Product security

Audit logging

Legisys supports audit logs (metadata only, no content) and a Workspaces query history (including content).

Data security

Legisys employs rigorous security measures to ensure the confidentiality, the integrity, and the availability of customer data.

All of our employees use phishing-resistant multi-factor authentication (where feasible) and identities are centrally managed.

2FA / MFA

Role-Based Access Control (RBAC)

We follow the principle of ‘Least Privilege’ and only grant users the minimum number of permissions required.

SSO

Legisys supports SAML 2.0 for Single Sign-On. Please contact us for setup instructions.

Organizational management

Legisys includes team management features that allow for granular control over what each user can access and perform within the application.

Data security

Data erasure

All customer data and content is securely deleted within 30 days of contract termination or upon request.

Data is encrypted at-rest using AES 256 encryption.

Encryption at-rest

We use TLS 1.2 or TLS 1.3 to encrypt data in-transit.

Encryption in-transit

Geographic location of data

All our cloud providers have their servers within the EU.

We are 100% cloud-based and we use Microsoft Azure and Google Cloud Platform as cloud providers. Their data centers offer best in class physical security protocols.

Physical security

Secret management

We rotate encryption keys and important secret keys at least annually and utilize hardware security modules to safeguard critical encryption keys. Legisys logically separates encryption keys from customer data.

Network security

Firewall

Our networks are segmented and utilize firewalls at strategic positions. We also utilize Web Application Firewalls (WAFs).

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are used to monitor for and prevent unauthorized access to the Legisys network.

IDS/IPS

Legisys maintains a Zero Trust network architecture. That architecture is used to protect our organization’s resources by using a combination of signals, such as IP addresses, multi-factor authentication, user behavior, and more to determine whether a user should be allowed access to an application or a server.

Zero Trust

Network Time Protocol (NTP)

Legisys uses widely trusted NTP servers, such as those operated by NIST.

Formal business continuity procedures are developed and documented by Legisys. The purpose of these procedures is to prepare the organization in the event of service outages caused by factors beyond our control, and to restore services to the widest extent possible in a minimum time frame. The policy is reviewed and updated periodically to reflect relevant organizational changes, threats, risks, laws, regulations, and contractual requirements. The policy is also tested on an annual basis to ensure its effectiveness and alignment with our business objectives.

DR protocol

Anti-DDos

Legisys has deployed a solution to protect against denial of service attacks.

Sub-processors

Microsoft Azure

Provider of cloud infrastructure

Provider of cloud infrastructure, MLOps services and infrastructure management

Google Cloud Platform

AI service provider

OpenAI