At Lumendash, information security is a top priority. Safeguarding your data is one of our core responsibilities. We are committed to transparency in everything we do—including how we approach security—so you can clearly understand the measures we take to protect your information.
Organisational Security
Lumendash has established a comprehensive security program designed to protect both our internal operations and customer data. Oversight of this program is led by our Chief Technology Officer (CTO), who ensures appropriate security controls are in place and continuously reviewed and enhanced.
Our Security Compliance Approach
We take a transparent stance when it comes to security compliance. This approach enhances our customers’ trust and simplifies the process of conducting Security Due Diligence on our SaaS platform.
Policies
We do not distribute policy documents publicly. If you require specific information, please reach out to your designated sales representative.
Data We Handle
Generally, the data we process is related to cost tracking. This includes metrics such as cost, click counts, sign-ups, and similar performance indicators. The data comes from platforms our customers already use—such as Facebook or LinkedIn—and is only imported into Lumendash when the customer actively chooses to do so. In some rare cases, data fields might include items like customer ID numbers or similar identifiers that could be considered personal data. However, personally identifiable information (PII) is not the primary type of data we manage—our focus is on cost monitoring and performance metrics.
Customer Data Protection
Our security framework is built around preventing unauthorized access to customer data. Information is managed carefully across its full lifecycle, supported by a comprehensive set of security controls.
Information Handling
All information assets are classified using a formal classification matrix. Ownership and responsibility are clearly assigned throughout the organization.
Data in Transit
We protect all data transmitted between customer systems and Lumendash using strong encryption via Transport Layer Security (TLS 1.2).
Data at Rest
All stored data is automatically encrypted using Microsoft-managed keys, securely held in Azure Key Vault.
Data Segmentation
Lumendash is hosted on the Azure Cloud platform. Each customer’s data is logically separated from others, ensuring clear boundaries.
Access Management
Access controls are in place to ensure that only authorized individuals can access specific systems or data. Access is granted based on job function and follows the principles of "Least Privilege" and "Need-to-Know."
Authentication
We secure administrative access to our services using robust authentication methods, including Single Sign-On (SSO).
Privileged Access Management
Privileged access is limited to authorized personnel. All use of elevated access is closely tracked and audited.
Access Reviews
We conduct regular reviews of user access according to a defined process, ensuring that permissions remain appropriate over time.
Customer Authentication Options
Customers can use Single Sign-On (SSO) and Multi-Factor Authentication (MFA) through platforms like Google and Azure Active Directory for secure access.
Risk Management
Effective risk management is central to our business. We aim to foster a strong risk-aware culture that supports our long-term stability and security posture.
Risk Lifecycle
Risks are continuously identified, assessed, and managed. Each risk is evaluated based on likelihood and potential impact, using a standardized risk model.
Secure Development
Our development lifecycle incorporates security at every stage. Security considerations are embedded in all phases of the software development process.
Code Deployment
All updates to production code undergo a peer review that includes checks for security and performance. Before any production deployment, developers confirm that updates function correctly in the staging environment.
Use of Third-Party Software
We maintain an automated process to monitor and address vulnerabilities in third-party software used during development.
Incident Management
Lumendash maintains a formal incident management process that outlines roles, communication protocols, escalation paths, and response procedures for any service or security-related incidents.
Physical Security
Since Lumendash operates within Azure infrastructure, we rely on Microsoft’s robust physical security measures at their data centers. We regularly review independent audits to ensure compliance and performance.
Disaster Recovery
Our services are deployed across multiple Azure availability zones, providing resilience against disruptions caused by natural disasters, power failures, or connectivity issues. Customer data is retained for the duration of the customer’s engagement with Lumendash, or until the customer requests its deletion.
For major disruptions, Lumendash has a comprehensive Business Continuity Plan to ensure continued operations.