Security at Laylah
Last update: September 24, 2024
At Laylah, we prioritize security as a fundamental aspect of our platform. Our commitment stems from a deep concern for your privacy and data integrity, reflecting the same level of protection we would expect for our own information. Laylah is meticulously designed with a focus on safeguarding what matters most to you.
Data Protection Measures
- Your data is encrypted using state-of-the-art encryption protocols, securing it both during transit and while at rest.
- Adopting a Zero-Trust paradigm, all communications, even within our servers, are encrypted and authenticated to bolster overall security.
- Hosted within secure Canadian data centers, Laylah ensures that your data never traverses international borders.
- Comprehensive backups of your data are stored in secure vaults and replicated across multiple availability zones.
- Integration credentials are securely housed in a battle-tested secrets vault, ensuring the highest level of protection.
- Laylah proudly leverages AWS (Amazon Web Services) a SOC 2 compliant provider.
Rigorous Data Isolation
- Data isolation is enforced at the database connection level, ensuring that your data remains exclusively accessible to you.
- Each application is strictly confined to accessing only the necessary data for its designated functionality.
- In instances where our personnel require access for bug resolution or assistance, stringent access controls, including second-factor authentication, are in place to limit and monitor their interactions.
Advanced Access Controls
- Our authentication and authorization service, certified ISO 27001 and SOC 2, implements state-of-the-art security measures, including multi-factor authentication and secure account recovery.
- Adhering to industry best practices, Laylah employs robust security measures to safeguard your access to the platform.
Proactive Security Measures
- Frequent security patches are applied to our systems promptly, ensuring that our platform remains up-to-date with the latest security protocols.
- All servers are based on hardened system configurations and are updated using the immutability pattern to minimize human error and ensure stricter standards.
- All servers are regularly tested against baselines to ensure compliance.
- Our on-guard team monitors and responds to potential security threats in real-time, providing an added layer of protection to your data.
- Laylah fosters a culture of security awareness with designated security champions who play a crucial role in promoting and enforcing security best practices across all aspects of our operations.
- Our security champions undergo regular training and are instrumental in maintaining a vigilant and proactive security stance within the organization.
Pursuing Certification Excellence
- Laylah is actively pursuing certification, collaborating closely with cybersecurity experts to achieve recognized industry standards.
- Our ongoing efforts are aimed at continually enhancing our security posture, ensuring Laylah remains at the forefront of secure and certified platforms.