Information security governance
AxonOps runs its security program around documented controls, access management, and risk handling, with ISO 27001:2022 certification forming part of that operating model.
Security is part of how AxonOps builds, operates, and supports the platform. This page summarises certification status, employee and product access controls, AxonOps Cloud infrastructure safeguards, secure engineering practice, and the security capabilities customers can use in production.
At a glance, the security model is built around governance, scoped access, AxonOps Cloud infrastructure safeguards, and operational traceability.
We have kept this page factual. The aim is to help customers understand what is publicly available today and where to start when deeper security diligence is required.
AxonOps runs its security program around documented controls, access management, and risk handling, with ISO 27001:2022 certification forming part of that operating model.
Employee access is restricted to personnel with a genuine business need to know. The aim is to avoid broad standing access and keep support or operational access tied to role and responsibility.
For AxonOps Cloud, transport paths are protected with TLS and storage services rely on encryption safeguards in the underlying infrastructure rather than unsecured internal data handling paths.
Security is handled as part of day-to-day engineering, design, review, build, and support workflows rather than being treated as a separate compliance-only exercise.
AxonOps incorporates CI/CD security checks, including dependency and vulnerability scanning, as part of the software delivery lifecycle before releases move through normal deployment workflows.
Security review is continuous rather than periodic only. Vulnerabilities in product dependencies and supporting components can be identified, triaged, and addressed as part of normal engineering operations.
For AxonOps Cloud, we publish the third parties we rely on, what they do, the categories of data involved, and the safeguards in place.
View subprocessorsFor AxonOps Cloud, backend infrastructure is monitored through SIEM-backed security operations workflows so security-relevant activity can be centralised, correlated, and reviewed.
AxonOps is not just a monitoring surface. The product includes access controls, auditability, alert routing, and operational context that help teams run Cassandra and Kafka more safely.
AxonOps supports SAML-based single sign-on for supported enterprise workflows and uses role-based permissions across operational access paths.
Repairs, backups, nodetool workflows, topic and ACL changes, and message access can be recorded in audit trails for traceability and post-incident review.
AxonOps can monitor security-relevant events, logs, service checks, backups, repairs, and operational failures, then route alerts through existing incident channels.
For Kafka environments, AxonOps can broker message-viewer access without exposing direct broker ports to every developer or analyst.
For Cassandra environments, AxonOps can surface configuration and runtime context alongside observability data, helping teams validate changes and investigate drift.
AxonOps can surface certificate health and related service checks so teams can validate transport security and spot expiry risk before it becomes an incident.
If you are evaluating AxonOps, these are the best starting points for security and trust review before moving into customer-specific diligence.
Review the current vendor list, purpose, location, and safeguards for AxonOps Cloud.
Open subprocessor listSee how AxonOps describes access control, data handling, and breach response at the company level.
Read privacy policyNeed to discuss a questionnaire, certification status, or report a potential issue? Start with our contact page or email us directly.
Contact AxonOpsIf you need to review our ISO 27001:2022 certification status, discuss a security questionnaire, or raise a potential issue, contact AxonOps and we will route the request to the appropriate team.