Skip to main content
All CollectionsSecurity
How is LiveFlow's Technology Infrastructure Secured?
How is LiveFlow's Technology Infrastructure Secured?

All of LiveFlow's infrastructure is managed following the latest best practices in security

Lasse Kalkar avatar
Written by Lasse Kalkar
Updated over a year ago

LiveFlow's databases all employ industry-standard AES-256 encryption-at-rest for the entire dataset, and sensitive dats is additionally protected by AES-256 application-level encryption

When communicating between systems, LiveFlow always used TLS encryption, a cryptographic protocol designed for privacy and data security

The abilities to access or modify LiveFlow's systems are granted on the principle of least privilege, and are always protected by multi-factor authentication

Did this answer your question?