How does customer data flow through the Zero-X system?

The data flow in Zero-X follows a secure, multi-stage process

Stage 1: Data Source Connection

1. Initial Setup: You provide cloud provider credentials through the Zero-X dashboard
2. Encryption: Credentials are immediately encrypted using AES-256-GCM before storage
3. Validation: Zero-X validates the connection and verifies access permissions
4. Storage: Encrypted credentials are stored in our secure database, isolated by organization

Stage 3: Data Processing

1. Analysis: Collected data is analyzed for security vulnerabilities, compliance violations, and misconfigurations
2. Enrichment: Data is enriched with threat intelligence, compliance mappings, and risk scoring
3. Correlation: Security events are correlated to identify incidents and patterns
4. Storage: Processed data is stored in our multi-tenant database with strict organization isolation

Stage 2: Data Collection

1. Scheduled Syncs: Zero-X performs periodic synchronization with your cloud providers (configurable frequency)
2. API Calls: Secure API calls are made to cloud provider APIs using your encrypted credentials
3. Data Retrieval: Resource inventory, security configurations, compliance status, and cost data are retrieved
4. Real-time Events: Security events are collected in real-time from SIEM/XDR integrations (Wazuh, CloudTrail, etc.)

Stage 4: Data Presentation

1. Dashboard: Security findings, compliance status, and insights are displayed in your organization’s dashboard
2. Reports: Customizable reports are generated for compliance audits and security reviews
3. Alerts: Security alerts and notifications are sent based on your configured thresholds
4. APIs: Data is accessible through secure APIs for integration with your existing tools

Stage 5: Data Retention and Deletion

1. Retention: Data is retained according to your subscription plan’s data retention policy (typically 30-90 days, configurable)
2. Deletion on Request: You can request immediate deletion of your data at any time
3. Automatic Cleanup: When you disconnect a data source, associated data is marked for deletion
4. Secure Deletion: Deleted data is securely purged from our systems following industry best practices

Key Security Features:

  • All data is isolated by organization ID at the database level
  • Data never flows between different customer organizations
  • All API communications use TLS 1.2 or higher encryption
  • Access to data requires proper authentication and authorization