Security at Laylah

Last update: September 24, 2024

At Laylah, we prioritize security as a fundamental aspect of our platform. Our commitment stems from a deep concern for your privacy and data integrity, reflecting the same level of protection we would expect for our own information. Laylah is meticulously designed with a focus on safeguarding what matters most to you.

Data Protection Measures

  • Your data is encrypted using state-of-the-art encryption protocols, securing it both during transit and while at rest.
  • Adopting a Zero-Trust paradigm, all communications, even within our servers, are encrypted and authenticated to bolster overall security.
  • Hosted within secure Canadian data centers, Laylah ensures that your data never traverses international borders.
  • Comprehensive backups of your data are stored in secure vaults and replicated across multiple availability zones.
  • Integration credentials are securely housed in a battle-tested secrets vault, ensuring the highest level of protection.
  • Laylah proudly leverages AWS (Amazon Web Services) a SOC 2 compliant provider.

Rigorous Data Isolation

  • Data isolation is enforced at the database connection level, ensuring that your data remains exclusively accessible to you.
  • Each application is strictly confined to accessing only the necessary data for its designated functionality.
  • In instances where our personnel require access for bug resolution or assistance, stringent access controls, including second-factor authentication, are in place to limit and monitor their interactions.

Advanced Access Controls

  • Our authentication and authorization service, certified ISO 27001 and SOC 2, implements state-of-the-art security measures, including multi-factor authentication and secure account recovery.
  • Adhering to industry best practices, Laylah employs robust security measures to safeguard your access to the platform.

Proactive Security Measures

  • Frequent security patches are applied to our systems promptly, ensuring that our platform remains up-to-date with the latest security protocols.
  • All servers are based on hardened system configurations and are updated using the immutability pattern to minimize human error and ensure stricter standards.
  • All servers are regularly tested against baselines to ensure compliance.
  • Our on-guard team monitors and responds to potential security threats in real-time, providing an added layer of protection to your data.
  • Laylah fosters a culture of security awareness with designated security champions who play a crucial role in promoting and enforcing security best practices across all aspects of our operations.
  • Our security champions undergo regular training and are instrumental in maintaining a vigilant and proactive security stance within the organization.

Pursuing Certification Excellence

  • Laylah is actively pursuing certification, collaborating closely with cybersecurity experts to achieve recognized industry standards.
  • Our ongoing efforts are aimed at continually enhancing our security posture, ensuring Laylah remains at the forefront of secure and certified platforms.