Security

Your code and data security is our top priority. FixVion implements enterprise-grade security measures to protect your code, data, and privacy throughout the entire code analysis process. Learn how we safeguard your information with industry-leading security practices.

Last Updated: January 27, 2025

1. Data Encryption & Code Protection

We employ multiple layers of encryption to protect your code and data at every stage of the analysis process:

1.1. Encryption in Transit:

  • TLS/SSL Encryption: All data transmitted between your device and our servers is encrypted using TLS 1.3, the latest and most secure transport layer security protocol
  • Perfect Forward Secrecy: We use cipher suites that provide perfect forward secrecy, ensuring that past communications remain secure even if encryption keys are compromised in the future
  • Certificate Pinning: Our mobile applications use certificate pinning to prevent man-in-the-middle attacks
  • HTTPS Everywhere: All connections to our Service are forced over HTTPS with HSTS (HTTP Strict Transport Security) headers

1.2. Encryption at Rest:

  • AES-256 Encryption: All code files and data stored on our servers are encrypted using AES-256, the industry standard for data encryption
  • Encryption Key Management: Encryption keys are managed through secure key management systems with automatic key rotation
  • Database Encryption: All databases are encrypted at rest, including backups and replicas
  • File System Encryption: Our storage systems use encrypted file systems to protect data even at the disk level

1.3. Code Privacy & Isolation:

  • Complete Privacy: Your code is completely private and confidential. We never share, sell, or disclose your code to third parties
  • Isolated Storage: Each user's code is stored in isolated, secure environments with strict access boundaries
  • No Code Reuse: We do not use your code for training AI models, improving algorithms, or any purpose other than providing the analysis services you request
  • Immediate Deletion: You can delete your code at any time, and it will be permanently removed from our systems within 30 days
  • Secure Processing: Code analysis is performed in isolated, sandboxed environments to prevent any data leakage

1.4. Data Backup & Recovery:

  • All backups are encrypted using the same AES-256 encryption standards
  • Backups are stored in geographically distributed, secure locations
  • Regular backup testing ensures data recoverability without compromising security

2. Access Controls & Authentication

We implement comprehensive access controls and authentication mechanisms to ensure only authorized users can access your account and data:

2.1. User Authentication:

  • Multi-Factor Authentication (MFA): We strongly recommend and support MFA for all accounts, including:
    • Time-based one-time passwords (TOTP) via authenticator apps
    • SMS-based verification codes
    • Hardware security keys (FIDO2/WebAuthn)
    • Email verification for account recovery
  • Strong Password Requirements: We enforce password complexity requirements and regular password updates
  • Password Hashing: All passwords are hashed using bcrypt with salt, ensuring they cannot be recovered even if our database is compromised
  • Session Management: Secure session tokens with automatic expiration and refresh mechanisms
  • Account Lockout: Automatic account lockout after multiple failed login attempts to prevent brute-force attacks

2.2. Role-Based Access Control (RBAC):

  • Granular permission system that restricts access based on user roles and responsibilities
  • Team and organization-level access controls for enterprise customers
  • Principle of least privilege: users only have access to the minimum resources necessary for their role
  • Regular access reviews to ensure permissions remain appropriate

2.3. API Security:

  • API Key Management: Secure API key generation, rotation, and revocation
  • OAuth 2.0: Support for OAuth 2.0 authentication for third-party integrations
  • Rate Limiting: API rate limiting to prevent abuse and ensure service availability
  • Request Signing: API requests are signed to prevent tampering and ensure authenticity

2.4. Employee Access Controls:

  • All employees undergo background checks and security training
  • Strict access controls ensure employees can only access data necessary for their job functions
  • All employee access is logged, monitored, and regularly audited
  • Employees sign confidentiality agreements and are bound by strict data protection policies
  • Access is immediately revoked when employees leave the company

3. Infrastructure & Network Security

Our infrastructure is built on secure, compliant cloud platforms with multiple layers of network and system security:

3.1. Network Security:

  • Firewalls: Multi-layer firewall protection with strict ingress and egress rules
  • DDoS Protection: Advanced DDoS mitigation services that protect against volumetric, protocol, and application-layer attacks
  • Intrusion Detection & Prevention (IDS/IPS): Real-time monitoring and automated blocking of suspicious network activity
  • Network Segmentation: Isolated network segments to limit the impact of potential security breaches
  • VPN & Secure Connections: All administrative access requires VPN connections with multi-factor authentication

3.2. Server & Application Security:

  • Regular Security Updates: Automated patching and regular security updates for all systems and applications
  • Hardened Systems: Servers are hardened according to industry best practices and security benchmarks
  • Vulnerability Scanning: Regular automated vulnerability scans to identify and remediate security issues
  • Container Security: Secure containerization with image scanning and runtime protection
  • Secure Configuration: All systems are configured following security hardening guidelines

3.3. Cloud Infrastructure:

  • Hosted on industry-leading cloud platforms with built-in security features
  • Geographic redundancy and disaster recovery capabilities
  • Compliance with cloud provider security standards and certifications
  • Regular security assessments of cloud infrastructure

3.4. Secure Development Practices:

  • Secure Coding Standards: All code follows secure coding practices and undergoes security reviews
  • Code Analysis: Automated security scanning of our own codebase (we use our own tools!)
  • Dependency Management: Regular updates and scanning of third-party dependencies for known vulnerabilities
  • Security Testing: Regular penetration testing and security audits by internal and external security teams

4. Security Operations & Monitoring

We maintain 24/7 security monitoring and rapid incident response capabilities to protect against threats:

4.1. Continuous Monitoring:

  • Security Information and Event Management (SIEM): Centralized logging and analysis of all security events across our infrastructure
  • Real-Time Alerts: Automated alerts for suspicious activities, unauthorized access attempts, and security anomalies
  • Log Aggregation: Comprehensive logging of all system activities, access attempts, and security events
  • Threat Intelligence: Integration with threat intelligence feeds to stay ahead of emerging threats
  • Behavioral Analysis: Machine learning-based anomaly detection to identify unusual patterns

4.2. Incident Response:

  • Incident Response Team: Dedicated security team available 24/7 to respond to security incidents
  • Response Procedures: Well-documented incident response procedures with defined escalation paths
  • Rapid Containment: Ability to quickly isolate and contain security threats
  • Forensic Analysis: Detailed forensic analysis capabilities to understand and learn from security incidents
  • Communication: Transparent communication with affected users in the event of a security incident

4.3. Security Testing & Audits:

  • Penetration Testing: Regular external penetration testing by certified security professionals
  • Red Team Exercises: Simulated attack scenarios to test our security defenses
  • Security Audits: Regular internal and external security audits
  • Bug Bounty Program: Ongoing bug bounty program to encourage responsible disclosure of security vulnerabilities
  • Compliance Audits: Regular compliance audits to ensure adherence to security standards

4.4. Business Continuity:

  • Comprehensive disaster recovery plans with regular testing
  • Geographic redundancy to ensure service availability
  • Regular backup and recovery testing
  • Service level agreements (SLAs) for uptime and availability

5. Compliance & Certifications

We maintain compliance with industry-leading security standards and regulations:

5.1. Security Certifications:

  • SOC 2 Type II: Certified for security, availability, processing integrity, confidentiality, and privacy
  • ISO 27001: Information security management system certification
  • ISO 27017: Cloud security controls certification
  • ISO 27018: Protection of personally identifiable information in the cloud
  • Regular Audits: Annual third-party security audits and assessments

5.2. Regulatory Compliance:

  • GDPR: Full compliance with the General Data Protection Regulation for European users
  • CCPA: Compliance with the California Consumer Privacy Act
  • HIPAA: Available for healthcare organizations requiring HIPAA compliance (Enterprise plans)
  • PCI DSS: Compliance with Payment Card Industry Data Security Standard for payment processing

5.3. Data Processing Agreements:

  • We provide Data Processing Agreements (DPAs) for enterprise customers
  • Standard Contractual Clauses (SCCs) for international data transfers
  • Custom compliance documentation for regulated industries

5.4. Transparency & Reporting:

  • Regular security reports and compliance status updates
  • Transparent security incident reporting
  • Public security documentation and best practices
  • Regular updates on security improvements and enhancements

6. Security Reporting & Best Practices

6.1. Reporting Security Vulnerabilities:

We take security seriously and encourage responsible disclosure of security vulnerabilities. If you discover a security issue, please report it to us immediately:

  • Email: security@fixvion.com
  • Response Time: We acknowledge security reports within 24 hours and provide regular updates on remediation progress
  • Bug Bounty: We offer rewards for valid security vulnerabilities through our bug bounty program
  • Confidentiality: We request that you keep security vulnerabilities confidential until we have addressed them

6.2. Security Best Practices for Users:

While we implement comprehensive security measures, you also play an important role in keeping your account secure:

  • Enable Multi-Factor Authentication: Always enable MFA on your account for an additional layer of security
  • Use Strong Passwords: Create unique, complex passwords and consider using a password manager
  • Regular Updates: Keep your devices and browsers updated with the latest security patches
  • Secure Networks: Avoid using public Wi-Fi networks when accessing your account
  • Monitor Account Activity: Regularly review your account activity and report any suspicious behavior
  • API Key Security: Keep your API keys secure and rotate them regularly
  • Be Cautious with Links: Verify the authenticity of emails and links before clicking

6.3. Security Resources:

  • Regular security blog posts and updates on our security practices
  • Security advisories for any known issues or vulnerabilities
  • Security documentation and guides for developers
  • Security training resources for enterprise customers

Security is an ongoing commitment. We continuously invest in improving our security measures to protect your code and data.

Your trust is our most valuable asset, and we work tirelessly to earn and maintain it.