Security practices for the Axon platform
Last updated: February 16, 2026. This page summarizes controls used to protect customer data and platform integrity.
On this page
Quick links to each section
Security Overview
Axon applies layered technical and operational controls to protect service availability, tenant isolation, and data confidentiality.
Security is built into authentication, authorization, route-level guardrails, audit logging, and operational workflows.
Access and Authentication Controls
Axon supports session-based authentication and multi-factor authentication (MFA), with organization-level policy controls.
Role-based permissions and scoped authorization are used to limit access to the minimum required actions.
Data Protection Controls
We use secure transport, scoped backend access patterns, and tenant-aware data checks designed to prevent cross-organization data access.
Privileged operations are logged to support traceability and security review workflows.
Application Security
State-changing APIs are protected by origin checks, app-check verification, authenticated identity checks, and payload validation.
Additional safeguards such as rate limiting and abuse controls are used for sensitive endpoints.
Monitoring and Incident Response
We monitor service behavior and investigate suspicious activity, operational failures, and potential security issues.
When required, we notify affected customers in line with legal and contractual obligations.
Customer Responsibilities
Customer organizations are responsible for account hygiene, role assignment, and secure handling of credentials within their teams.
Customers should promptly report suspected compromise, abuse, or unauthorized access.
Report a Security Issue
To report a security concern, contact us using the email listed below with relevant details and reproduction context.
Contact
For legal, privacy, or compliance requests
Email: axon@xdbx.eu
Product URL: https://axon.xdbx.eu
Related docs: Privacy Policy, Data Processing Addendum, Legal Center.
This page is a product-facing legal summary and should be reviewed by your legal counsel for jurisdiction-specific requirements.