Security at MicroStax
MicroStax is built for isolated, governed environment operations. This page outlines the platform security model and where operator responsibility still applies.
Overview
MicroStax is built with security at its core. We follow a shared responsibility model: we secure the platform, and you control access to your environments and data.
Infrastructure
MicroStax is designed around isolated Kubernetes namespaces, network policy controls, and explicit service exposure. Cluster hardening, node patching, and cloud account posture remain part of the operator responsibility model.
Authentication
Supported identity flows include dashboard sign-in and token-based API access. Organization scoping and role-aware checks are used to gate sensitive environment and administrative actions.
Data Protection
MicroStax treats secrets, snapshots, and temporary environment data as controlled resources. Snapshot workflows support selective capture and sanitization, and operators are expected to align storage and retention with their own risk posture.
Compliance
MicroStax provides controls that support governed operations, including audit trails, policy enforcement points, and organization-level reporting. Formal compliance outcomes still depend on deployment, process, and customer-specific controls.
Vulnerability Disclosure
We welcome responsible security disclosures. If you discover a vulnerability, report it to security@microstax.ai and include enough detail for reproduction and impact assessment.
Contact the Security Team
Have a security concern or want to report a vulnerability?
security@microstax.ai