Security
How we protect your data and infrastructure.
Infrastructure Security
- ›Private VPC with network segmentation
- ›WAF and DDoS protection via AWS Shield
- ›Regular penetration testing
- ›Immutable infrastructure with automated patching
Data Protection
- ›AES-256 encryption at rest
- ›TLS 1.3 for all data in transit
- ›Zero-retention policy for screen captures
- ›Customer data isolation per tenant
Access Control
- ›Mandatory MFA for all accounts
- ›Role-based access control (RBAC)
- ›Just-in-time privileged access
- ›Session logging and monitoring
Monitoring & Response
- ›24/7 security monitoring via Aikido
- ›Real-time vulnerability scanning
- ›Automated incident alerting
- ›Defined incident response procedures
Responsible Disclosure
We value the security research community. If you discover a security vulnerability, please report it responsibly.
01
Report: Email security@legacybridge.software with details of the vulnerability
02
Response: We will acknowledge receipt within 24 hours
03
Resolution: We will work with you to understand and remediate the issue
04
Recognition: With your permission, we will acknowledge your contribution
For compliance certifications and regulatory alignment, see our Compliance page.
View Compliance DetailsSecurity Questions?
Our team is happy to discuss our security practices in detail.
Contact Security Team