Security

Your data security is our top priority. Learn about the measures we take to protect your information.

End-to-End Encryption

All data in transit is encrypted using TLS 1.3. Data at rest is protected with AES-256 encryption.

SOC 2 Type II Compliant

We maintain SOC 2 Type II compliance, demonstrating our commitment to security, availability, and confidentiality.

Regular Audits

We conduct regular security audits and penetration testing with third-party security firms.

Secure Infrastructure

Our infrastructure is hosted on enterprise-grade cloud providers with multiple layers of security.

Access Controls

Role-based access control (RBAC) ensures users only access data they're authorized to view.

Enterprise SSO

Support for SAML 2.0 and OAuth 2.0 enables seamless integration with your identity provider.

Data Protection

Encryption

We use industry-standard encryption to protect your data:

  • In Transit: TLS 1.3 encryption for all data transmission
  • At Rest: AES-256 encryption for stored data
  • Key Management: Hardware security modules (HSMs) for key storage

Data Isolation

Each customer's data is logically isolated within our multi-tenant architecture. We use database-level row security and application-level access controls to ensure complete data separation.

Backup and Recovery

We maintain automated backups with the following characteristics:

  • Continuous backups with point-in-time recovery
  • Geographic redundancy across multiple regions
  • Regular backup restoration testing
  • 30-day retention for standard backups

Infrastructure Security

Cloud Infrastructure

Lyceum is hosted on enterprise-grade cloud infrastructure with:

  • ISO 27001, SOC 1/2/3, and FedRAMP certified data centers
  • Virtual private cloud (VPC) network isolation
  • DDoS protection and web application firewall (WAF)
  • 24/7 infrastructure monitoring and alerting

Network Security

Our network is protected by multiple layers of security:

  • Firewall rules restricting access to essential services only
  • Intrusion detection and prevention systems
  • Regular vulnerability scanning
  • Network segmentation and micro-segmentation

Application Security

Secure Development

Our development practices include:

  • Security-focused code reviews
  • Automated security testing in CI/CD pipelines
  • Static and dynamic application security testing (SAST/DAST)
  • Dependency vulnerability scanning

Authentication

We support multiple authentication methods:

  • Email and password with strong password requirements
  • Multi-factor authentication (MFA) with TOTP or hardware keys
  • SAML 2.0 and OAuth 2.0 for enterprise SSO
  • Session management with configurable timeouts

Compliance

Lyceum maintains compliance with industry standards and regulations:

SOC 2 Type II

Audited annually for security, availability, and confidentiality

GDPR

Compliant with EU data protection regulations

ISO 27001

Information security management system certified

CCPA

Compliant with California Consumer Privacy Act

Incident Response

We maintain a comprehensive incident response program:

  • 24/7 security monitoring and alerting
  • Documented incident response procedures
  • Regular tabletop exercises and drills
  • Post-incident analysis and continuous improvement

In the event of a security incident that affects your data, we will notify you within 72 hours as required by applicable regulations.

Responsible Disclosure

We welcome reports from security researchers. If you discover a vulnerability, please report it responsibly:

Security Team

Email: security@lyceum.io

We aim to acknowledge reports within 24 hours and provide updates on remediation progress.

Contact

For security-related questions or concerns, please contact our security team:

Lyceum Security Team

Email: security@lyceum.io

PGP Key: Available upon request