Mendix takes the security of your applications, the Mendix Platform your apps run on, and the cloud operations running the platform very seriously. To achieve the levels of security required by our customers, Mendix has implemented an information security management system (ISMS) according to the ISO/IEC 27001 standards as well as comprehensive security and governance features built into the platform itself.
How Is Information Security Organized in Mendix?
Mendix has implemented an information security management system (ISMS) according to the ISO/IEC 27001 standard. The basis of this ISO standard is the development and implementation of a rigorous security program, which includes the development and implementation of an ISMS.
You can find more information in How Is Information Security Organized in Mendix?.
Which Third-Party Security Certifications & Assurance Reports Does Mendix Have?
Mendix complies with the following third-party security certifications and assurance reports:
- ISO/IEC 27001 Certification
- ISAE 3402 Type II Assurance Report
- SOC 1 Type II Assurance Report
- SOC 2 Type II Assurance Report
- CSA STAR Certification
For more information, see Which Third-Party Security Certifications and Assurance Reports Does Mendix Have?
How Is Application Security Defined in Mendix?
Application-specific security is defined using the security domain-specific language of the Mendix Desktop Modeler. Your developers can create specific users roles which in turn are mapped to module roles inside your app model. Each module role defines the access and security levels to all assets in the module, including data. Fine-grained security restrictions can be created down to the attribute level on specific entities, along with database constraints to ensure data never leaves your servers if the constraints are not met in full.
For details, see What Kind of Encryption Is Provided by the Mendix Platform?.