Security
Your data security is our top priority. Learn about the measures we take to protect your information.
End-to-End Encryption
All data in transit is encrypted using TLS 1.3. Data at rest is protected with AES-256 encryption.
SOC 2 Type II Compliant
We maintain SOC 2 Type II compliance, demonstrating our commitment to security, availability, and confidentiality.
Regular Audits
We conduct regular security audits and penetration testing with third-party security firms.
Secure Infrastructure
Our infrastructure is hosted on enterprise-grade cloud providers with multiple layers of security.
Access Controls
Role-based access control (RBAC) ensures users only access data they're authorized to view.
Enterprise SSO
Support for SAML 2.0 and OAuth 2.0 enables seamless integration with your identity provider.
Data Protection
Encryption
We use industry-standard encryption to protect your data:
- In Transit: TLS 1.3 encryption for all data transmission
- At Rest: AES-256 encryption for stored data
- Key Management: Hardware security modules (HSMs) for key storage
Data Isolation
Each customer's data is logically isolated within our multi-tenant architecture. We use database-level row security and application-level access controls to ensure complete data separation.
Backup and Recovery
We maintain automated backups with the following characteristics:
- Continuous backups with point-in-time recovery
- Geographic redundancy across multiple regions
- Regular backup restoration testing
- 30-day retention for standard backups
Infrastructure Security
Cloud Infrastructure
Lyceum is hosted on enterprise-grade cloud infrastructure with:
- ISO 27001, SOC 1/2/3, and FedRAMP certified data centers
- Virtual private cloud (VPC) network isolation
- DDoS protection and web application firewall (WAF)
- 24/7 infrastructure monitoring and alerting
Network Security
Our network is protected by multiple layers of security:
- Firewall rules restricting access to essential services only
- Intrusion detection and prevention systems
- Regular vulnerability scanning
- Network segmentation and micro-segmentation
Application Security
Secure Development
Our development practices include:
- Security-focused code reviews
- Automated security testing in CI/CD pipelines
- Static and dynamic application security testing (SAST/DAST)
- Dependency vulnerability scanning
Authentication
We support multiple authentication methods:
- Email and password with strong password requirements
- Multi-factor authentication (MFA) with TOTP or hardware keys
- SAML 2.0 and OAuth 2.0 for enterprise SSO
- Session management with configurable timeouts
Compliance
Lyceum maintains compliance with industry standards and regulations:
SOC 2 Type II
Audited annually for security, availability, and confidentiality
GDPR
Compliant with EU data protection regulations
ISO 27001
Information security management system certified
CCPA
Compliant with California Consumer Privacy Act
Incident Response
We maintain a comprehensive incident response program:
- 24/7 security monitoring and alerting
- Documented incident response procedures
- Regular tabletop exercises and drills
- Post-incident analysis and continuous improvement
In the event of a security incident that affects your data, we will notify you within 72 hours as required by applicable regulations.
Responsible Disclosure
We welcome reports from security researchers. If you discover a vulnerability, please report it responsibly:
Security Team
Email: security@lyceum.io
We aim to acknowledge reports within 24 hours and provide updates on remediation progress.
Contact
For security-related questions or concerns, please contact our security team:
Lyceum Security Team
Email: security@lyceum.io
PGP Key: Available upon request