Security
Last updated: 2026-04-13
1. Infrastructure Security
Staex operates on a distributed, certificate-based security architecture. All inter-node communication is encrypted using peer-to-peer tunnels with dedicated keys and protocols. No centralized certificate authority is required.
2. Data Encryption
All data in transit is encrypted end-to-end using industry-standard cryptographic protocols. Data at rest is protected with AES-256 encryption. The MCC Protocol provides cryptographically verified data integrity.
3. Access Control
Platform access is governed by role-based access controls (RBAC). Authentication is handled via secure identity providers. Multi-factor authentication (MFA) is supported for all accounts.
4. Vulnerability Management
We conduct regular security assessments and penetration testing. Our Rust-based codebase provides memory safety guarantees, eliminating entire classes of vulnerabilities common in C/C++ networking software.
5. Incident Response
Staex maintains a documented incident response process. Security incidents are triaged, investigated, and communicated to affected customers within 24 hours.
6. Responsible Disclosure
If you discover a security vulnerability in Staex products or infrastructure, please report it responsibly to security@staex.io. We ask that you (a) provide sufficient detail to reproduce the issue; (b) allow us reasonable time to investigate and remediate before public disclosure; and (c) refrain from accessing or modifying other users' data. We commit to acknowledging receipt within 48 hours, providing an initial assessment within 5 business days, and keeping you informed of remediation progress. We do not pursue legal action against researchers who follow this policy.
7. Compliance
Staex is designed to be GDPR-compliant by default. Data processing agreements (DPAs) are available for enterprise customers. Contact security@staex.io for our full security documentation.