, logout, MFA, SSO)
  • Authorization (permission grants, denials)
  • Resource CRUD (agents, workflows, policies)
  • Agent executions (start, complete, fail)
  • API key operations (create, rotate, revoke)
  • Admin actions (user management, settings)
  • Data access (exports, bulk operations)

Security Monitoring

SIEMAWS Security Hub + GuardDuty
AlertingPagerDuty integration
Anomaly DetectionML-based (GuardDuty)
Vulnerability ScanningAWS Inspector (continuous)

Alert Triggers

  • Failed login attempts (threshold)
  • Privilege escalation attempts
  • Unusual API patterns
  • Data exfiltration indicators
  • Infrastructure anomalies
  • Certificate expiration warnings

Certifications & Standards

In Progress

SOC 2 Type II

Independent audit of security, availability, and confidentiality controls. Audit in progress with expected completion Q2 2026.

Auditor: TBD
Expected: Q2 2026
Trust Services: Security, Availability, Confidentiality
Active

GDPR

Full compliance with EU General Data Protection Regulation. DPA available for all customers.

Data Processing Agreement: Available
EU Data Residency: eu-west-1 (Ireland)
DPO Contact: dpo@waxell.ai
Active

CCPA

California Consumer Privacy Act compliance for US operations.

Privacy Policy: Updated Jan 2026
Data Deletion: Within 45 days
Do Not Sell: We do not sell personal data
Planned

ISO 27001

Information Security Management System certification planned for 2026.

Target: Q4 2026
Scope: Full platform

Business Continuity & Disaster Recovery

Availability

SLA Target99.9% uptime
ArchitectureMulti-AZ (3 availability zones)
DatabaseRDS Multi-AZ with auto-failover
Load BalancingCross-AZ with health checks
Status Pagestatus.waxell.ai

Disaster Recovery

RPO< 1 hour (point-in-time recovery)
RTO< 4 hours
Backup FrequencyContinuous (transaction logs)
Backup Retention35 days (automated snapshots)
Cross-RegionDaily replication to DR region
DR TestingQuarterly failover drills

Security Incident Handling

Response SLAs

Critical (P1)15 min acknowledgment, 1 hour update
High (P2)1 hour acknowledgment, 4 hour update
Medium (P3)4 hour acknowledgment, 24 hour update
Low (P4)24 hour acknowledgment

Notification

Affected customers are notified within 72 hours of confirmed breach per GDPR requirements. Status updates posted to status.waxell.ai during active incidents.

Vulnerability Disclosure

Report Tosecurity@waxell.ai
PGP KeyAvailable on request
Response Time24 hours acknowledgment
Safe HarborGood faith researchers protected

Scope

  • *.waxell.ai, *.waxell.dev
  • API endpoints
  • SDK packages (PyPI)

Data Handling & Retention

Data Categories

Account DataEmail, name, org info
Usage DataAPI calls, feature usage
Agent DataDefinitions, configurations
Execution DataInputs, outputs, logs
Workflow StateCheckpoints, context

Retention Periods

Account DataDuration of service + 30 days
Execution Logs90 days (configurable)
Audit Logs1 year
Backups35 days
Post-DeletionPurged within 30 days

Data Subject Rights

  • Access: Export all data via API or dashboard
  • Rectification: Update account data anytime
  • Erasure: Full deletion within 30 days of request
  • Portability: JSON export of all data
  • Objection: Opt-out of non-essential processing

Submit requests to privacy@waxell.ai or via dashboard settings.

Subprocessors

AWSInfrastructure (US, EU)
OpenAILLM inference (0-day retention)
AnthropicLLM inference (0-day retention)
StripePayment processing

Full subprocessor list available in DPA. 30-day notice for changes.

Security Documentation

Request access to security documentation for your review.

PDF

Security Whitepaper

Detailed technical overview of security architecture

Request Access →
PDF

Data Processing Agreement

Standard DPA for GDPR compliance

Request Access →
PDFComing Soon

SOC 2 Type II Report

Independent audit report

Available Q2 2026

Not Yet Available
PDF

Penetration Test Summary

Latest third-party pentest results

Under NDA

Request Access →
XLSX

Security Questionnaire

Pre-filled SIG Lite / CAIQ

Request Access →
PDF

Subprocessor List

Current list of data subprocessors

Request Access →

Security Team Contact

For security reviews, questionnaires, or to report a vulnerability.

Security Teamsecurity@waxell.ai
Data Protection Officerdpo@waxell.ai
Privacy Requestsprivacy@waxell.ai