Trust Center

Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Reclaim access anytime
Had access before? Reclaim access

Overview

At Litmus our commitment to data privacy and security is embedded in every part of our business. It’s our job to ensure that we maintain the highest levels of confidentiality, privacy, and security to safeguard Litmus and our customers.

Click on any card to learn more, or create an account to see additional knowledge base answers and download documentation.

Compliance

CCPA Logo
CCPA
CPRA Logo
CPRA
CSA STAR Logo
CSA STAR
GDPR Logo
GDPR
Microsoft SSPA Logo
Microsoft SSPA
Privacy Shield Logo
Privacy Shield
SOC 2 Logo
SOC 2
TruSight Logo
TruSight
Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Reclaim access anytime
Had access before? Reclaim access
Litmus Pentest Report
Litmus SOC2 Type II Report
Information Security Policy
Litmus Network Diagram
Litmus Personalize Network Diagram
Litmus Personalize Pentest
Litmus Personalize SOC 2 Type I Report
CSA STAR
CAIQ v4.0.1
HECVAT Litec 2023
SIG Lite
Cyber Insurance
Disaster Recovery & Business Continuity Plan
Encryption and Key Management Policy
Incident Management Policy
Risk Assessment Policy

Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective24-48 hours
See more

Product Security Features

Audit Logging
Data Security
Integrations
See more

Reports

Litmus Network Diagram
Litmus Pentest Report
Litmus Personalize Network Diagram
See more

Self-Assessments

CAIQ v4.0.1
HECVAT Litec 2023
SIG Lite

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

Application Security

Responsible Disclosure
Change Management
Code Analysis
See more

Data Privacy

Cookies
Data Breach Notifications
Data Collected
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management
See more

Network Security

Data Loss Prevention
Firewall
IDS/IPS
See more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
See more

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
See more

Knowledge Base

  • Does Litmus conform with a specific industry standard security framework? (e.g. NIST Cybersecurity Framework, ISO 27001, etc.)
  • Does Litmus have a documented and currently followed change management process?
  • Are all components of Litmus Disaster Recovery & Business Continuity Plan reviewed at least annually and updated as needed to reflect change?
  • How is data transmitted?
  • Can the Litmus application enforce password/passphrase aging requirements?
See more

Trust Center Updates

If you need help using this Trust Center, please contact our Cybersecurity Risk team.

If you think you may have discovered a vulnerability, please send us a note.

Powered BySafeBase Logo