Axura

Core Concepts

Understand the fundamental concepts and architecture of Axura to get the most out of the platform.
8 min read
Updated: January 2026
Concepts
Architecture
Terminology

Platform Architecture

Axura is built on a modern, secure architecture designed for enterprise scalability and reliability. Here's how the key components work together:

┌─────────────────────────────────────────────────────────────┐ │ AXURA PLATFORM │ ├─────────────────────────────────────────────────────────────┤ │ │ │ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ │ │ │ AWS │ │ GCP │ │ GitHub │ ... │ │ │ Scanner │ │ Scanner │ │ Scanner │ │ │ └──────┬──────┘ └──────┬──────┘ └──────┬──────┘ │ │ │ │ │ │ │ └────────────────┼────────────────┘ │ │ ▼ │ │ ┌───────────────────────┐ │ │ │ Evidence Collector │ │ │ │ & Deduplication │ │ │ └───────────┬───────────┘ │ │ ▼ │ │ ┌───────────────────────┐ │ │ │ Compliance Engine │ │ │ │ (Control Mapping) │ │ │ └───────────┬───────────┘ │ │ ▼ │ │ ┌───────────────────────────────────────────────────────┐ │ │ │ AI Layer │ │ │ │ ┌──────────┐ ┌──────────┐ ┌──────────────────┐ │ │ │ │ │ Copilot │ │ Predict │ │ Auto-Remediation │ │ │ │ │ └──────────┘ └──────────┘ └──────────────────┘ │ │ │ └───────────────────────────────────────────────────────┘ │ │ │ └─────────────────────────────────────────────────────────────┘

Key Terminology

Organizations

An Organization represents your company in Axura. All users, integrations, evidence, and compliance data are scoped to an organization. Multi-tenant isolation ensures your data is completely separate from other customers.

Integrations

Integrations are connections to your external systems like AWS, GitHub, or Okta. Axura uses these connections to scan resources and collect compliance evidence automatically.

Cloud Providers

AWS, GCP, Azure - Infrastructure security scanning

Identity Providers

Okta, Azure AD, Google Workspace - User and access management

Developer Tools

GitHub, GitLab - Code security and repository scanning

Security Tools

Snyk, CrowdStrike, Datadog - Additional security data

Findings

A Finding is a security issue or compliance gap discovered during scanning. Findings have severity levels (Critical, High, Medium, Low) and are mapped to specific compliance controls.

Example Finding:

Title: S3 Bucket Public Access Enabled
Severity: High
Resource: my-company-data-bucket
Controls: SOC 2 CC6.1, ISO 27001 A.9.4.1

Evidence

Evidence is the proof that a compliance control is implemented and working. Axura automatically collects evidence from your integrations, such as screenshots of configurations, policy documents, and scan results.

Controls

Controls are specific requirements from compliance frameworks. For example, SOC 2 has controls like CC6.1 (Logical Access) and CC7.2 (System Monitoring). Axura maps your evidence and findings to these controls automatically.

Frameworks

A Framework is a compliance standard like SOC 2, ISO 27001, or HIPAA. Each framework contains multiple controls organized into categories or domains.

Data Flow

Understanding how data flows through Axura helps you optimize your compliance workflow:

1. Integration Connection

You connect your AWS/GCP/GitHub accounts using secure, read-only credentials.

2. Scheduled Scanning

Axura automatically scans your resources daily (or on-demand) to detect changes.

3. Evidence Collection

Scan results are processed and stored as compliance evidence with timestamps.

4. Control Mapping

Evidence is automatically mapped to relevant compliance framework controls.

5. Finding Generation

Security issues are flagged as findings with severity and remediation guidance.

6. Dashboard Updates

Your compliance score and dashboards update in real-time.

User Roles & Permissions

Axura uses Role-Based Access Control (RBAC) to manage user permissions:

RolePermissions
OwnerFull access, billing, delete organization
AdminManage users, integrations, settings
Compliance ManagerManage controls, evidence, run scans
ViewerRead-only access to dashboards and reports
AuditorSpecial access to audit workspace and evidence

Security Model

💡 Enterprise-Grade Security

Axura follows a zero-trust security model with encryption at rest (AES-256) and in transit (TLS 1.3). All integration credentials are encrypted using AWS KMS with customer-managed keys.

Key security features include:

  • Multi-Factor Authentication (MFA) - Required for all accounts
  • Single Sign-On (SSO) - SAML 2.0 and OIDC support
  • Audit Logging - Immutable logs of all user actions
  • Session Management - Configurable session timeouts and device management
  • IP Allowlisting - Restrict access to specific IP ranges

Next Steps