🛡️ Trust & Transparency

FluxCybers Trust Center

Everything you need for enterprise due diligence: compliance posture, security controls, sub-processor list, and downloadable compliance documentation.

Last reviewed: April 2026 — SOC 2 readiness assessment complete
94%
Controls Implemented
Mapped to AICPA Trust Service Criteria
5/5
TSC Categories
Security · Availability · Integrity · Confidentiality · Privacy
AES-256
Encryption Standard
GCM mode for all credentials & tokens at rest
99.9%
SLA Uptime
Enterprise tier with real-time failover

Detect · Respond · Prove

Three pillars that define how FluxCybers protects your infrastructure — and provides evidence when you need it.

🔍
DETECT
AI-powered behavioral analysis, real-time anomaly detection, and IP reputation cross-referencing across all monitored infrastructure. The Neutralizer Engine identifies threats within milliseconds using Threat DNA analysis.
RESPOND
Automated containment via Network Quarantine isolates threats instantly. 7-stage execution pipeline with atomic checkpoints ensures automatic rollback if any operation fails. Average response time: <15 minutes for confirmed incidents.
📋
PROVE
Cryptographic audit trail with hash-chained log entries creates tamper-evident evidence for every operation. Real-time streaming captures immutable execution records for compliance, legal, and audit purposes.

Downloadable Compliance Documentation

Professional compliance documents for your due diligence process, vendor assessments, and procurement reviews.

🔐
SOC 2 Compliance
Type I Readiness Assessment
April 2026 v1.0 📄 8 pages
Comprehensive mapping of FluxCybers' existing controls to the AICPA Trust Service Criteria. Covers all 5 TSC categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy — with individual control status and remediation roadmap.
Download PDF
🛡️
Security Architecture
Security Whitepaper
April 2026 v1.0 📄 8 pages
Deep-dive into FluxCybers' security architecture: cryptographic audit trail, enterprise encryption stack, Anti-Scraping Suite, Neutralizer Engine (Network Quarantine + Threat DNA), eShield security suite, incident response procedures, and compliance posture.
Download PDF
💬
Need a Custom NDA, DPA, or CAIQ?
Enterprise customers can request a Data Processing Agreement (DPA), custom NDA, or CSA CAIQ response. Contact our team or email security@fluxcybers.polsia.app.

Enterprise Security Stack

Every layer of the FluxCybers platform is protected by purpose-built security controls designed for enterprise workloads.

🔑
AES-256-GCM Encryption
All SSH credentials, API keys, and OAuth tokens encrypted at rest using AES-256-GCM with unique IVs per operation. Keys stored separately from encrypted data.
✓ Implemented
📱
2FA / MFA Authentication
TOTP-based two-factor authentication (RFC 6238) with QR provisioning. Backup codes stored with bcrypt hashing. MFA policy enforcement for Enterprise accounts.
✓ Implemented
🌐
IP Allowlisting
Per-account IP allowlist enforced on every authenticated request. CIDR range support. All allowlist changes logged with before/after state in the audit trail.
✓ Implemented
🛡️
Brute-Force Protection
5 failed attempts per 15-minute window per IP. Exponential backoff progressive delay. Account lockout at 10 failures. Distributed rate limiting via Redis.
✓ Implemented
🔒
TLS 1.2/1.3 + HSTS
Enforced TLS with 1-year HSTS max-age and includeSubDomains. Cloudflare TLS termination. No HTTP fallback. Certificate monitoring with auto-renewal.
✓ Implemented
🧬
CSRF & Injection Protection
CSRF tokens for state-changing operations. OWASP Top 10 WAF ruleset via eShield. Parameterized queries (no raw SQL). Content Security Policy enforced.
✓ Implemented
📊
Immutable Audit Trail
Hash-chained log entries for tamper-evident evidence. Real-time SSE streaming of execution output. 90-day hot storage + 7-year cold storage retention.
✓ Implemented
Auto-Rollback & Recovery
7-stage pipeline with atomic checkpoints before each destructive operation. Automatic rollback cascade on failure. Zero-downtime SIGTERM deploy pattern.
✓ Implemented

Compliance Posture

Where FluxCybers stands against major security frameworks and compliance requirements.

🏆
SOC 2 Type I
Readiness assessment complete. Formal attestation with licensed CPA firm scheduled Q3 2026.
⏳ In Progress — Q3 2026
📐
NIST CSF v2.0
94% alignment across all 6 core functions: Govern, Identify, Protect, Detect, Respond, Recover.
✓ 94% Aligned
🎯
CIS Controls v8
88% coverage of Implementation Group 2. 82 of 93 IG1 safeguards fully implemented.
✓ 88% Coverage
🕷️
OWASP Top 10
All 10 vulnerability categories mitigated via eShield WAF rules and secure-by-default coding practices.
✓ All 10 Mitigated
🇪🇺
GDPR / CCPA
Privacy policy published. Data processing controls implemented. DPA available for Enterprise customers on request.
✓ Compliant
🏛️
FedRAMP Alignment
CISA Cybersecurity Performance Goals met. FedRAMP Low/Moderate roadmap being evaluated for Q1 2027.
📋 Roadmap Q1 2027

Infrastructure & Sub-Processor List

All vendors processing data on behalf of FluxCybers customers, along with their certifications and data locations.

Processor Function Certification Data Location Link
Render.com Cloud hosting (web service, worker) ✓ SOC 2 Type II United States (US-East) render.com/security
Neon Tech Managed PostgreSQL database ✓ SOC 2 Type II United States (US-East-2) neon.tech/security
Cloudflare CDN, WAF, DDoS protection, R2 storage ✓ SOC 2 Type II Global (Anycast) cloudflare.com/trust-hub
Hetzner Online SFTP backup storage ✓ ISO 27001 Germany (EU / GDPR) hetzner.com

Last updated: April 2026. Changes to this list will be reflected here within 30 days of addition.

Get in Touch

For security inquiries, responsible disclosure, DPA requests, or enterprise compliance questions.

Security Team
security@fluxcybers.polsia.app
Vulnerability reports, security questions, responsible disclosure. Response within 48 hours.
Legal / DPA
legal@fluxcybers.polsia.app
Data Processing Agreements, NDA requests, GDPR inquiries, and contract compliance.
Enterprise Sales
Contact Form →
Custom compliance requirements, vendor assessments, CAIQ responses, and procurement support.
🔍
Responsible Disclosure Program
We welcome security researchers who identify vulnerabilities in our platform. We commit to 48-hour acknowledgement, 10-business-day resolution timelines, and public credit (with consent) for valid reports. We pledge not to pursue legal action against researchers acting in good faith. Submit reports to security@fluxcybers.polsia.app.

Ready to Deploy on a Secure Foundation?

Military-grade security architecture built in from day one. AES-256-GCM encryption, 2FA, impenetrable audit trails — zero-compromise protection at every layer, no add-ons required.