Last Updated: February 2026
At Coax, security is fundamental to our mission of helping organizations manage their SaaS applications. This document describes the technical and organizational security measures we implement to protect your data.
Our security approach is built on:
| Data Type | Encryption Method |
|---|---|
| OAuth Tokens | AES-256-CBC with unique per-record keys |
| Session Data | AES-256-CBC encryption |
| Database | Google Cloud SQL encryption (AES-256) |
| File Storage | Google Cloud Storage default encryption (AES-256) |
| Backups | Encrypted with Google-managed keys |
Key Management:
| Connection | Protocol |
|---|---|
| User to Application | TLS 1.3 (HTTPS enforced) |
| Application to Database | TLS encrypted connection |
| Application to APIs | TLS 1.2+ for all external APIs |
| Internal Services | TLS encrypted service mesh |
Certificate Management:
| Control | Implementation |
|---|---|
| Role-Based Access Control | Defined user roles with specific permissions |
| Organization Isolation | Multi-tenant data separation at database level |
| API Authentication | JWT tokens with organization context |
| Admin Access | Elevated permissions for organization administrators |
We host our infrastructure on Google Cloud Platform (GCP), leveraging their enterprise security:
| Component | GCP Service | Security Features |
|---|---|---|
| Application | Cloud Run | Container isolation, automatic patching |
| Database | Cloud SQL (PostgreSQL) | Private networking, encryption, backups |
| File Storage | Cloud Storage | IAM access control, encryption |
| Secrets | Secret Manager | Encrypted storage, audit logging |
| Scheduling | Cloud Scheduler | IAM authentication |
Data Location: Primary infrastructure in europe-west1 (Belgium, EU)
| Practice | Description |
|---|---|
| Code Review | All changes require peer review |
| Dependency Scanning | Automated vulnerability scanning |
| Static Analysis | Linting and type checking enforced |
| Testing | Automated test suite before deployment |
We collect only the data necessary to provide our service:
| Data Category | What We Collect | What We DON'T Collect |
|---|---|---|
| Metadata (subject, sender, date) | Email body content | |
| Directory | Business contact info | Personal addresses, SSNs |
| Activity | Sign-in events | Detailed browsing history |
| Invoices | Billing amounts, dates | Full invoice imagery stored |
| Data Type | Retention Period |
|---|---|
| Account Data | Duration of account + 30 days |
| Organization Data | Duration of subscription + 30 days |
| Analytics | 12 months |
| Logs | 30 days |
| Capability | Implementation |
|---|---|
| Logging | Centralized logging of all system events |
| Alerting | Real-time alerts for suspicious activity |
| Error Tracking | Automated error detection and notification |
| Uptime Monitoring | Service availability monitoring |
Response Process:
Notification Timeline:
Email: security@coaxsecurity.com
Include:
| Standard | Status |
|---|---|
| GDPR | Compliant |
| Danish Data Protection Act | Compliant |
| Microsoft Graph API Policies | Compliant |
| Certification | Status | Timeline |
|---|---|---|
| SOC 2 Type II | Planned | 2026-2027 |
| ISO 27001 | Planned | Future |
We are actively working toward formal security certifications. Contact us for current security assessment reports or to complete vendor security questionnaires.
All third-party vendors undergo security review:
See our Subprocessor List for details on each vendor's security posture.
We appreciate the security research community's efforts to improve security. If you discover a security vulnerability:
Email: security@coaxsecurity.com
Include:
In Scope:
Out of Scope:
No. We use OAuth 2.0, so you authenticate directly with Microsoft. We receive an access token, never your password.
We search email metadata (subject, sender, date) from known SaaS vendors only. We do NOT read or store email body content. Emails are processed in-memory for billing detection and immediately discarded.
Primary data is stored in Google Cloud Platform's Belgium (europe-west1) region within the EU.
Only authorized personnel with a legitimate operational need can access production systems. All access is logged and audited.
Your data will be handled according to the Terms of Service and Data Processing Agreement. You would be notified of any ownership change.
For security questions or concerns:
Security Team: security@coaxsecurity.com
Privacy Team: privacy@coaxsecurity.com
General Legal: legal@coaxsecurity.com
This Security Practices document is also available at: https://coaxsecurity.com/legal/security