Security
How we protect your data and infrastructure.
Infrastructure Security
- ›Private VPC with network segmentation
- ›AWS-managed infrastructure protection
- ›Immutable infrastructure with automated patching
- ›CloudFront-restricted access to application load balancer
Data Protection
- ›AWS-managed encryption at rest
- ›TLS 1.3 for all data in transit
- ›Zero-retention policy for screen captures
- ›Customer data isolation per tenant
Access Control
- ›Mandatory MFA for all accounts
- ›Role-based access control (RBAC)
- ›Just-in-time privileged access
- ›Session logging and monitoring
Monitoring & Response
- ›Automated vulnerability scanning via Aikido
- ›Code and dependency security analysis
- ›Automated incident alerting
- ›Defined incident response procedures
Responsible Disclosure
We value the security research community. If you discover a security vulnerability, please report it responsibly.
01
Report: Email security@legacybridge.software with details of the vulnerability
02
Response: We will acknowledge receipt within 24 hours
03
Resolution: We will work with you to understand and remediate the issue
04
Recognition: With your permission, we will acknowledge your contribution
For compliance certifications and regulatory alignment, see our Compliance page.
View Compliance DetailsSecurity Questions?
Our team is happy to discuss our security practices in detail.
Contact Security Team