Security Policy
Last Updated: December 2024
Encryption
AES-256 at rest, TLS 1.3 in transit
Best Practices
Industry-standard controls
Access Control
RBAC with SSO support
Infrastructure
Enterprise cloud hosting
Our Security Commitment
At LMSMore, security is foundational to everything we build. We understand that our customers trust us with sensitive learning data, employee information, and business-critical content. We take this responsibility seriously.
Our security program is designed around industry best practices and is continuously improved based on evolving threats, customer requirements, and independent assessments. We maintain a security-first culture where every team member is accountable for protecting customer data.
Infrastructure Security
LMSMore is hosted on enterprise-grade cloud infrastructure with security certifications including SOC 2, ISO 27001, and FedRAMP. Our infrastructure includes:
- Geographic Redundancy: Data is replicated across multiple availability zones to ensure high availability and disaster recovery
- Network Security: Virtual private clouds, firewalls, intrusion detection systems, and DDoS protection
- Physical Security: Data centers feature 24/7 security, biometric access controls, and surveillance
- Backup and Recovery: Automated daily backups with point-in-time recovery capabilities
- Uptime SLA: 99.9% availability commitment for enterprise customers
Data Encryption
All customer data is encrypted both at rest and in transit:
- Encryption at Rest: All data stored in our databases and file storage is encrypted using AES-256 encryption
- Encryption in Transit: All data transmitted between clients and our servers uses TLS 1.3 encryption
- Key Management: Encryption keys are managed through a dedicated key management service with automatic rotation
- Database Encryption: Database connections are encrypted, and sensitive fields receive additional application-level encryption
Access Controls
We implement robust access control mechanisms to ensure only authorized users can access data:
- Role-Based Access Control (RBAC): Granular permissions based on user roles within your organization
- Single Sign-On (SSO): Support for SAML 2.0 and OIDC integration with identity providers including Okta, Azure AD, Google Workspace, and others
- Multi-Factor Authentication (MFA): Optional MFA for additional account security
- Session Management: Configurable session timeouts and automatic logout for inactive sessions
- API Authentication: Secure API key management with scoped permissions and rotation capabilities
Multi-Tenant Security
LMSMore's multi-tenant architecture is designed with security as a core principle:
- Logical Data Isolation: Each tenant's data is logically separated at the database level
- Tenant-Scoped Access: All queries and operations are automatically scoped to the authenticated tenant
- Cross-Tenant Prevention: Technical controls prevent any cross-tenant data access
- Per-Tenant Encryption: Enterprise customers can have dedicated encryption keys for their tenant
- Audit Logging: All administrative actions are logged with tenant context for compliance and forensics
Application Security
Security is integrated into every phase of our software development lifecycle:
- Secure Development: Security requirements are defined at the design phase, with threat modeling for new features
- Code Reviews: All code changes undergo peer review with security-focused checklists
- Static Analysis: Automated security scanning of code for vulnerabilities
- Dependency Scanning: Continuous monitoring of third-party dependencies for known vulnerabilities
- Penetration Testing: Annual third-party penetration tests with remediation tracking
- Bug Bounty: We welcome responsible security researchers to report vulnerabilities
Compliance
LMSMore maintains compliance with industry standards and regulations:
- Security Best Practices: Controls aligned with industry standards for security, availability, and confidentiality
- GDPR: Compliance with the EU General Data Protection Regulation, including data subject rights and data processing agreements
- CCPA: Compliance with the California Consumer Privacy Act
Enterprise customers can request our security documentation under NDA.
Incident Response
We maintain a comprehensive incident response program:
- 24/7 Monitoring: Continuous monitoring of systems for security anomalies and threats
- Incident Classification: Defined severity levels and response procedures for different incident types
- Response Team: Dedicated security team with defined roles and escalation paths
- Customer Notification: Affected customers are notified within 72 hours of confirmed security incidents, as required by GDPR and industry best practices
- Post-Incident Review: Root cause analysis and remediation for all security incidents
Vendor and Third-Party Security
We carefully evaluate and monitor the security of our third-party vendors:
- Vendor Assessment: Security reviews of all vendors with access to customer data
- Contractual Requirements: Data processing agreements and security requirements with all sub-processors
- Contentful Partnership: Our integration with Contentful is built with security best practices, using scoped API tokens and secure webhooks
- Ongoing Monitoring: Regular review of vendor security posture and compliance status
API Security
Our APIs are designed with security as a priority:
- Authentication: API keys and OAuth 2.0 bearer tokens for authentication
- Rate Limiting: Protection against abuse with configurable rate limits
- Input Validation: Strict validation of all API inputs to prevent injection attacks
- Webhook Security: HMAC signatures for webhook payloads to verify authenticity
- Audit Logging: All API calls are logged for security monitoring and troubleshooting
Employee Security
Our internal security practices ensure our team can be trusted with customer data:
- Background Checks: All employees undergo background verification
- Security Training: Regular security awareness training for all employees
- Least Privilege: Employees only have access to systems required for their role
- Access Reviews: Regular reviews of employee access rights
- Offboarding: Immediate access revocation upon employee departure
Reporting Security Issues
We value the security research community and welcome responsible disclosure of security vulnerabilities.
If you believe you have discovered a security vulnerability in LMSMore, please report it to us at:
Security Team
Email: security@lmsmore.com
Please include a detailed description of the vulnerability, steps to reproduce, and any relevant screenshots or proof of concept.
We commit to:
- Acknowledging your report within 48 hours
- Providing regular updates on our investigation
- Not pursuing legal action against good-faith security researchers
- Crediting researchers who responsibly disclose vulnerabilities (with permission)
Contact Us
For security-related inquiries, enterprise security questionnaires, or to request compliance documentation: