For Board & Enterprise Risk Review

Enterprise Security & Compliance

OpexSnip was built from first principles with enterprise security as a primary constraint — not an afterthought. This page is intended for CISOs, CFOs, and enterprise risk teams evaluating OpexSnip as a vendor.

Data Access Architecture

OpexSnip connects to your Microsoft 365 tenant via read-only API. We access only the data strictly required to quantify inactive capital. We never request, hold, or exercise write access to any client system.

PropertySpecification
Access ModelRead-only OAuth 2.0 tokens. Zero write permissions requested or granted across all instances.
App RegistrationSingle-tenant. Client registers the app in their own Azure AD tenant — OpexSnip never has multi-tenant access.
Required PermissionsReports.Read.All · User.Read.All · Directory.Read.All — minimum viable footprint, universally read-only.
Data ResidencyAll telemetry processed and stored in-region (US-East). No cross-border transfer of PII.
PII ExposureOpexSnip ingests license metadata and usage timestamps only. Absolute zero access to email, files, or user communications.
Token StorageAPI credentials stored in an encrypted vault (AES-256). Rotated every 90 days. Client-revocable at any moment.
Raw Data HandlingRaw Microsoft 365 usage data is processed in-memory and never written to disk. Only computed waste outcomes are stored.

The Access Boundary

✓ What OpexSnip Accesses

·License assignment configurations
·Last sign-in timestamp per user
·User display name and department
·Aggregated activity statistics
·License SKU and product metadata

✗ What OpexSnip Never Accesses

·Email content or routing metadata
·Calendar data or meeting structures
·SharePoint or OneDrive files
·Teams messages or chat history
·Personal communications of any mechanism

Encryption & Transmission

PropertySpecification
Data in TransitTLS 1.3 enforced on all API connections. TLS 1.2 minimum accepted limit.
Data at RestAES-256 encryption across all storage components and database rows.
CSV Upload FilesAuto-eradicated from storage within 1 hour of successful processing. Never persisted.
Board-Ready PDF ReportsStored in private silo. Accessible via signed URLs only — never publicly exposed.
Backup PolicyEncrypted daily snapshots. 30-day retention. Disaster recovery RTO: 4 hours.

Compliance Frameworks

StandardStatusVerification
SOC 2 Type II In Progress Vanta compliance protocol active. Target completion: Q4 2026. Executive report available under NDA.
ISO 27001 In Progress Controls mapped strictly to ISO 27001 Annex A. Formal external audit scheduled Q3 2026.
GDPR Aligned Data Processing Agreement (DPA) available for EU engagements. Zero external sale of client data.
CCPA Aligned California Consumer Privacy Act integrity maintained. No data trading or broker exchanges.
HIPAA BAA Available Business Associate Agreement available for healthcare clients, despite PHI access implicitly bypassed by protocol.

Questions for Your Enterprise Risk Team?

We provide a dedicated security questionnaire response package for CFO and CISO vendor reviews. NDA executed before any data integration occurs.

Engage Security Team