Security

Security at MicroStax

MicroStax is built for isolated, governed environment operations. This page outlines the platform security model and where operator responsibility still applies.

Overview

MicroStax is built with security at its core. We follow a shared responsibility model: we secure the platform, and you control access to your environments and data.

Infrastructure

MicroStax is designed around isolated Kubernetes namespaces, network policy controls, and explicit service exposure. Cluster hardening, node patching, and cloud account posture remain part of the operator responsibility model.

Authentication

Supported identity flows include dashboard sign-in and token-based API access. Organization scoping and role-aware checks are used to gate sensitive environment and administrative actions.

Data Protection

MicroStax treats secrets, snapshots, and temporary environment data as controlled resources. Snapshot workflows support selective capture and sanitization, and operators are expected to align storage and retention with their own risk posture.

Compliance

MicroStax provides controls that support governed operations, including audit trails, policy enforcement points, and organization-level reporting. Formal compliance outcomes still depend on deployment, process, and customer-specific controls.

Vulnerability Disclosure

We welcome responsible security disclosures. If you discover a vulnerability, report it to security@microstax.ai and include enough detail for reproduction and impact assessment.

Contact the Security Team

Have a security concern or want to report a vulnerability?

security@microstax.ai