We take pride in our information security program and are dedicated to its continual improvement.
Product access control
Only a subset of LightNit's personnel has access to LightNit's products and customer data through controlled interfaces. This limited access allows us to provide effective customer support, troubleshoot potential problems, detect and respond to security incidents, and implement data security.
Authentication resourcesWe offer two-factor authentication (2FA)
SAML integration with external identity providers.
EncryptionLightNit uses 256-bit AES encryption at rest in addition to securing network communication with TLS 1.2 for encrypting data in transit.
Every pull request goes through a peer code review, whether it's a new feature or bug fix. Security reviews are performed as appropriate for the work.
We run regular code audits security.
We use GitLab for our CI tooling for continuous integration and delivery. Every merged PR is automatically subjected to a pipeline of rigorous tests and analysis as appropriate for the code being merged.
We perform robust unit testing and regular penetration testing.
LightNit utilizes Amazon Web Services (AWS) as its cloud service provider. We also leverage AWS's security and compliance controls for data center physical security and cloud infrastructure. More information about this service provider can be found on the AWS Security Cloud website.
Availability: We have globally-distributed SRE and Security teams on-call 24/7. To ensure users have real-time service availability updates, LightNit also maintains a Status page.
Logging: We keep a comprehensive log of all user and Zap activities. Zap activities are logged internally for troubleshooting and support only. LightNit users can also see a summary of their Zap activities in their Zap History.
We have enabled threat detection software and enforce continual threat modeling exercises to identify and plan for any vulnerabilities in our environment.
LightNit's security exploit bug bounty program acknowledges and rewards the work independent security researchers do by flagging vulnerabilities LightNit might not be aware of. We look at each vulnerability on a case-by-case basis.
If you find something to report, please keep these three key points in mind:
1. Please let us know about any vulnerabilities as soon as possible.
2. Don't test against LightNit users' private data.
3. We welcome the opportunity to work together and close the vulnerability before it's revealed to others.
LightNit undergoes an external penetration test by an independent third party on an annual cadence, at minimum.
Whether your time-saving automation needs are large or small, we're here to help you scale.
By signing up, you agree to LightNit’s Terms of Service and Privacy Policy.