Security
How Axis Meridi Technologies protects identity, tenant data, and credentials across the platform — named, not hedged.
Every multi-tenant table is scoped by tenant_org_id at the query level — not just at the application layer. A bug in app code cannot leak data across tenants because the database itself does not return rows from other tenants for any query. Defensive depth, not a single guard.
When MyMeridi provisions an account in AxisCommand, or AxisVantage hands a lead to AxisCommand, the cross-product call is HMAC-signed end-to-end with a per-product shared secret. A timestamp window narrows replay attempts. The internal network is not trusted; every internal call is signed.
MyMeridi is the auth root for the platform. Three sign-in modes:
Session tokens are short-lived; refresh requires re-attestation. Passwords are never stored — only Argon2id hashes with per-record salts.
OAuth tokens for third-party integrations (Stripe, Google, Microsoft, others) are encrypted at rest with AES-256-GCM. Encryption keys are rotated quarterly and stored separately from the data they protect. SMTP credentials live in a file one level above public_html — never web-served, never in the deploy archive, never committed to git.
HTTPS-only across every product. HSTS is set with includeSubDomains and a 1-year max-age. TLS 1.2 or higher; lower versions are refused. Plain HTTP requests are 301-redirected at the edge. Hard-coded security headers: X-Content-Type-Options nosniff, X-Frame-Options DENY, Referrer-Policy strict-origin-when-cross-origin, and a Permissions-Policy that disables geolocation, microphone, and camera by default.
Three named services touch tenant data:
The full data-flow per service is on the privacy page. Material changes are communicated to existing customers and reflected on this page.
Found a vulnerability? Email security@axismeridi.com with details and steps to reproduce. We respond within two business days, work in good faith, and credit researchers when the fix lands. We do not pursue researchers acting in good faith. A formal bug-bounty program is not yet stood up — rewards are case-by-case until then.
An honest list of attestations we have not earned and programs we have not yet stood up:
As the platform matures, this list shrinks. We update it here when something moves.
The cross-product flows described above are mapped in the architecture page. Operational health is on the status page, refreshed every 15 seconds. We do not run a hidden version of any of this.
Last updated May 10, 2026.