Skip to content

Plixo Documentation

Guidance for onboarding, billing administration, troubleshooting, and production operations.

Security & Compliance Overview

Last Updated: 2025-12-02 10:22 UTC

Personas: CFO / Controller / Legal / Compliance

What you'll learn

  • Understand Plixo's approach to data access, encryption, and custody.
  • Review how webhooks and tokens protect payer interactions.
  • See current certifications, roadmap items, and incident response commitments.

Step-by-step

  1. Data access & tenancy.
    • Each customer organization is isolated; users only see data for the orgs they belong to.
    • Role-based permissions (RBAC) ensure least-privilege access. Export controls require Controller approval.
  2. Encryption & custody.
    • Plixo relies on Stripe for payment processing; no PAN data is stored in Plixo systems.
    • All data is encrypted at rest (AES-256) and in transit (TLS 1.2+). Secrets are managed in a dedicated vault.
  3. Webhooks & tokens.
    • Mini-portal links are single-use tokens signed with HMAC and expire automatically.
    • Stripe and ERP webhooks are signed; Plixo validates signatures before processing events.
  4. Certifications & roadmap.
    • Plixo is pursuing SOC 2 Type I with an external auditor; Type II is on the roadmap for next year.
    • Annual third-party penetration tests cover application and infrastructure layers. Sub-processors are listed in the customer trust portal; data residency options (EU, US) are planned for future releases.
  5. Incident response.
    • Incidents are classified as P1 (payments blocked), P2 (degraded), or P3 (non-critical). Plixo notifies Controllers and Billing Admins via email and in-app banners.
    • Customers must update contact information and participate in joint remediation when issues involve their systems (e.g., ERP downtime).

Success checks

  • Security reviews for procurement can be satisfied using this overview and the trust portal.
  • Teams know where to find sub-processor and penetration test information.
  • Incident contacts are up to date in Plixo.

Common pitfalls

  • Assuming Plixo stores card data. Remind stakeholders Stripe maintains custody.
  • Not updating incident contacts. Keep distribution lists current so alerts reach the right people.
  • Overlooking roadmap timelines. Communicate SOC 2 Type II timing to auditors early.

Changelog

2025.10
  • Ops console readiness dashboard
  • Maintenance toggle + cron pause commands
  • Docs portal initial release
2025.09
  • Deliverability warmup scheduler
  • Cash App Assist enhancements