Security

Last updated: 2026-04-13

1. Infrastructure Security

Staex operates on a distributed, certificate-based security architecture. All inter-node communication is encrypted using peer-to-peer tunnels with dedicated keys and protocols. No centralized certificate authority is required.

2. Data Encryption

All data in transit is encrypted end-to-end using industry-standard cryptographic protocols. Data at rest is protected with AES-256 encryption. The MCC Protocol provides cryptographically verified data integrity.

3. Access Control

Platform access is governed by role-based access controls (RBAC). Authentication is handled via secure identity providers. Multi-factor authentication (MFA) is supported for all accounts.

4. Vulnerability Management

We conduct regular security assessments and penetration testing. Our Rust-based codebase provides memory safety guarantees, eliminating entire classes of vulnerabilities common in C/C++ networking software.

5. Incident Response

Staex maintains a documented incident response process. Security incidents are triaged, investigated, and communicated to affected customers within 24 hours.

6. Responsible Disclosure

If you discover a security vulnerability in Staex products or infrastructure, please report it responsibly to security@staex.io. We ask that you (a) provide sufficient detail to reproduce the issue; (b) allow us reasonable time to investigate and remediate before public disclosure; and (c) refrain from accessing or modifying other users' data. We commit to acknowledging receipt within 48 hours, providing an initial assessment within 5 business days, and keeping you informed of remediation progress. We do not pursue legal action against researchers who follow this policy.

7. Compliance

Staex is designed to be GDPR-compliant by default. Data processing agreements (DPAs) are available for enterprise customers. Contact security@staex.io for our full security documentation.