Company
Security
We treat security as an engineering discipline, not a checklist. Our infrastructure, processes, and products are designed with security as a first-class requirement at every layer.
Security Practices
Data Encryption
All data encrypted at rest (AES-256) and in transit (TLS 1.3). Encryption keys managed via hardware security modules.
Access Control
Role-based access control with principle of least privilege. All privileged access logged and reviewed.
Vulnerability Management
Continuous automated scanning, regular third-party penetration testing, and a responsible disclosure programme.
Incident Response
Documented incident response plans with defined SLAs, escalation paths, and post-incident reviews.
SOC 2 Type II
Annual SOC 2 Type II audits covering security, availability, and confidentiality trust service criteria.
Zero Trust Network
No implicit trust. Every access request is verified against identity, device posture, and context.
Report a Vulnerability
If you have discovered a security vulnerability in our systems or products, we appreciate responsible disclosure. Please contact our security team directly and we will respond within 48 hours.
hello@leangoogsai.orgNeed our security documentation?
SOC 2 reports and security questionnaires available under NDA.