CapexIQ Logo
Features How It Fits Pricing Pilot Program
Start Free Pilot

Security

Last Updated: December 15, 2024

At CapexIQ, security is foundational to everything we do. We understand that your project documents, cost data, and business information are highly sensitive. This page outlines our comprehensive approach to protecting your data.

Enterprise-Grade Security

1. Data Encryption

1.1 Encryption in Transit

All data transmitted between your browser and our servers is protected using:

  • TLS 1.3: The latest Transport Layer Security protocol
  • Perfect Forward Secrecy: Unique session keys prevent retrospective decryption
  • HSTS: HTTP Strict Transport Security enforces secure connections
  • Certificate Transparency: All certificates are logged for verification

1.2 Encryption at Rest

All stored data is encrypted using:

  • AES-256: Advanced Encryption Standard with 256-bit keys
  • Key Management: Hardware Security Modules (HSMs) for key storage
  • Database Encryption: Transparent data encryption for all databases
  • Backup Encryption: All backups are encrypted with separate keys

2. Infrastructure Security

2.1 Cloud Infrastructure

Our platform is hosted on enterprise-grade cloud infrastructure with:

  • SOC 2 Type II Certified: Data centers with audited security controls
  • Geographic Redundancy: Data replicated across multiple availability zones
  • Network Isolation: Virtual private clouds with strict network segmentation
  • DDoS Protection: Automated detection and mitigation of attacks

2.2 Network Security

  • Web Application Firewall (WAF): Protection against common web exploits
  • Intrusion Detection: Real-time monitoring for suspicious activity
  • IP Allowlisting: Available for Enterprise customers
  • Private Connectivity: VPN and private link options for Enterprise Plus

3. Access Control

3.1 Authentication

  • Multi-Factor Authentication (MFA): Required for all accounts
  • Single Sign-On (SSO): SAML 2.0 and OAuth 2.0 support (Enterprise tiers)
  • Password Requirements: Strong password policies enforced
  • Session Management: Automatic timeout and secure session handling

3.2 Role-Based Access Control (RBAC)

Granular permissions allow you to control who can:

  • View, edit, or delete projects
  • Access specific documents or estimates
  • Manage users and permissions
  • Export data and generate reports
  • Configure organization settings

3.3 Administrative Controls

  • User Provisioning: SCIM support for automated user management
  • Access Reviews: Tools to audit and review user permissions
  • Deprovisioning: Immediate access revocation upon termination

4. Audit Trail and Logging

4.1 Comprehensive Audit Logs

We maintain detailed logs of all platform activity:

  • User Actions: Login, logout, document access, estimate creation
  • Administrative Actions: User management, permission changes, settings updates
  • Data Access: Who accessed what data and when
  • Export Events: All data exports are logged

4.2 Log Retention

  • Standard: 90 days of audit log retention
  • Enterprise: 1 year of audit log retention
  • Enterprise Plus: Configurable retention up to 7 years

4.3 Log Access

Authorized administrators can:

  • Search and filter audit logs
  • Export logs for compliance reporting
  • Set up alerts for specific events
  • Integrate with SIEM systems (Enterprise Plus)

5. Data Protection

5.1 Data Isolation

  • Tenant Isolation: Complete separation of customer data
  • Logical Separation: Database-level isolation between organizations
  • Processing Isolation: Dedicated processing resources for document analysis

5.2 Data Retention and Deletion

  • Configurable Retention: Set retention policies per project or organization
  • Secure Deletion: Cryptographic erasure ensures data cannot be recovered
  • Right to Erasure: GDPR-compliant data deletion upon request

5.3 Backup and Recovery

  • Automated Backups: Daily encrypted backups
  • Point-in-Time Recovery: Restore to any point within retention period
  • Geographic Redundancy: Backups stored in separate regions
  • Recovery Testing: Regular backup restoration testing

6. Application Security

6.1 Secure Development

Our development practices include:

  • Security-First Design: Security requirements in all feature specifications
  • Code Review: Mandatory peer review for all code changes
  • Static Analysis: Automated scanning for vulnerabilities
  • Dependency Scanning: Continuous monitoring of third-party libraries

6.2 Vulnerability Management

  • Penetration Testing: Annual third-party penetration tests
  • Bug Bounty: Responsible disclosure program for security researchers
  • Patch Management: Critical vulnerabilities patched within 24 hours
  • Security Updates: Regular security patches and updates

6.3 API Security

  • API Authentication: OAuth 2.0 and API key authentication
  • Rate Limiting: Protection against abuse and denial of service
  • Input Validation: Strict validation of all API inputs
  • API Versioning: Stable APIs with deprecation notices

7. Compliance and Certifications

7.1 Regulatory Compliance

CapexIQ is designed to help you meet regulatory requirements:

  • PIPEDA: Personal Information Protection and Electronic Documents Act (Canada)
  • PIPA: Personal Information Protection Act (Alberta)
  • GDPR: General Data Protection Regulation (European Union)

7.2 Industry Standards

  • SOC 2 Type II: Annual audit of security controls (in progress)
  • ISO 27001: Information security management (roadmap)
  • OWASP: Adherence to OWASP Top 10 security guidelines

7.3 Data Residency

For customers with data residency requirements:

  • Canadian Data Residency: Data stored and processed in Canada
  • Regional Options: Contact us for specific regional requirements

8. Incident Response

8.1 Incident Management

Our incident response process includes:

  • 24/7 Monitoring: Continuous security monitoring and alerting
  • Incident Classification: Severity-based response procedures
  • Response Team: Dedicated security incident response team
  • Post-Incident Review: Root cause analysis and remediation

8.2 Breach Notification

In the event of a security incident affecting your data:

  • Notification within 72 hours of confirmed breach
  • Detailed information about the incident and affected data
  • Steps taken to contain and remediate the incident
  • Recommendations for protective measures

9. Employee Security

9.1 Personnel Security

  • Background Checks: All employees undergo background verification
  • Security Training: Mandatory security awareness training
  • Confidentiality Agreements: All employees sign NDAs
  • Least Privilege: Access limited to job requirements

9.2 Access to Customer Data

  • Customer data access is strictly controlled and logged
  • Access requires explicit business justification
  • All access is reviewed and audited regularly
  • Production data access requires manager approval

10. Physical Security

Our cloud infrastructure providers maintain:

  • 24/7 Security: On-site security personnel and surveillance
  • Access Control: Biometric and multi-factor authentication
  • Environmental Controls: Fire suppression, climate control, power redundancy
  • Visitor Management: Strict visitor access procedures

11. Business Continuity

11.1 Disaster Recovery

  • Recovery Time Objective (RTO): 4 hours for critical systems
  • Recovery Point Objective (RPO): 1 hour maximum data loss
  • Failover: Automated failover to secondary systems
  • DR Testing: Annual disaster recovery exercises

11.2 Service Level

  • Uptime Target: 99.9% availability
  • Status Page: Real-time service status updates
  • Maintenance Windows: Scheduled maintenance with advance notice

12. Enterprise Security Features

Additional security capabilities for Enterprise and Enterprise Plus customers:

Single Sign-On (SSO)

SAML 2.0 and OAuth 2.0 integration with your identity provider

Custom Data Retention

Configure retention policies to meet your compliance requirements

Advanced Audit Logs

Extended retention and SIEM integration capabilities

IP Allowlisting

Restrict access to approved IP addresses or ranges

Dedicated Support

Priority security support and dedicated customer success

Custom Agreements

Custom security addendums and data processing agreements

13. Security Contact

For security inquiries, vulnerability reports, or to request our security documentation:

CapexIQ Security Team

Email: contact@capexiq.io

Subject Line: Security Inquiry

Our Commitment

Security is not a feature—it's a fundamental part of how we build and operate CapexIQ. We continuously invest in security improvements and welcome feedback from our customers and the security community.

For detailed security questionnaires, SOC 2 reports, or custom security assessments, please contact us.

CapexIQ
Privacy Terms Security Contact

Designed for capital-intensive and regulated industries.

© 2024 CapexIQ. All rights reserved.