Entirely focused on guaranteeing our customer trust on every service Axy7 gives, we have established and followed security policies to complement the existing security layers that Salesforce offers.
AXY7 products are Salesforce add-ons, and they can only work within the user browser in the Salesforce context. Therefore, all of the security protections provided by Salesforce are automatically inherited by our products.
Download our Security HandBook Policies.

Security overview

Axy7 is committed to three principles. Providing a security and privacy program that considers security and data protection across our processes.

Commitment on security

In Axy7 our employees follow a strict security, privacy, and compliance training that is recurrently reviewed and updated following the Salesforce practices for security. Also there is staff to ensure the protection of company and customer data.
The AXY7 security responsable maintains a constant protocol tracking to ensure our lifecycle process keeps within the security norms.
AXY7 processes and tooling are regularly audited to ensure we meet industry latest standards.

Salesforce®

Salesforce is the most trusted customer relationship management (CRM) platform in the world. In order to be a certified Salesforce ISV (Independent Software Vendor) company strict partnership requirements should be complied, including periodic security reviews.

CIS Controls v8 Self-Assessment: Above-Industry Security Readiness

In 2025, Axy7 completed a formal self-assessment based on the CIS Controls v8 Implementation Group 1 (IG1) framework using the official CIS CSAT platform, hosted by the Center for Internet Security.

Our resulting score:
76/100
Industry Average: 30

This places Axy7 in the top security maturity tier for companies of our size and category.

The CIS Controls are widely recognized and endorsed by organizations such as the Cybersecurity & Infrastructure Security Agency (CISA), which includes them as part of their official cybersecurity guidance.

Our assessment included over 50 individual controls covering:

  • Asset and software inventory

  • Data protection and retention

  • MFA and identity access controls

  • Logging, monitoring, and incident response

  • Backup, recovery, and vendor risk

Security sharing responsibility model

Built on Salesforce platform

As an ISV, rigorous security standards should be successfully passed every year. This shows the level of commitment on security that Axy7 had, has and will continue having to deliver Trust to our customers.

 

As a Salesforce-certified ISV partner, Axy7 follows all requirements and recommendations from Salesforce’s AppExchange Security Review process. This includes:

  • Secure development lifecycle following Salesforce’s Secure Coding Guidelines

  • Annual Security Review audits, which include code analysis, vulnerability scanning, and manual reviews by Salesforce’s own AppSec team

  • Use of Permission Sets, field-level security (FLS), and record-sharing models aligned with least-privilege principles

  • Secure hosting on Heroku, a Salesforce platform with SOC 2 and ISO 27001 certifications

Combined with our CIS Controls v8 compliance and review of federal guidelines via CISA’s recommended tools, Axy7’s platform offers enterprise-grade security for all customers.

If you have a security or privacy-related question, comments, or concerns please contact us.