Security Practices

Last Updated: February 2026


Overview

At Coax, security is fundamental to our mission of helping organizations manage their SaaS applications. This document describes the technical and organizational security measures we implement to protect your data.

Security Principles

Our security approach is built on:

  1. Defense in Depth: Multiple layers of security controls
  2. Principle of Least Privilege: Access limited to what's necessary
  3. Privacy by Design: Data minimization at every step
  4. Transparency: Clear communication about our practices

Data Encryption

Encryption at Rest

Data TypeEncryption Method
OAuth TokensAES-256-CBC with unique per-record keys
Session DataAES-256-CBC encryption
DatabaseGoogle Cloud SQL encryption (AES-256)
File StorageGoogle Cloud Storage default encryption (AES-256)
BackupsEncrypted with Google-managed keys

Key Management:

  • Encryption keys stored separately from encrypted data
  • Keys managed via Google Cloud Secret Manager
  • Regular key rotation procedures

Encryption in Transit

ConnectionProtocol
User to ApplicationTLS 1.3 (HTTPS enforced)
Application to DatabaseTLS encrypted connection
Application to APIsTLS 1.2+ for all external APIs
Internal ServicesTLS encrypted service mesh

Certificate Management:

  • Certificates automatically managed and renewed
  • HSTS headers enforced
  • Modern cipher suites only

Authentication & Access Control

User Authentication

  • OAuth 2.0: Authentication via Microsoft Entra ID (formerly Azure AD)
  • No Password Storage: We never store user passwords
  • Token Security: Access tokens encrypted at rest, short-lived (24 hours)
  • Session Management: Secure HttpOnly cookies, automatic expiration

Authorization

ControlImplementation
Role-Based Access ControlDefined user roles with specific permissions
Organization IsolationMulti-tenant data separation at database level
API AuthenticationJWT tokens with organization context
Admin AccessElevated permissions for organization administrators

Internal Access Control

  • Employee Access: Strictly limited to operational necessity
  • Production Access: Requires approval and is logged
  • Vendor Access: No direct access to customer data
  • Audit Logging: All administrative actions logged

Infrastructure Security

Cloud Platform

We host our infrastructure on Google Cloud Platform (GCP), leveraging their enterprise security:

ComponentGCP ServiceSecurity Features
ApplicationCloud RunContainer isolation, automatic patching
DatabaseCloud SQL (PostgreSQL)Private networking, encryption, backups
File StorageCloud StorageIAM access control, encryption
SecretsSecret ManagerEncrypted storage, audit logging
SchedulingCloud SchedulerIAM authentication

Data Location: Primary infrastructure in europe-west1 (Belgium, EU)

Network Security

  • Virtual Private Cloud: Application components in private network
  • Firewall Rules: Ingress restricted to necessary ports only
  • DDoS Protection: Google Cloud Armor protection
  • No Public IPs: Backend services not directly internet-accessible

Container Security

  • Managed Runtime: Cloud Run managed environment
  • Automatic Updates: Security patches applied by Google
  • Minimal Images: Reduced attack surface
  • Resource Isolation: Container-level isolation

Application Security

Secure Development

PracticeDescription
Code ReviewAll changes require peer review
Dependency ScanningAutomated vulnerability scanning
Static AnalysisLinting and type checking enforced
TestingAutomated test suite before deployment

Input Validation

  • Zod Schemas: All API inputs validated with strict schemas
  • SQL Injection Prevention: Parameterized queries via Prisma ORM
  • XSS Prevention: React's built-in escaping, Content Security Policy
  • CSRF Protection: Token-based protection on state-changing operations

API Security

  • Rate Limiting: Protection against abuse
  • Input Size Limits: Maximum payload sizes enforced
  • Error Handling: Generic error messages to users (details logged internally)
  • CORS: Restricted to authorized origins

Data Protection

Data Minimization

We collect only the data necessary to provide our service:

Data CategoryWhat We CollectWhat We DON'T Collect
EmailMetadata (subject, sender, date)Email body content
DirectoryBusiness contact infoPersonal addresses, SSNs
ActivitySign-in eventsDetailed browsing history
InvoicesBilling amounts, datesFull invoice imagery stored

Data Retention

Data TypeRetention Period
Account DataDuration of account + 30 days
Organization DataDuration of subscription + 30 days
Analytics12 months
Logs30 days

Data Deletion

  • User Request: Data deleted within 30 days of verified request
  • Account Termination: Data deleted within 30 days after export period
  • Secure Deletion: Data securely wiped, not just marked deleted

Monitoring & Incident Response

Security Monitoring

CapabilityImplementation
LoggingCentralized logging of all system events
AlertingReal-time alerts for suspicious activity
Error TrackingAutomated error detection and notification
Uptime MonitoringService availability monitoring

Incident Response

Response Process:

  1. Detection: Automated monitoring or reported incident
  2. Triage: Assess severity and scope
  3. Containment: Isolate affected systems
  4. Investigation: Determine root cause
  5. Remediation: Fix vulnerability and restore service
  6. Notification: Notify affected parties per DPA requirements
  7. Post-Mortem: Document lessons learned

Notification Timeline:

  • Customer notification: Within 48 hours of confirmed breach
  • Regulatory notification: As required by GDPR (72 hours)

Contact for Security Incidents

Email: security@coaxsecurity.com

Include:

  • Description of the incident
  • Time of discovery
  • Systems or data involved
  • Your contact information

Compliance

Current Compliance

StandardStatus
GDPRCompliant
Danish Data Protection ActCompliant
Microsoft Graph API PoliciesCompliant

Compliance Roadmap

CertificationStatusTimeline
SOC 2 Type IIPlanned2026-2027
ISO 27001PlannedFuture

We are actively working toward formal security certifications. Contact us for current security assessment reports or to complete vendor security questionnaires.


Vendor Security

Subprocessor Assessment

All third-party vendors undergo security review:

  • Security practices evaluation
  • Privacy policy review
  • DPA requirements verification
  • Compliance certification check (SOC 2, ISO 27001)

Current Subprocessors

See our Subprocessor List for details on each vendor's security posture.


Responsible Disclosure

We appreciate the security research community's efforts to improve security. If you discover a security vulnerability:

How to Report

Email: security@coaxsecurity.com

Include:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Your contact information (optional for anonymous reports)

Our Commitment

  • Acknowledgment: We'll acknowledge receipt within 48 hours
  • Investigation: We'll investigate and provide updates
  • No Retaliation: We won't pursue legal action against good-faith researchers
  • Recognition: With your permission, we'll credit you in our changelog

Scope

In Scope:

  • coaxsecurity.com and subdomains
  • Coax application and API
  • Authentication flows

Out of Scope:

  • Third-party services (report directly to them)
  • Social engineering attacks
  • Physical security
  • Denial of service testing

Security FAQs

Do you store my Microsoft 365 password?

No. We use OAuth 2.0, so you authenticate directly with Microsoft. We receive an access token, never your password.

Do you read my emails?

We search email metadata (subject, sender, date) from known SaaS vendors only. We do NOT read or store email body content. Emails are processed in-memory for billing detection and immediately discarded.

Where is my data stored?

Primary data is stored in Google Cloud Platform's Belgium (europe-west1) region within the EU.

Who at Coax can access my data?

Only authorized personnel with a legitimate operational need can access production systems. All access is logged and audited.

What happens if Coax is acquired?

Your data will be handled according to the Terms of Service and Data Processing Agreement. You would be notified of any ownership change.


Contact

For security questions or concerns:

Security Team: security@coaxsecurity.com

Privacy Team: privacy@coaxsecurity.com

General Legal: legal@coaxsecurity.com


This Security Practices document is also available at: https://coaxsecurity.com/legal/security