Book a DemoSign In

Company

Security

We treat security as an engineering discipline, not a checklist. Our infrastructure, processes, and products are designed with security as a first-class requirement at every layer.

Security Practices

Data Encryption

All data encrypted at rest (AES-256) and in transit (TLS 1.3). Encryption keys managed via hardware security modules.

Access Control

Role-based access control with principle of least privilege. All privileged access logged and reviewed.

Vulnerability Management

Continuous automated scanning, regular third-party penetration testing, and a responsible disclosure programme.

Incident Response

Documented incident response plans with defined SLAs, escalation paths, and post-incident reviews.

SOC 2 Type II

Annual SOC 2 Type II audits covering security, availability, and confidentiality trust service criteria.

Zero Trust Network

No implicit trust. Every access request is verified against identity, device posture, and context.

Report a Vulnerability

If you have discovered a security vulnerability in our systems or products, we appreciate responsible disclosure. Please contact our security team directly and we will respond within 48 hours.

hello@leangoogsai.org

Need our security documentation?

SOC 2 reports and security questionnaires available under NDA.

Request Docs