🔒 Security & Compliance

Enterprise-Grade
Security & Compliance

Insurix handles sensitive personal and financial data on behalf of insurers and their customers. Security and data integrity are engineering requirements — built into the platform from the ground up, not layered on after the fact.

Four pillars of our
security posture

Every layer of the Insurix platform — from data storage to user access — is governed by clear, auditable controls.

🇬🇧

UK Data Residency

All personal data processed and stored within the United Kingdom. No cross-border transfers without documented legal basis.

🔒

End-to-End Encryption

TLS 1.3 in transit. AES-256 at rest. Encryption applied at the database, file, and field level for PII.

UK GDPR Compliant

Registered with the ICO. Data subject rights tooling, configurable retention, and DPA available for all partners.

👤

Least-Privilege Access

Role-based controls, MFA enforced for all users, and a full immutable audit trail across every system action.

How we handle your
data and your customers'

Specific controls, not broad assurances. Here is what we do and how it works.

GDPR & Data Protection

Insurix operates as a data processor on behalf of insurer clients. We are registered with the UK Information Commissioner's Office and maintain a full record of processing activities.

UK GDPR Compliance

Our platform is designed around the six lawful bases for processing under UK GDPR. Every data flow is documented, and processing activities are mapped to explicit legal bases before any data is ingested.

  • ICO registration maintained
  • Record of Processing Activities (ROPA) maintained and reviewed quarterly
  • Privacy impact assessments conducted for all new processing activities
  • Lawful basis documented per data type and processing purpose

Data Subject Rights

Subject access requests, erasure requests, and rectification can be executed within the platform without manual data extraction. Response timelines are tracked automatically against the statutory 30-day window.

  • SAR fulfilment tooling built in as standard
  • Right to erasure — automated deletion workflows with audit confirmation
  • Right to rectification — field-level correction with version history
  • Portability — structured data export in machine-readable format

Retention & Controller Agreements

Retention periods are configurable per data category and enforced automatically. A Data Processing Agreement is provided to all insurer partners prior to go-live, covering processor obligations, sub-processor disclosures, and incident notification timelines.

  • Configurable retention schedules per data category
  • Automated deletion at end of retention period, with audit record
  • DPA provided to all partners — no manual negotiation required for standard terms
  • Sub-processor register maintained and disclosed
🔐

Data Encryption

Encryption is applied at every layer where data is stored or transmitted — not just at the perimeter.

Encryption in Transit

All data in transit — between users and the platform, between services, and between the platform and third-party integrations — is encrypted using TLS 1.3. Older protocol versions are disabled. Certificate management is automated with short-lived certificates and automatic renewal.

  • TLS 1.3 enforced — TLS 1.0 and 1.1 disabled
  • HSTS enabled across all platform domains
  • Certificate rotation automated — no manual renewal risk
  • API traffic encrypted end-to-end including webhook delivery

Encryption at Rest

Data at rest is encrypted using AES-256 at the storage layer. Sensitive fields — including personal identifiers, financial data, and device identifiers — receive an additional layer of field-level encryption within the database, separate from the storage encryption key.

  • AES-256 storage encryption on all databases and object stores
  • Field-level encryption applied to PII and financial data
  • Encryption keys managed separately from encrypted data
  • Key rotation policy enforced — keys rotated at least annually

Secrets & Key Management

API keys, credentials, and cryptographic secrets are stored in a dedicated secrets management service — never in source code, configuration files, or environment variables accessible to application code directly.

  • Secrets managed via dedicated vault — not environment variables or config
  • Application secrets rotated on a defined schedule
  • No credentials committed to version control — enforced via pre-commit hooks and automated scanning
🏠

Hosting & Infrastructure

The Insurix platform is hosted on UK-resident, ISO-27001-aligned cloud infrastructure — with redundancy, availability SLAs, and disaster recovery built in.

UK Data Residency

All production data — claims data, personal data, and supporting documents — is stored and processed within the United Kingdom. No data is transferred to servers outside the UK or EEA without a documented legal basis and explicit contractual controls.

  • Primary and secondary hosting regions both within the UK
  • No cross-border transfers as part of standard platform operation
  • Third-party sub-processors assessed for data residency compliance
  • Data residency commitments included in partner DPAs

Availability & Redundancy

The platform is architected for 99.9% uptime, with auto-scaling compute, redundant database clusters, and multi-zone deployment ensuring that single-component failure does not result in service disruption.

  • 99.9% uptime SLA on production environments
  • Multi-availability-zone deployment — no single point of failure
  • Auto-scaling across compute and queue infrastructure
  • Real-time health monitoring with automated alerting

Disaster Recovery & Backups

Database backups are taken continuously with point-in-time recovery capability. Disaster recovery procedures are documented and tested, with a defined Recovery Time Objective (RTO) and Recovery Point Objective (RPO) agreed with each partner at onboarding.

  • Continuous database backups with point-in-time recovery
  • Backups encrypted and stored in a geographically separate UK location
  • Disaster recovery runbooks documented and tested annually
  • RTO and RPO defined per partner and included in service agreements
👤

Access Controls

Access to the Insurix platform and underlying infrastructure follows a least-privilege model — every user, service account, and integration is granted only the permissions it requires.

Role-Based Access Control

User permissions are defined by role — claims handler, supervisor, reporting user, admin — and applied at the data level, not just the interface. A claims handler cannot access another partner's data. A reporting user cannot modify claim records. Segregation is enforced at the API layer, not just the UI.

  • Granular RBAC — permissions defined per action and data type
  • Multi-tenant data isolation enforced at API and database layer
  • Role assignment requires manager approval — no self-provisioning
  • Quarterly access reviews across all partner environments

Authentication & MFA

Multi-factor authentication is enforced for all platform users — there are no exemptions for admin or privileged accounts. Insurix staff access to production systems requires MFA via a hardware or authenticator-app second factor, with phishing-resistant options strongly recommended.

  • MFA enforced for all user accounts — no exceptions
  • TOTP and hardware key (WebAuthn) MFA supported
  • Session timeout enforced — idle sessions terminated after 30 minutes
  • Password policy: minimum 12 characters, breach database checked on creation

Audit Logging

Every action performed on the platform — claim status changes, document access, configuration edits, login events, and API calls — is written to an immutable audit log. Logs cannot be modified or deleted by any platform user, including administrators.

  • Immutable audit trail across all user and system actions
  • Logs retained for a minimum of 12 months in hot storage, 7 years in archive
  • Log access restricted to authorised security personnel
  • Audit log export available to partners on request

Where we are.
Where we are going.

We will not claim certifications we do not hold. The table below reflects our current status and our committed roadmap — with no vanity metrics.

Achieved

ICO Registration

Insurix Services Ltd is registered with the UK Information Commissioner's Office as a data controller and processor. Registration number available on request.

Achieved

Cyber Essentials

UK government-backed certification covering the five foundational technical controls: firewalls, secure configuration, access control, malware protection, and patch management.

In Progress

Cyber Essentials Plus

The independently verified extension of Cyber Essentials, requiring hands-on technical assessment by an accredited certifying body. Assessment scheduled for Q[X] [YEAR].

Expected: Q[X] [YEAR]
Roadmap

ISO 27001

International standard for information security management systems. We are building the ISMS documentation and control framework required for certification audit. Target is formal certification within 18 months of commercial launch.

Target: [YEAR]
Roadmap

SOC 2 Type II

Independent audit of security, availability, and confidentiality controls over a defined observation period. Planned following ISO 27001 certification, given the significant overlap in control requirements.

Target: [YEAR]
Achieved

Data Processing Agreement

A comprehensive DPA — covering processor obligations, sub-processor disclosure, incident notification, and data subject rights — is available to all insurer partners prior to go-live. No lengthy negotiation required for standard terms.

Need more than this page?

Our security pack includes our full control framework, current certification status, sub-processor register, penetration test summary, and DPA — packaged for procurement and information security review teams.

Typically returned within one business day. NDA available on request.