Trust Center

Start your security review
View & download sensitive information

Overview

Trust Alliance Logo

At Litmus our commitment to data privacy and security is embedded in every part of our business. It’s our job to ensure that we maintain the highest levels of confidentiality, privacy, and security to safeguard Litmus and our customers.

Click on any card to learn more, or create an account to see additional knowledge base answers and download documentation.

Compliance

CCPA Logo
CCPA
CPRA Logo
CPRA
CSA STAR Logo
CSA STAR
EU-US DPF Logo
EU-US DPF
GDPR Logo
GDPR
Microsoft SSPA Logo
Microsoft SSPA
SOC 2 Logo
SOC 2
TruSight Logo
TruSight
Start your security review
View & download sensitive information
Litmus Pentest Report
Litmus SOC2 Type II Report
Information Security Policy
Litmus Network Diagram
Litmus Personalize Network Diagram
Litmus Personalize Pentest
Litmus Personalize SOC 2 Type I Report
CSA STAR
CAIQ v4.0.1
HECVAT Litec 2023
SIG Lite
Cyber Insurance
Disaster Recovery & Business Continuity Plan
Encryption and Key Management Policy
Incident Management Policy
Risk Assessment Policy

Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective24-48 hours
View more

Product Security Features

Audit Logging
Data Security
Integrations
View more

Reports

Litmus Network Diagram
Litmus Pentest Report
Litmus Personalize Network Diagram
View more

Self-Assessments

CAIQ v4.0.1
HECVAT Litec 2023
SIG Lite

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

Application Security

Responsible Disclosure
Change Management
Code Analysis
View more

Data Privacy

Cookies
Data Breach Notifications
Data Collected
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
View more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management
View more

Network Security

Data Loss Prevention
Firewall
IDS/IPS
View more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View more

Knowledge Base

  • Who owns the data processed by the Litmus platform?
  • Does Litmus conform with a specific industry standard security framework? (e.g. NIST Cybersecurity Framework, ISO 27001, etc.)
  • Does Litmus have a documented and currently followed change management process?
  • Are all components of Litmus Disaster Recovery & Business Continuity Plan reviewed at least annually and updated as needed to reflect change?
  • How is data transmitted?
View more

Trust Center Updates

If you need help using this Trust Center, please contact our Cybersecurity Risk team.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo