🔒 Security & Compliance

Your EDI data, protected end-to-end

x12port is built with security-first architecture. Every transaction, partner connection, and document is encrypted, audited, and access-controlled so your supply chain data stays yours.

Security posture
92 / 100
🔐 TLS 1.3 Encryption
🧯 AES-256 at Rest
🧑‍💻 Role-Based Access
📋 Full Audit Logs
🛡️ 2FA Enforced
📅 99.9% Uptime SLA
SOC 2 Type II (planned)
🇺🇸 US-hosted infrastructure
🔒

Data Encryption

In transit — TLS 1.3

All data moving between your systems and x12port is encrypted with TLS 1.3. Older protocol versions (TLS 1.0, 1.1) are disabled at the edge. HTTPS is enforced on every endpoint; HTTP connections are permanently redirected.

At rest — AES-256

EDI documents, mapping configurations, trading partner data, and all database records are encrypted at rest using AES-256. Encryption keys are managed separately from data and rotated on a defined schedule.

Credentials

Passwords are hashed with bcrypt (cost factor 12) and never stored in plaintext. API keys are hashed before storage. Plaintext values are only shown once at creation time and cannot be recovered.

Secrets management

Application secrets (SMTP passwords, webhook signing keys, Stripe keys) are stored in environment-level secret stores, not in source code or config files. Secrets are injected at runtime and never logged.

🧑‍💻

Access Control

Role-based permissions

Every user is assigned a role: Owner, Admin, Developer, Logistics, or Client. Each role is granted minimum necessary privileges. Sensitive admin functions require elevated roles and cannot be performed by standard accounts.

Two-factor authentication

TOTP-based 2FA (compatible with Google Authenticator, Authy, 1Password) is available to all users and strongly recommended. Admins and owners can enforce 2FA organisation-wide. Backup codes are provided at setup.

Session security

Sessions are signed with a secret key, expire after inactivity, and are invalidated server-side on logout. Concurrent session limits prevent credential-sharing between multiple users on a single account.

API key scoping

API keys can be scoped to specific operations (read-only, write, admin). Keys carry no user privileges beyond their granted scope. Compromised keys can be revoked instantly from the developer dashboard without affecting other keys.

📋

Audit Logging & Monitoring

  • Every partner status change is written to an immutable audit log with actor, timestamp, old value, and new value.
  • All administrative actions — user role changes, plan upgrades, partner deletions — are logged and attributable to a specific user session.
  • EDI document inbound/outbound events are timestamped and retained for the duration of your subscription plus 90 days.
  • Failed login attempts trigger rate-limiting after 5 consecutive failures. Accounts are soft-locked and the registered email is notified.
  • Webhook delivery attempts are logged with HTTP status codes, response times, and retry history visible to the account owner.
  • Application-level health metrics (database response time, request latency, error rates) are monitored continuously and exposed on the public status page.
  • Anomalous activity patterns (burst API calls, unusual geographic logins) trigger internal alerts to the operations team.
🏗️

Infrastructure & Availability

US-hosted, isolated environment

All production infrastructure runs in US-based data centres. Each customer's data is logically isolated at the database level. No cross-tenant data access is possible by design.

Automated backups

The production database is backed up daily. Point-in-time recovery is available. Backup files are encrypted at rest and stored in a geographically separate location. Restoration is tested on a quarterly basis.

Uptime & SLA

x12port targets 99.9% monthly uptime for the API and web application. Scheduled maintenance windows are announced at least 48 hours in advance via the status page and registered email.

Dependency management

Third-party dependencies are pinned to specific versions and reviewed for CVEs on a weekly basis. Security patches are applied within 72 hours of a critical advisory. Dependency updates go through the same deployment pipeline as code changes.

Compliance & Certifications

Standard Status Notes
GDPR Compliant Data processing agreements available on request. Right-to-deletion honoured within 30 days.
CCPA Compliant California consumer data rights respected. No sale of personal data to third parties.
SOC 2 Type I In progress Controls audit underway. Report expected Q3 2026.
SOC 2 Type II Planned Scheduled to begin observation period following Type I completion.
HIPAA Not applicable x12port does not process Protected Health Information (PHI) in standard plans. Contact sales for healthcare EDI requirements.
PCI DSS Scoped out Payment processing is handled entirely by Stripe (PCI DSS Level 1). x12port never touches raw card data.
AS2 / AS4 Supported Secure AS2 message signing and encryption for partner connectivity on Professional and Enterprise plans.
🤝

Data Privacy & Retention

  • x12port does not sell, rent, or share your EDI transaction data with third parties. Your trading partner data is yours.
  • Sub-processors (email delivery, payment processing, infrastructure) are listed in our Privacy Policy and operate under data processing agreements.
  • Transaction documents are retained for the life of your account plus a 90-day grace period after cancellation, then permanently deleted.
  • Account data is purged within 30 days of a verified deletion request.
  • Employees do not access production customer data without a recorded support ticket and customer consent, except for automated backup and monitoring processes.
🔍

Responsible Disclosure

🧮

Found a vulnerability? We want to know.

x12port operates a responsible disclosure programme. If you discover a security vulnerability in our platform, please report it privately so we can investigate and fix it before public disclosure. We do not pursue legal action against good-faith researchers who follow this process.

What to include: a description of the vulnerability, steps to reproduce, potential impact, and any proof-of-concept code.

📧 Email: security@x12port.com — we aim to acknowledge reports within 1 business day and resolve critical issues within 7 days.

Questions about security?

Our team is happy to provide a security questionnaire, architecture overview, or data processing agreement for enterprise procurement.

✨ x12port Assistant
Free AI support • No credits needed
Hi! I’m the x12port AI Assistant. Ask me anything about EDI, your account, or how to use x12port. 👋