Trust & Security
Security built in, not bolted on
FoxtInn is engineered by a team with deep Microsoft security and enterprise identity experience. Your data is protected with encryption, strict access controls, continuous monitoring, and compliance-aligned practices from day one.
Trust pillars
Six pillars of the FoxtInn trust model
Encryption everywhere
TLS 1.2+ in transit, AES-256 at rest. Keys managed with AWS KMS and rotated automatically.
Identity & access
Role-based access control, least-privilege by default, multi-factor authentication for every admin user, and SSO on enterprise plans.
Continuous monitoring
Audit logging, anomaly detection, and 24/7 infrastructure monitoring for every tenant.
Zero Trust architecture
Every request is authenticated, authorized, and encrypted. No implicit trust inside the perimeter.
Backup & recovery
Automated daily backups, point-in-time recovery, and tested disaster recovery procedures.
Compliance-aligned
Built to align with SOC 2, GDPR, CCPA, and PCI DSS best practices. SOC 2 Type I in progress.
Detailed controls
What we do to protect your data
Infrastructure
FoxtInn runs on AWS in U.S. regions with multi-AZ redundancy. All production infrastructure is provisioned as code, reviewed, and versioned. Network segmentation isolates customer workloads from administrative planes.
Secure development
Mandatory code review, automated static analysis, dependency scanning, and secret detection in CI. Production changes require peer approval and audit logs.
Logging & auditing
All access to production systems and customer data is logged and retained. Admin actions generate an immutable audit trail available to Enterprise customers.
Vulnerability management
Automated scans of infrastructure and dependencies, regular third-party penetration testing, and a responsible disclosure program at security@foxtcon.com.
Incident response
Documented incident response plan with defined severity levels, 24/7 on-call rotation, and customer notification within 72 hours for confirmed personal data incidents.
Personnel security
Background checks, security training at onboarding and annually, documented access provisioning and deprovisioning, and enforced MFA for all employees.
Compliance roadmap
Where we are on certifications
SOC 2 Type I
In progressTargeting completion Q3 2026.
SOC 2 Type II
PlannedTargeting completion Q1 2027.
GDPR
AlignedDPA available on request.
CCPA / CPRA
AlignedDSAR process in place.
PCI DSS
Out of scopePayments handled by a PCI Level 1 processor; FoxtInn does not store card data.
HIPAA
On requestBAA available for qualified clinical customers.
Need a security review or DPA?
Our team can walk you through controls, share documentation, and sign a data processing agreement tailored to your business.