Overview
At Litmus our commitment to data privacy and security is embedded in every part of our business. It’s our job to ensure that we maintain the highest levels of confidentiality, privacy, and security to safeguard Litmus and our customers.
Click on any card to learn more, or create an account to see additional knowledge base answers and download documentation.
Compliance



Documents
Litmus SOC2 Type II Report
Pentest Report
Information Security Policy
Litmus Network Diagram
Litmus Personalize Network Diagram
Litmus Personalize Pentest
Litmus Personalize SOC 2 Type I Report
CSA STAR
CAIQ v4.0.1
HECVAT Litec 2023
SIG Lite
Cyber Insurance
Disaster Recovery & Business Continuity Plan
Encryption and Key Management Policy
Incident Management Policy
Risk Assessment Policy
Risk Profile
Data Access LevelInternal
Impact LevelLow
Recovery Time Objective24-48 Hours
See more
Product Security Features
Audit Logging
Data Security
Integrations
See more
Reports
Litmus Network Diagram
Litmus Personalize Network Diagram
Litmus Personalize Pentest
See more
Self-Assessments
CAIQ v4.0.1
HECVAT Litec 2023
SIG Lite
Data Security
Access Monitoring
Backups Enabled
Data Erasure
See more
Application Security
Change Management
Code Analysis
Encryption Key & Credential Management
See more
Legal
Subprocessors

Copyright Dispute Policy
Cyber Insurance
See more
Data Privacy
Cookies
Data Breach Notifications
Data Collected
See more
Access Control
Data Access
Logging
Password Security
Infrastructure
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Mobile Device Management
See more
Network Security
Data Loss Prevention
Firewall
IDS/IPS
See more
Corporate Security
Asset Management Practices
Email Protection
Employee Training
See more
Policies
Acceptable Use Policy
Access Control Policy
Asset Management Policy
See more
Knowledge Base
- Does Litmus conform with a specific industry standard security framework? (e.g. NIST Cybersecurity Framework, ISO 27001, etc.)
- Does Litmus have a documented and currently followed change management process?
- Are all components of Litmus Disaster Recovery & Business Continuity Plan reviewed at least annually and updated as needed to reflect change?
- Can the Litmus application enforce password/passphrase aging requirements?
- What does Litmus do?
See more
If you need help using this portal, please contact our Cybersecurity Risk team.
If you think you may have discovered a vulnerability, please send us a note.