Security

Security

Security

Last updated on 23 Feb 2024

Security is at the forefront of everything we do at Lancey, and it’s not just about securing our customers. It’s about securing our platform and our customers’ data on that platform.

‍Lancey aligns with the CIS (Center for Internet Security) guidelines to protect your data from unauthorized access, disclosure, inappropriate use, and loss of access. We also extend our stringent requirements to all of our sub-processors to ensure they meet or exceed our standards.

‍Vulnerability Disclosure

‍If you would like to report a vulnerability, please contact security@getlancey.com with a proof of concept, list of tools used, and the output of the tools. If a security disclosure is received, we will work quickly to reproduce each vulnerability to verify its status before taking the steps needed to remedy.

Infrastructure and Network Security

Lancey's infrastructure is hosted on Amazon Web Services (AWS). The AWS data centers are equipped with multiple levels of physical access barriers, that include:

  • Alarms

  • Outer Perimeter Fencing that is crash-rated for vehicles

  • Electronic Access Cards

  • Video Surveillance

  • Internal Trip-Lights

For more information on AWS Security features, you can refer to this whitepaper. Lancey employees do not have physical access to AWS data centers, servers, network equipment, or storage.

The location of the AWS servers are deployed in N. Virginia, USA.

We are not able to provide the exact physical address of the data centre as Amazon has historically been quite reticent in publishing location information of their facilities for security reasons.

We use a combination of automated and manual inspection to determine if new vulnerabilities are introduced in the software packages on our systems. Our Infrastructure team ingests security bulletins and prioritizes remediation according to our internal vulnerability policy.

Logical Access Control

Lancey has full control over all its infrastructure on AWS, and only authorized members at Lancey have access to configure infrastructure when needed in order to add new functionality or respond to incidents.

All access required for control of infrastructure has mandated two-factor (2FA) authentication. The levels of authorization for infrastructure components follow the principle of least privilege.

Penetration Testing

Lancey undergoes grey box penetration testing conducted by an independent third-party agency on an annual basis. For grey box penetration testing, Lancey will provide the agency with an overview of application architecture and information about system endpoints.

Information about any security vulnerabilities successfully exploited through penetration testing is used to set mitigation and remediation priorities.

Third-Party Audit

Amazon Web Services undergoes third-party independent audits and can provide verification of compliance controls for its infrastructure. This includes, but is not limited to, ISO 270001, SOC 2, and PCI.

Intrusion Detection

It’s important to know when suspicious activity is occurring on Lancey's infrastructure. We employ Intrusion Detection Systems (IDS) on each host under our control. This notifies us on common alert channels whenever suspicious activity may occur. Our infrastructure team will check each alert, investigate the activity, and then respond accordingly.

Business Continuity and Disaster Recovery

High Availability

Every part of the Lancey service uses appropriately provisioned, redundant servers (e.g., multiple load balancers, web servers, replica databases) in the case of failure. All our deploys are zero-downtime deploys using Kubernetes, and we implement gradual rollout and rollback of services in the case of deployment errors.

‍Business Continuity

Lancey maintains backups of our production databases using the AWS DocumentDB backup service. Our backups follow good industry practice for production systems allowing us to restore our customers data in the event of data corruption or loss.

Disaster Recovery

Lancey stores all infrastructure as code and as such is able to bring up complete copies of production and staging environments quickly (currently < 24 hours and always improving!).

Data Flow

Data into System

Data is sent back to Lancey's APIs over TLS 1.2 or greater.

Data In Transit

Data is sent from end-user to the Lancey backend via TLS 1.2. All data is AES-256 encrypted at rest.

Data Exfiltration

Lancey maintains intelligent network monitoring at the infrastructure level that limit the surface for data extraction. We scrutinize our preferred partners and integrations to ensure that they comply with necessary security regulations (GDPR, PCI, etc.), before transferring data for processing.

Data Security and Privacy

Data Encryption

All data residing on Lancey servers is automatically encrypted at rest using AWS EBS Encryption using Lancey’s master encryption key stored in AWS Key Management Service. All volumes are encrypted in AWS using the industry-standard AES-256 algorithm.

Lancey only ever sends data over TLS 1.2 or greater, and never downgrades connections to insecure early TLS methods like SSLv3 or TLS 1.0.

Data Removal

Data may be retained after termination of service according to specification within our main customer contract. If data is kept after termination of service for training purposes, Lancey will scrub all personally identifiable information (PII) from customer data. This includes, but is not limited to, usernames, emails, phone numbers, and IPs.

Application Security

Two-Factor Authentication

In addition to password login, two-factor authentication (2FA) provides an added layer of security to Lancey via a time-based one-time password algorithm (TOTP). We encourage 2FA as an important step towards securing data access from bad actors.

Secure Application Development

Lancey practices continuous delivery, which means all code changes are committed, tested, shipped, and iterated on in rapid sequence. A continuous delivery methodology, complemented by pull request reviews, continuous integration (CI), automated security scanning, and automated error tracking, significantly decreases the likelihood of a security issue and improves the mean response time to security vulnerabilities.

Internally, Lancey enforces at least one authorized reviewer for all code changes, and deployments to our production environment are gated under condition that all code is reviewed.

Corporate Security

Risk Management

Lancey uses the CIS Controls Cyber Security Framework to guide and manage our cybersecurity-related risks. The CIS Controls framework was developed by the Center for Internet Security to help private sector organizations assess and improve their ability to prevent, detect, and respond to cyber-attacks.

Lancey enforces at least one authorized reviewer for all code changes, and deployments to our production environment are gated under condition that all code is reviewed. All code changes must go through a series of automated security scans before being deployed to production.

Security Policies

Lancey maintains internal copies of security documentation, which are updated on an ongoing basis and reviewed annually for gaps:

  • Information Security Policy

  • Data Policy

  • Risk Management Framework

  • Incident Response Plan

  • Security Vulnerability Identification

Background Checks

Lancey conducts mandatory background and reference checks for all employees prior to joining our team.

Security Training

Lancey enforces a mandatory security awareness training program for all new and existing Lancey team members that must be completed annually. This security training covers the OWASP Top 10 in relevant programming languages that developers use.

Disclosure Policy

In the event of a data breach, Lancey defers to GDPR regulations, which maintains that customers shall be notified within 72 hours of a data breach, where feasible.

© 2024 Lancey Software Inc. All rights reserved.