Lumify
  • How it works
  • Use cases
  • Pricing
  • FAQ
  • Sign in
  • Join Beta

Security Policy

Last Updated: January 1, 2025

Lumify AI, Inc. ("Lumify," "we," or "us") is committed to maintaining a secure, reliable, and resilient platform for all customers. Lumify is an early-stage SaaS provider and has not yet undergone a SOC 2 audit, but our security program is intentionally designed to align with SOC 2, ISO 27001, and NIST CSF principles. This policy describes the controls, practices, and safeguards we maintain to protect customer data and ensure the secure operation of our platform.

Lumify's infrastructure is hosted on Google Cloud Platform (GCP), and all public-facing traffic is routed through Cloudflare, our global edge security provider.

1. Security Program Overview

Lumify's security program is designed to:

  • Protect the confidentiality, integrity, and availability of customer data
  • Prevent, detect, and respond to security threats
  • Reduce operational risk
  • Support customer trust as Lumify scales

We employ administrative, technical, and physical controls aligned with industry-leading standards, even though Lumify has not yet completed SOC 2 certification.

2. Roles & Responsibilities

  • Leadership oversees security strategy, governance, and resource allocation.
  • Engineering & DevOps implement secure coding, infrastructure hardening, and system monitoring.
  • All personnel follow Lumify's security and confidentiality requirements and undergo training.
  • Access to systems and data is strictly limited to those with a legitimate business purpose.

3. Infrastructure Security (GCP)

Lumify's core infrastructure is hosted on Google Cloud Platform (GCP), leveraging:

  • Hardened physical security at Google data centers
  • Strong IAM controls
  • Network isolation via VPCs
  • Redundant compute, storage, and networking
  • GCP-managed encryption (AES-256)
  • Continuous patching and vulnerability management

Lumify configures all cloud services using secure defaults and applies least-privilege access.

4. Edge Security & DDoS Protection (Cloudflare)

Lumify uses Cloudflare as its primary edge security and traffic protection layer. Cloudflare provides:

  • Global Anycast DDoS mitigation
  • Web Application Firewall (WAF)
  • Bot management and filtering
  • Rate limiting and abuse detection
  • TLS termination and certificate management
  • Edge caching and performance optimization

This layered approach—Cloudflare (edge) → GCP (compute)—provides defense-in-depth against both volumetric and application-level attacks.

5. Data Security & Privacy

5.1 Data We Collect

Lumify does not collect or store personally identifiable information (PII). If personal information is ever provided during troubleshooting or customer support, it is used solely to resolve technical issues and never for analytics, marketing, or resale.

5.2 Data Handling

  • Customer data is processed only to deliver the Service.
  • Access is limited to authorized personnel with a legitimate business need.
  • Customer data is not used for advertising, profiling, or unrelated purposes.

5.3 Encryption

  • In Transit: TLS 1.2+
  • At Rest: GCP-managed encryption keys (AES-256)

6. Application Security

Lumify's secure software development lifecycle includes:

  • Mandatory code review
  • Automated dependency and vulnerability scanning
  • Use of modern frameworks resistant to common attack vectors
  • Secrets stored in GCP Secret Manager
  • CI/CD pipelines with controlled access and limited blast radius

OWASP Top 10 risks are actively mitigated through ongoing engineering practices.

7. Access Control & Authentication

  • Role-based access control (RBAC) using GCP IAM
  • Administrative access requires multi-factor authentication (MFA)
  • Production access is restricted to essential engineering personnel
  • Endpoint security required for all employee devices (OS updates, disk encryption, strong passwords, etc.)

8. Network Security

Lumify maintains a layered network security model:

Cloudflare (Primary Security Layer)

  • DDoS protection
  • WAF
  • Bot mitigation
  • IP reputation filtering
  • Threat intelligence feeds
  • Rate limiting

GCP Network Controls

  • VPC isolation
  • Firewall rules
  • Private service networking
  • Internal-only communication for sensitive components

Logs and metrics are continuously monitored for suspicious activity.

9. Logging, Monitoring & Alerting

Lumify uses GCP-native and third-party tools to:

  • Log authentication events, system changes, and API traffic
  • Alert on anomalies, suspicious behavior, or attempted intrusions
  • Maintain audit trails for admin access
  • Monitor performance, availability, and error rates

Logs are stored securely with limited access.

10. Vulnerability & Patch Management

Lumify's process includes:

  • Continuous vulnerability scanning
  • Regular dependency and library updates
  • Prioritized remediation based on severity and risk
  • Automated patching for OS and cloud components where possible

11. Incident Response

Lumify maintains an Incident Response Plan (IRP) covering:

  • Incident classification
  • Containment and remediation
  • Customer notification (when applicable)
  • Root cause analysis
  • Continuous improvement

All incidents impacting customer data or platform integrity are handled with urgency.

12. Business Continuity & Disaster Recovery

Lumify leverages GCP's resilient infrastructure to maintain continuity:

  • Multi-zone deployment
  • Automated failover
  • Frequent system backups
  • Documented disaster recovery plans

Procedures are reviewed regularly.

13. Third-Party Vendors & Subprocessors

Lumify reviews third-party providers for:

  • Security posture
  • Compliance certifications
  • Data handling practices
  • Minimal access principles

Only vendors essential for operating the Service are used. A subprocessors list will be published as Lumify grows.

14. Employee Security Practices

  • Background checks where permitted
  • Annual security awareness training
  • Confidentiality and acceptable use requirements
  • Device-level security controls (patching, encryption, MFA)
  • Restriction of access based on role and need

15. Customer Responsibilities

Customers are responsible for:

  • Securing their Lumify access credentials
  • Setting and managing their internal access controls
  • Ensuring no regulated or sensitive data (PHI, financial data, government IDs, etc.) is transmitted into Lumify
  • Maintaining compliance with their own industry regulations

16. Contact Information

Questions regarding this Security Policy may be directed to:
📩 security@lumify.ai

Contact us if you have any questions about this Security Policy.

Lumify

Lumify helps every website deliver instant, accurate answers.

Product
  • How it works
  • Pricing
  • Status
Use Cases
  • SaaS product docs
  • Customer support
  • Developer docs
  • Knowledge bases
  • B2B websites
  • Education
Resources
  • Docs
  • API Reference
  • FAQ
Company
  • Beta Terms
  • Contact
  • Terms
  • Privacy
  • Security

© 2025 Lumify. All rights reserved.