Security at Lattice
Lattice utilizes enterprise-grade best practices to protect our customers.
Our Security Commitment
At Lattice, customer trust is our #1 priority.
We maintain the highest standards of data privacy and security because we know your employee data is important to keep secure. Lattice undergoes regular penetration testing and security reviews, designed to be GDPR compliant, and encrypts data at rest and in transit.
Our customers entrust sensitive data to our care. Keeping it secure is our promise.
Secure and Reliable Infrastructure
Lattice uses Amazon Web Services (AWS) for the hosting of staging and production environments. AWS data centers are monitored by 24×7 security, biometric scanning, video surveillance and are SOC 1, SOC 2, and SOC 3 certified.
World Class Application Security
Data is encrypted in-transit using bank-grade TLS 1.2, the safest method available today. Data is encrypted at-rest using 256-bit encryption via native AWS capabilities.
Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials.
Data Permissions & Authentication
Access to customer data is limited to authorized employees who require it for their job and data access is logged.
Breaches will be communicated within 48 hours, and vulnerabilities are fixed ASAP.
Enterprise Ready Compliance
Lattice is GDPR compliant. Organizations in the EU or who employ EU-based individuals can rest assured that Lattice is handling their personal information in compliance with the latest EU laws.
SOC 2 Type II
Lattice is SOC2 compliant. Lattice has been audited by an independent firm who has confirmed that Lattice meets the requirements set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality and Privacy.
Ongoing Commitment to Security
Lattice works with an industry leading security firm to perform bi-annual network, infrastructure and application layer penetration tests.
Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.
Secure Software Development
Lattice utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.
Lattice Responsible Disclosure Policy
Data security is a top priority for Lattice, and Lattice believes that working with skilled security researchers can identify weaknesses in any technology. If you believe you’ve found a security vulnerability in Lattice’s service, please notify us; we will work with you to resolve the issue promptly.
If you believe you’ve discovered a potential vulnerability, please let us know by emailing us at email@example.com. We will acknowledge your email within Five business days.
Provide us with a reasonable amount of time to resolve the issue before disclosing it to the public or a third party. We aim to resolve critical issues within One week of disclosure.
Make a good faith effort to avoid violating privacy, destroying data, or interrupting or degrading the Lattice service. Please only interact with domains you own or for which you have explicit permission from the account holder.
While researching, we’d like you to refrain from:
- Distributed Denial of Service (DDoS)
- Social engineering or phishing of Lattice employees or contractors
- Any attacks against Lattice’s physical property or data centers
Thank you for helping to keep Lattice and our users safe!
We may revise these guidelines from time to time. The most current version of
the guidelines will be available at https://lattice.com/security.