Document Version: 3.2 - Public
Last Updated: September 2025
Next Review Date: December 2025
Contact: support@dexlabs.io
This is the public version of our Information Security Policy. For organizations requiring more detailed security documentation, including technical specifications, implementation details, and compliance reports, please contact us at support@dexlabs.io. We provide comprehensive security documentation on an on-demand basis to support your vendor assessment and compliance requirements.
Key Principles:
dex Tecnologia LTDA is committed to maintaining the highest standards of information security to protect our customers' data, business operations, and privacy. This policy demonstrates our dedication to implementing enterprise-grade security controls while enabling innovative data engineering solutions.
We understand that your data is your most valuable asset. Our security framework is designed around a fundamental principle: your data remains exclusively under your control. Through our innovative control/data plane architecture, customer business data never leaves your own cloud environment, ensuring complete data sovereignty and regulatory compliance.
dex operates using a sophisticated control and data plane separation that provides unmatched security and compliance benefits:
This architectural approach ensures that your data enjoys the same security protections as your existing cloud infrastructure while benefiting from our advanced data engineering capabilities.
Our Commitments:
We align our security practices with globally recognized frameworks including the AWS Well-Architected Security Pillar, OWASP Security Guidelines, and ISO 27001 principles. Our approach ensures comprehensive security coverage while preparing for formal compliance certifications.
dex maintains full compliance with applicable data protection regulations including GDPR for European customers and LGPD for Brazilian operations. Our architectural approach simplifies compliance by ensuring your data processing occurs within your own jurisdiction and security controls.
We are actively pursuing SOC 2 Type I certification to provide third-party validation of our security controls. Through our AWS partnership, we inherit numerous enterprise-grade security certifications and maintain alignment with global security standards.
Security Features:
Every interaction with dex systems requires multi-factor authentication, ensuring that only authorized individuals can access platform capabilities. We implement zero-trust principles where authentication is required for every system interaction.
Our unique architecture means that even after authenticating with dex, users must also satisfy your organization's own cloud security requirements to access data and execute operations. This dual-layer approach provides enhanced protection through customer-controlled security policies.
Access to sensitive system functions follows strict approval processes with regular reviews to ensure continued appropriateness. We implement the principle of least privilege throughout our systems, ensuring users receive only the minimum access necessary for their functions.
Encryption Standards:
All data communications utilize TLS 1.3 encryption, providing strong protection against interception. Customer credentials and sensitive information receive additional encryption layers using advanced cryptographic techniques.
Our architectural approach ensures that your business data never leaves your cloud environment. Data flows directly from third-party APIs (like TikTok Shop) into your own storage systems, with dex orchestrating the processing without ever storing or caching your information.
Complete audit trails document all data operations, providing full transparency into how your data is accessed and processed. These logs support compliance requirements and incident investigation capabilities.
Technical Safeguards:
Our infrastructure leverages AWS enterprise security controls, including native firewalls, DDoS protection, and comprehensive monitoring systems. Multi-region deployment provides both security and operational resilience.
Continuous security monitoring provides real-time threat detection and automated response capabilities. Our development pipeline includes automated security scanning to identify and address vulnerabilities before they reach production systems.
All applications run in secure containerized environments with comprehensive image scanning and validation. Our development practices follow secure coding guidelines with regular security assessments.
Resilience Features:
Privacy Commitments:
Validation Programs:
For security-related questions, concerns, or incident reporting:
Email: support@dexlabs.io
Website: https://www.dexlabs.io
Business Hours: Standard support during business hours, emergency response available 24/7
For compliance-related inquiries, data processing questions, or privacy concerns:
General Inquiries: support@dexlabs.io
Privacy Requests: Include "Privacy Request" in subject line
Company Information: dex Tecnologia LTDA, CNPJ: 48.412.896/0001-42
This security policy is reviewed quarterly and updated as needed to reflect changes in our security practices, regulatory requirements, or business operations. We notify customers of material changes to our security practices and maintain transparency about our ongoing security improvements.
For the most current version of this policy and additional security information, visit our website at https://www.dexlabs.io/security.
This policy demonstrates dex's commitment to maintaining the highest standards of information security while enabling innovative data engineering solutions for our customers.