Security

How we protect your data and infrastructure.

Infrastructure Security

  • Private VPC with network segmentation
  • WAF and DDoS protection via AWS Shield
  • Regular penetration testing
  • Immutable infrastructure with automated patching

Data Protection

  • AES-256 encryption at rest
  • TLS 1.3 for all data in transit
  • Zero-retention policy for screen captures
  • Customer data isolation per tenant

Access Control

  • Mandatory MFA for all accounts
  • Role-based access control (RBAC)
  • Just-in-time privileged access
  • Session logging and monitoring

Monitoring & Response

  • 24/7 security monitoring via Aikido
  • Real-time vulnerability scanning
  • Automated incident alerting
  • Defined incident response procedures

Responsible Disclosure

We value the security research community. If you discover a security vulnerability, please report it responsibly.

01

Report: Email security@legacybridge.software with details of the vulnerability

02

Response: We will acknowledge receipt within 24 hours

03

Resolution: We will work with you to understand and remediate the issue

04

Recognition: With your permission, we will acknowledge your contribution

For compliance certifications and regulatory alignment, see our Compliance page.

View Compliance Details

Security Questions?

Our team is happy to discuss our security practices in detail.

Contact Security Team