🔒

Security

Security is part of our DNA.

We believe security is more important than a checklist — we adopt it as a mindset. From how we approach infrastructure to how we onboard and offboard employees. We protect your data at every layer.

📑
Download our Security Whitepaper here!
Lumos_Security_Whitepaper.pdf513.0KB

Deploying within minutes without agents.

We care about fast and straightforward rollouts and designed Lumos with security and efficiency top of mind. By connecting with native Office 365 and GSuite APIs, you receive a source of truth for all your applications. No agents, network access, or other end-user installs are required.

image
image

SOC 2 Type II.

The Service and Organization Controls (SOC 2) is an industry-recognized attestation report given to a company after an audit of the company’s internal practices. Our SOC 2 report demonstrates that we have the appropriate controls in place to keep customer data secure, confidential, and available.

Encrypted with highest standards.

We encrypt at transit and at rest with secure protocols, including AES256 and TLS1.2+. Our encryption keys are based on AWS's Key Management Service. We rotate them on a periodic basis and protect the creation, storage, retrieval, and destruction of secrets.

image
image

Keeping our networks safe.

We deploy our infrastructure on a secure Virtual Private Cloud (VPC). We maintain compute and storage infrastructure in private-only subnets and control access through IP and port-based firewalls. Endpoint monitoring software on employee workstations and servers ensure that we keep our infrastructure secure and your data safe.

image

Penetration Testing

We regularly work with third party firms to identify and remediate security vulnerabilities. We welcome vulnerability report submissions.

image

Security Controls

We continuously monitor the operation of our security controls. This ensures we stay up to date and follow best practices (e.g. MFA).

image

Employee Training

We require security training from all employees. All developers complete a secure coding training which includes the OWASP Top 10 vulnerabilities.

Policies & Subprocessors

🔒 Privacy Notice

🤝 Terms and Conditions

📄Subprocessor List

Contact Us

💡
We welcome all responsible vulnerability disclosure reports. If you have found a security issue in any of our services, we want to know about it! Also, if you have any questions, send us a note at security@lumosidentity.com.
image
💫Why Lumos?

You already use Okta or BetterCloud? Great! Click here to find out about how Lumos fits into your current tech stack.

image
The Lumos Identity PlatformThe Lumos Identity Platform

Go back to the main page and find out how you can discover, unite and manage all your apps and identities with Lumos.