Innovexus does not independently hold SOC 2 Type II or ISO 27001 attestations. We inherit infrastructure-layer controls from our audited hosting partner and disclose the boundary explicitly. This page is the single source of truth for what we publish, what we share on request under NDA, and what is genuinely outside our scope today.
Real-time verification of where Innovexus runs and what controls are inherited from hosting partners. Updated on every page load.
Every third party that processes customer data: hosting, AI providers, payment, identity, observability. Updated when we add or remove one.
Uptime targets, response times, and credits per tier. Published rather than negotiated.
Architecture summary, encryption, key custody, threat model. Detailed report and SOC 2-style evidence available on request under NDA.
80-question vendor-neutral evaluation template (CC BY 4.0). Includes Innovexus answers in Appendix B.
Pen-test summary, encryption architecture, threat model walkthrough, custom compliance attestations, regional data residency, BAA scope — all available under NDA via the trust mailbox.