Aller au contenu principal

Trust Center

Overview

This page is the single reference point for anyone evaluating Noxys from a security, privacy, or compliance perspective — CISOs running vendor due diligence, procurement teams filling security questionnaires, or auditors requesting evidence. It is maintained as a factual record, not a marketing document. When an item is not yet in place, it is stated explicitly with a target timeframe.

The Trust Center is reviewed and updated at least once per quarter, and whenever a material change occurs (new sub-processor, new certification, new region, incident disclosure). For artefacts not published here — for example a signed DPA, SOC 2 gap analysis, or penetration test report — write to security@noxys.eu. Requests are acknowledged within one business day.

Security principles

These principles are non-negotiable commitments built into the product architecture. They are the same across Cloud and self-hosted deployments.

  • Privacy by design. Raw prompt content never leaves the browser extension in plaintext. The backend only receives SHA-256 hashes, PII classifications, and metadata (user, platform, tenant, timestamp). There is no code path on the server that can reconstruct the original prompt from what it stores.
  • Sovereignty first. Noxys Cloud runs on EU infrastructure by default, operated by an EU-owned provider. There are no mandatory US cloud dependencies. Customers subject to sovereignty constraints can self-host entirely within their own infrastructure.
  • Cloud-agnostic Kubernetes deployment. The platform is packaged as a Helm chart and a Docker Compose bundle. It runs on any conformant Kubernetes distribution — managed or on-premise — without vendor lock-in.
  • Deterministic fallback. Noxys uses machine learning for detection (Tier 2 and Tier 3 classifiers), but it is never AI-dependent. If every ML component is unavailable, the Tier 1 regex engine in the extension still enforces policies. A degraded classifier never produces a silent failure.
  • Separation of concerns. The policy engine evaluates classifications and metadata only; it has no knowledge of specific AI platform internals. Adding or removing a platform does not touch policy code, and policy changes cannot corrupt platform integrations.

Data processing and storage

The table below lists every category of data Noxys handles, with retention, storage region, encryption state, and access controls. Retention values marked "default" are configurable per tenant.

Data categoryWhat it containsRetentionLocationEncryptionAccess
Prompt content (raw)The text a user submits to an AI platformNever stored. SHA-256 hash onlyN/AHash is one-wayN/A
PII classificationsDetection results, tier, entity types, risk score — no raw values90 days (default)EU (Scaleway FR)TLS 1.3 in transit, AES-256 at restTenant-scoped, RBAC
User identityEmail, display name, role, tenant IDLifetime of account + 30 daysEU (Scaleway FR)bcrypt for passwords, AES-256 at restTenant-scoped, RBAC
Audit log (AIInteraction records)Decision metadata — who, when, platform, policy action, classification2 years (default, configurable)EU (Scaleway FR)AES-256 at restTenant-scoped, Admin only
Billing dataSubscription plan, invoice metadata. No card data.Lifetime of account + 7 years (legal)Stripe (US) + EU mirror for invoicesTLS 1.3, Stripe PCI DSS Level 1Finance role
BackupsEncrypted snapshots of PostgreSQL and object storage30 days rollingEU onlyAES-256SRE on-call, break-glass audit
Operational logsApplication and infrastructure logs (no prompt content, no PII bodies)30 daysEU (Scaleway FR)TLS 1.3, AES-256 at restSRE, audited

Further detail on the classification pipeline and hashing scheme is available in Data handling and privacy.

Infrastructure and hosting

Noxys Cloud runs on a dedicated Kubernetes cluster hosted with Scaleway, the EU-owned cloud operator (Iliad group, French jurisdiction). Primary region is Paris (fr-par), with secondary availability in Amsterdam (nl-ams) for failover and regional isolation.

  • Kubernetes-native. All services are deployed as Helm charts. A self-host Helm release and a Docker Compose bundle are published for customers who need full control.
  • No hardcoded cloud dependencies. The platform uses only portable primitives — Kubernetes, PostgreSQL, Redis/Valkey, S3-compatible object storage. Replacing any one of these does not require application changes.
  • Redis licensing. Current deployments use Redis under its standard distribution terms. If a licensing constraint arises, the platform is compatible with Valkey (BSD license, fully API-compatible) as a drop-in replacement.
  • Container supply chain. All images are published to GitHub Container Registry (GHCR) and signed with Cosign. Deployment manifests verify signatures before admitting images to the cluster, which closes the image-substitution attack class.
  • Network isolation. Application services run in private subnets behind a hardened ingress. Only the ingress, the authentication endpoints, and the public API are exposed publicly.

See Architecture overview for a component-level diagram.

Compliance and certifications

FrameworkStatusNotes
GDPRIn placeDPA template, records of processing, sub-processor list, data subject request workflow
EU AI Act (Reg. 2024/1689)In placeArticle-by-article mapping below
SOC 2 Type IIPlanned — 2026-Q4Pre-audit controls implemented. Auditor selection in progress. Gap analysis available on request.
ISO 27001RoadmapGap analysis planned 2026-Q3. Certification target 2027.
NIS2Supportive controls in placeCustomers in scope can meet NIS2 obligations when using Noxys; Noxys itself is not currently a designated essential entity.
HDS (French Health Data Host)Out of scope for current version. Planned Phase 2 — no date committed.Required only for health data workloads.
HIPAA / HITRUSTNot in scope. Planned Phase 2 if US healthcare demand materialises.No BAA currently available.
PCI DSSNot applicable directly — Stripe handles all card data.Noxys operates at minimum PCI scope (SAQ-A).

EU AI Act coverage

Noxys supports the following articles of Regulation 2024/1689. The full compliance mapping is in Compliance mapping.

ArticleTopicHow Noxys helps
Article 4AI literacyAdmin and user documentation, in-product guidance via the Coach action
Article 9Risk management for high-risk systemsRisk scoring per interaction, tiered classification pipeline
Article 10Data governancePII classification metadata, data minimisation (hash-only storage)
Article 13Transparency to deployersAudit log, classification details, platform identification
Article 14Human oversightAdmin dashboards, alerts, policy override, Coach interactions
Article 15Accuracy, robustness, cybersecurityDeterministic Tier 1 fallback, classifier versioning, signed images
Article 16Obligations of providersDPA, processing records, sub-processor disclosure
Article 17Quality management systemDocumented development and release process, change management

Sub-processors

Noxys maintains a current list of all third parties that process customer data or metadata. Customers are notified at least 30 days before any addition or change. The authoritative list is available to existing customers in the admin console; the table below reflects the current state.

Sub-processorPurposeRegionDPAExit plan
Scaleway SASPrimary hosting (compute, storage, managed Postgres)France (EU)Signed, EU SCCs includedAny Kubernetes cluster — Helm chart portable
PostgreSQL (Scaleway managed)Primary datastoreFrance (EU)Covered by Scaleway DPAStandard PostgreSQL — dump/restore to any provider
Stripe Payments Europe, Ltd.Subscription billing and invoicingIreland (EU entity) with US parentSigned, EU SCCs includedReplaceable with EU billing provider (Lemon Squeezy EU, Paddle) — work not yet started, tracked on Phase 2 roadmap
Cloudflare, Inc.Optional edge, WAF, DDoS mitigationCustomer-selectable; EU-only data residency availableSigned, EU SCCs includedFully optional — can be disabled per tenant, ingress falls back to direct Scaleway load balancer
Resend / Postmark (transactional email)Security notifications, account emailsEU regionSigned, EU SCCs includedSwappable SMTP backend
Sentry (self-hosted or EU tenant)Error monitoring — scrubbed, no PII bodiesEU (self-hosted option)SignedRemovable; structured logs sufficient for operations

Stripe is currently retained despite its US parent because (a) the EU Stripe entity is the contractual counterparty, (b) no card or full PAN data is ever transmitted to or stored by Noxys, and (c) the available fully-EU alternatives do not yet match the required integration surface. This is revisited each quarter.

Cryptography

AreaScheme
Data in transitTLS 1.3 end-to-end, HSTS preloaded, no TLS 1.0/1.1, no RSA key exchange, no downgrade negotiated
Public endpointsEd25519 / ECDSA P-256 server certificates, automated renewal
Data at rest (Postgres)Encrypted volumes (AES-256) at the storage layer
BackupsAES-256, encrypted before leaving the primary region
Prompt fingerprintingSHA-256, one-way, not reversible
Passwordsbcrypt with modern cost factor (reviewed annually)
Extension local storageAuth tokens encrypted with AES-256-GCM via native browser WebCrypto. Plaintext tokens are never written to disk.
SAML SP private keysPEM files on disk by default. See the SAML Key Hardening Guide for operator controls. Medium-term roadmap: KMS-backed storage via SAMLKeyProvider interface.
Session tokensShort-lived JWT access tokens, refresh tokens with server-side revocation blacklist

Access control and identity

  • RBAC. Two built-in roles: Admin (manage users, policies, integrations, audit log) and Viewer (read-only dashboards and audit log). Tenant scoping is enforced at the data layer, not only at the API layer.
  • SSO — OIDC. Available today. Any OIDC-compliant identity provider can be used (Entra ID, Okta, Keycloak, Google Workspace).
  • SSO — SAML 2.0. Available today via a standards-compliant SAML library. Supports signed assertions, signed requests, and encrypted assertions.
  • MFA. TOTP available today. Phishing-resistant authentication (WebAuthn / passkeys) is on the roadmap.
  • Session management. JWT access tokens with short TTL, refresh tokens with revocation blacklist, forced logout on password change and role change.
  • Administrative access. Noxys personnel access to production is break-glass only, logged, and reviewed monthly.

Security operations

  • Vulnerability management. Dependencies are monitored continuously via Dependabot and equivalent tooling on the container images. Remediation SLAs: Critical within 7 days, High within 30 days, Medium within 60 days, Low opportunistically.
  • Incident response. Documented runbook with on-call rotation. Customer notification of any confirmed personal data breach within 72 hours (GDPR Article 33), via email to the account admin and a status post on the Trust Center.
  • Penetration testing. Planned — first external penetration test scheduled 2026-Q3, not yet completed. Internal security review and SAST run on every release.
  • Bug bounty. No formal programme yet. security@noxys.eu is monitored and acknowledged within one business day. See Responsible disclosure for the safe harbour and coordinated disclosure terms.
  • Change management. All production changes are code-reviewed by at least two engineers, tested in a staging environment, and deployed via reproducible CI pipelines.
  • Monitoring. Application metrics, security events, and infrastructure health are continuously monitored. Alerts route to on-call.

AI-specific risks and controls

This is where Noxys differs from a generic SaaS. The controls below address the risks that a traditional CASB or DLP cannot cover for generative AI.

Tiered classification pipeline

TierWhere it runsWhat it seesTypical latencyPurpose
Tier 1In the browser extensionRaw prompt (never leaves the machine)< 10 msRegex and heuristic detection — emails, card patterns, secrets, API keys
Tier 2Backend classifier servicePII spans and classifications from Tier 1 — not raw prompt50–150 msPresidio-based entity recognition, policy decision
Tier 3Backend, asyncMetadata + classificationsAsync, secondsHigher-accuracy small language model re-scoring, anti-prompt-injection (DeBERTa, on the roadmap)

Tier 1 is the only component that ever sees the raw prompt. Tiers 2 and 3 receive only hashes and structured classifications.

Policy actions

The policy engine supports four actions. All four are first-class and capitalised consistently throughout the product and documentation.

  • Block. Submission is prevented. User receives an explanation in the extension.
  • Coach. Submission proceeds, but the user is shown an educational prompt explaining the risk before sending.
  • Log. Silent audit only. Useful for baseline discovery phases.
  • Redact. PII is replaced with a placeholder in the browser before submission. The raw values never leave the machine and never reach either the AI platform or the Noxys backend. This is the zero-friction default recommended for most production rollouts — it protects data without blocking the user's workflow.

Additional controls

  • Default-deny for unknown AI services. An optional tenant policy that blocks any AI platform not on the approved list.
  • Anti-prompt-injection. Planned as part of Tier 3 (DeBERTa classifier). Not yet shipped.
  • Documented limitation — out-of-band exfiltration. Noxys gates the browser interaction between a user and an AI platform. It does not intercept API-level traffic from unmanaged applications, and it does not cover data exfiltration paths that bypass the browser (e.g. a user pasting data into a desktop AI client). This is an explicit scope boundary, not a bug. Customers with stricter requirements should layer Noxys with network-level controls.

Artefacts available on request

The following artefacts are maintained and released to qualified customers and prospects. Unless marked otherwise, NDA is required.

ArtefactAvailabilityNDA required
Security whitepaperAvailableNo
Architecture diagram (procurement version)AvailableNo
DPA templateAvailableNo
Sub-processor list with change notification subscriptionAvailableNo
Security questionnaire responses (CAIQ, SIG Lite)AvailableYes
SOC 2 gap analysisAvailable once auditor engagement startsYes
SOC 2 Type II reportPlanned 2026-Q4 — not yet availableYes (when available)
Penetration test reportPlanned 2026-Q3 — not yet availableYes (when available)
Business continuity and disaster recovery planAvailableYes
Vulnerability management policyAvailableYes

Request artefacts by writing to security@noxys.eu from a verifiable corporate domain.

Contact

For coordinated vulnerability disclosure terms and safe harbour, see Responsible disclosure.