Security

Last updated: August 2025


1. Overview

Fruxon is built with a security-by-design approach. We combine strong data protection controls, least-privilege access, continuous monitoring, and a documented incident response program to safeguard your data. Our goal is to be **SLA-ready** and **audit-friendly** for teams operating in production.

2. Data Encryption
3. Network & Infrastructure Security
4. Application Security
5. Secure Development Lifecycle
6. Vulnerability Management & Patching
7. Identity & Access Management
8. Logging, Monitoring & Alerting
9. Business Continuity & Disaster Recovery
10. Incident Response

We maintain an incident response plan covering triage, containment, eradication, recovery, and post-incident review. Where required, we notify customers and/or authorities.

11. Compliance & Trust

See: Privacy Policy · DPA · Subprocessors.

12. Subprocessors & Data Transfers

We engage carefully selected subprocessors to provide hosting, analytics, and other services. Each subprocessor is subject to contractual obligations to safeguard data and follow our instructions.

Current list: /subprocessors.

13. Responsible Disclosure

We welcome reports from security researchers. If you believe you’ve found a vulnerability, please email us with details and reproduction steps. Do not access or modify data that does not belong to you, and avoid any actions that could degrade service.

Report issues to security@fruxon.com. If you need to encrypt your message, request our PGP key in that email.

14. Contact

For security questions, incident notifications, or compliance inquiries, contact: security@fruxon.com.