aegisnode
  • Scan
  • Pricing
  • Trust
  • Registry
  • Insights
  • Dashboard
  • Log in
  • Start free scan

Security policy

We protect your data with the same rigor we bring to analyzing external attack surfaces.

Last updated: March 21, 2026

1 Zero Trust Architecture

Our infrastructure operates on a Zero Trust model. No implicit trust is granted to any user, device, or network segment.

2 Encryption

All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Customer data is encrypted using dedicated keys managed by hardware security modules.

3 Authentication

Multi-factor authentication is available for all accounts and mandatory for Analyst and Command tiers. We support TOTP and WebAuthn/FIDO2.

4 Infrastructure

Hosted on Microsoft Azure with SOC 2 Type II certified data centers. Primary region: South Central US. Disaster recovery: North Central US.

5 Data Handling

We never store your credentials. We never access your internal systems. We only analyze publicly visible, externally observable data. Customer scan data is logically isolated with row-level database security.

6 Monitoring

24/7 automated monitoring with immutable audit logging. All access to customer data is logged and auditable.

7 Vulnerability Management

We maintain a continuous vulnerability management program with automated dependency scanning and container image analysis.

8 Incident Response

We maintain a documented incident response plan aligned with NIST CSF. In the unlikely event of a security incident affecting customer data, we will notify affected customers within 72 hours.

Questions?

For security inquiries, responsible disclosure, or to request our security documentation, contact security@aegisnode.io.

aegisnode

Cyber risk intelligence from our own sensor network.

Product

  • Scan
  • Pricing
  • Registry
  • Insights
  • Dashboard

Company

  • Trust
  • Security Policy

Legal

  • Terms of Service
  • Privacy Policy
  • Acceptable Use
© 2026 Aegisnode. All rights reserved.