All Collections
How is LiveFlow's Technology Infrastructure Secured?
How is LiveFlow's Technology Infrastructure Secured?

All of LiveFlow's infrastructure is managed following the latest best practices in security

Sahaj Singh avatar
Written by Sahaj Singh
Updated over a week ago

LiveFlow's databases all employ industry-standard AES-256 encryption-at-rest for the entire dataset, and sensitive dats is additionally protected by AES-256 application-level encryption

When communicating between systems, LiveFlow always used TLS encryption, a cryptographic protocol designed for privacy and data security

The abilities to access or modify LiveFlow's systems are granted on the principle of least privilege, and are always protected by multi-factor authentication

Did this answer your question?