Compliance and verification
We validate our security controls through regular, independent audits. Our SOC 2 Type 1 report, covering key trust criteria, is available to customers under an NDA.
LeanSuite’s enterprise-grade program, validated by SOC 2 compliance, is built to protect your most critical operational data through a transparent culture of security.
SOC 2 Type 1 Compliant
Microsoft Azure Infrastructure
Data Encryption In-Transit & At-rest
Single Sign on (SSO) Enabled
Our security program is comprehensive, extending from our infrastructure and development practices to our company policies and third-party validations.
We validate our security controls through regular, independent audits. Our SOC 2 Type 1 report, covering key trust criteria, is available to customers under an NDA.
Built on world-class infrastructure from Microsoft Azure, our platform provides exceptional physical security, network monitoring, and redundancy, protected by advanced firewalls and DDoS mitigation.
We protect your data with end-to-end encryption. All data is encrypted in-transit (TLS 1.2+) and at-rest (AES-256), covering all production databases, file stores, and backups.
Our platform enforces strict access controls through Role-Based Access Control (RBAC) and Single Sign-On (SSO), ensuring users only access authorized data and can authenticate securely.
Security is a shared responsibility. We provide a secure platform, and you control how it's used within your organization.
Maintaining the security and availability of the cloud infrastructure.
Securing the application against vulnerabilities.
Protecting the confidentiality and integrity of your data within our platform.
Managing your users and their access permissions.
Enforcing strong password policies or using SSO.
Securing the devices you use to access the LeanSuite platform.
Our policies and procedures are designed to ensure our service remains available and secure, protecting your operations from disruption.
Our team is our first line of defence. All employees undergo background checks, receive annual security training, and are bound by strict confidentiality agreements.
We ensure high availability with regular automated backups, multi-zone infrastructure, and a robust disaster recovery plan to restore service promptly.
In the event of an incident, our formal response plan guides our team through detection, containment, investigation, notification, and post-mortem analysis to prevent recurrence.