SECURITY

Security Policy

How we protect customer data and infrastructure — and how to report a vulnerability if you find one.

Effective: 1 May 2026 SOC 2 Type II audited annually

Certifications & compliance

Data protection

In transit

At rest

In use

Identity & access

Network security

Application security

Operational security

Incident response

We maintain a published incident response plan with named on-call rotations 24/7. Severity-1 incidents trigger paging within 1 minute of detection. Customer notification SLA:

Vulnerability disclosure

If you believe you've found a security vulnerability, please email security@glixy.com. Use our PGP key (fingerprint published in /.well-known/security.txt) for sensitive details. We commit to:

We don't pursue legal action against good-faith security research that follows responsible disclosure: don't access data beyond proof-of-concept, don't degrade the service, and give us reasonable time to fix before public disclosure.

Subprocessors

The list of third-party processors we use is published in our Privacy Policy. Material additions are announced 30 days in advance to give customers time to object.


Need our SOC 2 report, audit letters, or pen-test summary? Email trust@glixy.com with an NDA.