Security at Lattice

Lattice utilizes enterprise-grade best practices to protect our customers.

Our Security Commitment

At Lattice, customer trust is our #1 priority.

We maintain the highest standards of data privacy and security because we know your employee data is important to keep secure. Lattice undergoes regular penetration testing and security reviews, designed to be GDPR compliant, and encrypts data at rest and in transit.

Our customers entrust sensitive data to our care. Keeping it secure is our promise.

Secure and Reliable Infrastructure

Lattice uses Amazon Web Services (AWS) for the hosting of staging and production environments. AWS data centers are monitored by 24×7 security, biometric scanning, video surveillance and are SOC 1, SOC 2, and SOC 3 certified.

World Class Application Security

Data Encryption

Data is encrypted in-transit using bank-grade TLS 1.2, the safest method available today. Data is encrypted at-rest using 256-bit encryption via native AWS capabilities.


Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials.

Data Permissions & Authentication

Access to customer data is limited to authorized employees who require it for their job and data access is logged.

Incident Response

Breaches will be communicated within 48 hours, and vulnerabilities are fixed ASAP.


Enterprise Ready Compliance


Lattice is GDPR compliant. Organizations in the EU or who employ EU-based individuals can rest assured that Lattice is handling their personal information in compliance with the latest EU laws.

SOC 2 Type II

Lattice is SOC2 compliant. Lattice has been audited by an independent firm who has confirmed that Lattice meets the requirements set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality and Privacy.

Ongoing Commitment to Security

Penetration Tests

Lattice works with an industry leading security firm to perform bi-annual network, infrastructure and application layer penetration tests.

Employee Trainings

Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.

Secure Software Development

Lattice utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

Security Team

Lattice employs onsite staff responsible for reviewing, updating, testing and maintaining our security and privacy policy.

Lattice Responsible Disclosure Policy

Data security is a top priority for Lattice, and Lattice believes that working with skilled security researchers can identify weaknesses in any technology. If you believe you’ve found a security vulnerability in Lattice’s service, please notify us; we will work with you to resolve the issue promptly.

Disclosure Policy

If you believe you’ve discovered a potential vulnerability, please let us know by emailing us at We will acknowledge your email within Five business days.

Provide us with a reasonable amount of time to resolve the issue before disclosing it to the public or a third party. We aim to resolve critical issues within One week of disclosure.

Make a good faith effort to avoid violating privacy, destroying data, or interrupting or degrading the Lattice service. Please only interact with domains you own or for which you have explicit permission from the account holder.


While researching, we’d like you to refrain from:

  • Distributed Denial of Service (DDoS)
  • Spamming
  • Social engineering or phishing of Lattice employees or contractors
  • Any attacks against Lattice’s physical property or data centers

Thank you for helping to keep Lattice and our users safe!

We may revise these guidelines from time to time. The most current version of
the guidelines will be available at