World-class Security

Security

With Luminance responsible for processing and storing confidential client information, we place great importance on maintaining the highest level of security in our products.

We have implemented international security standards and best practices at every layer of the company. From our design and development practices, to partnerships, to staff culture and training, protecting our customers’ data is of utmost importance.

Customers can be assured that they are provided with a robust, reliable and highly secure solution, whether hosted within a virtual cloud environment or deployed within their own environment.

World-Class Security

Luminance places the utmost value on security to ensure customer data is protected at all costs.

Key provisions in place include:

ISO 27001 and SOC2 Certifications

AWS Hosting Environments

World-Leading Security Advisory Board

Security Advisory Board

Information security and confidentiality of client data is of the upmost importance to Luminance. Our security principles are overseen by world-leading experts in cyber security technology and nation state-level security.

Jonathan Evans

Jonathan Evans

READ BIO

Lord Evans was Director General of MI5 from 2007 to 2013. He spent 33 years with MI5, defending the UK against internal and domestic terrorism and cyber-threats. He was appointed to the Security Service’s Management Board as Director of International Counter Terrorism in 2001, ten days before the 9/11 attacks on the World Trade Center. He was appointed to the House of Lords in 2014 at the personal recommendation of the Prime Minister and sits as a cross-bench peer. Lord Evans is also a non-executive Director of HSBC Holdings and of Ark Datacentres Ltd.
Jack Stockdale

Jack Stockdale

READ BIO

Jack Stockdale is the founding CTO at Darktrace. With over 20 years’ experience of software engineering, Jack is responsible for overseeing the development of Bayesian mathematical models and artificial intelligence algorithms that underpin Darktrace’s award-winning technology. Jack and his development team in Cambridge were recognized for their outstanding contribution to engineering by the Royal Academy of Engineering MacRobert Innovation Award Committee in 2017 and again in 2019. Jack has a degree in Computer Science from Lancaster University.
David Palmer

David Palmer

READ BIO

David is the former Chief Product Officer at Darktrace, where he oversaw the mathematics and engineering teams and project strategies. With over 19 years of experience at the forefront of government intelligence operations, Dave has worked across UK intelligence agencies GCHQ and MI5, where he was responsible for delivering mission-critical infrastructure services, including replacing and securing entire global networks, the development of operational internet capabilities and the management of critical disaster recovery incidents. He acts as an advisor to cyber security start-ups and growth-stage companies from the UK Government’s Cyber Security Accelerator and CyLyon. His insights on AI and the future of cyber security are also regularly featured in the UK media. He holds a first-class degree in Computer Science and Software Engineer from the University of Birmingham.

Frequently Asked Questions

We understand that the security of your data is paramount. That’s why we’ve compiled answers to some of the most frequently asked questions about our security practices.

How does Luminance ensure the security of my data hosted in the cloud?

Luminance uses Amazon Web Services (AWS) environments to host your data in a managed, segregated, and secure virtual cloud. Each customer receives a dedicated single-tenant instance, ensuring complete isolation and no co-mingling of data. Our use of AWS allows for full encryption of data both at rest and in transit, applying strong multi-factor encryption standards. AWS’s global infrastructure adheres to rigorous security compliance standards, providing a robust and reliable solution tailored to geographic requirements. Additionally, Luminance complies with various certifications like ISO 27001, assuring adherence to international security standards.

What certifications and audits does Luminance hold to assure security standards?

Luminance is certified to ISO 27001:2013, reflecting our commitment to maintaining an effective Information Security Management System. Our certification is complemented by successful completion of a SOC 2 Type 2 examination, which assesses our controls related to security, availability, and confidentiality. Our security measures are further validated through regular penetration testing conducted by independent third parties, ensuring continuous improvement and adherence to best practices.

Who can access my data within the Luminance platform?

Access to your data within the Luminance platform is strictly controlled using application-level permissions configured by you, the customer. Our systems employ strong authentication methods, including multi-factor authentication (MFA), ensuring employees only have the necessary permissions to perform their roles. Luminance staff cannot view your documents without your explicit authorization, given through the user interface. All access is tracked and audited to maintain accountability and prevent unauthorized access.

How is data encrypted within the Luminance platform?

Data security is a priority at Luminance, with encryption employed for data both at rest and in transit. We use AWS Key Management Services for encrypting data at the S3 storage level and EC2 compute resources, implementing AES-256 bit keys for utmost security. Data transmitted through the platform is encrypted using TLS 1.2 or higher protocols, ensuring secure connections with AES-128 or higher encryption standards. Master encryption keys are rotated regularly to maintain security integrity.

What measures are in place to protect against security threats and incidents?

Luminance deploys Darktrace’s Enterprise Immune System, an AI-based threat detection solution, across our environments to identify and respond to anomalies. Additionally, we use industry-leading Juniper firewalls and rate-limiting techniques to defend against denial-of-service and brute force attacks. Our incident management process, informed by cutting-edge threat analysis, enables swift detection, mitigation, and communication in the event of potential security incidents. Security training is mandatory for all personnel, reinforcing a culture of vigilance.

How can customers manage access and permissions within the Luminance application?

Within the Luminance application, customers can configure user permissions based on roles, utilizing the principles of least privilege. The application provides division-level permissions, allowing administrators to grant or restrict access to specific users or groups. Password protocols are stringent, requiring complex passwords and inactive session timeouts, configurable by each customer. Customers hold complete control over user permissions, maximizing security and adaptability to organizational needs.

What steps are taken to ensure business continuity and data backup?

Luminance maintains a comprehensive Business Continuity Plan that includes frequent data backups and robust disaster recovery protocols. Each customer instance is automatically backed up nightly to a secondary AWS data center within the same region, ensuring data durability and integrity. Backup data is encrypted and kept for a minimum of 14 days. Our backup and restore procedures are aligned with industry standards, ensuring minimal disruption and swift recovery in the unlikely event of a data-center failure.