Security at Lago

Last updated: Oct. 27, 2023

Industry-standard compliance

Lago has achieved SOC 2 Type 2 compliance, which certifies the effectiveness of our operating and security controls.

Please contact hello@getlago.com to request the full report.

Data Security

Lago encrypts data at rest and in transit for all of our customers. We use Amazon Web Service’s Key Management System (KMS) to manage encryption keys for maximum security, in line with industry best practices.

Application Security

Lago also uses Dependabot, a high-quality analysis tooling provided by GitHub Advanced Security, to secure our product at every step of the development process.

Infrastructure Security

Lago uses Amazon Web Services to host our application. We make use of the security products embedded within the AWS ecosystem, including KMS and GuardDuty.

In addition, we deploy our application using Kubernetes containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.

Responsible Disclosure Policy

Data security is a top priority for Lago. If you believe you have found a security vulnerability in Lago’s service, please notify us – we will work with you to resolve the issue promptly.

Disclosure Policy

If you believe you’ve discovered a potential vulnerability, please let us know by emailing us at security@getlago.com. We will acknowledge your email within one week.

Please provide us with a reasonable amount of time to resolve the issue before disclosing it to the public or a third party. We aim to resolve critical issues within ten business days of disclosure.

Make a good faith effort to avoid violating privacy, destroying data, or interrupting or degrading the Lago service. Please only interact with accounts you own or for which you have explicit permission from the account holder.

Exclusions

Lago is providing this service to help ensure a safe and secure environment for all of its users. As such, any users believed to be engaging in the below activities will have their user credentials immediately deactivated.

While researching, we would like you to refrain from:

  • Denial-of-service (DoS) attacks;
  • Spamming;
  • Social engineering or phishing of Lago employees or contractors; and
  • Any attacks against Lago’s physical property or data centers.

This policy applies to the Lago Application hosted at app.getlago.com and to any other subdomains or services associated with the Lago App. We do not accept reports for vulnerabilities solely affecting our marketing website (www.getlago.com) which contains no sensitive data.

Thank you for helping to keep Lago and our users safe!