Lumari logo
Live monitoring by Delve
Lumari Compliance Report
Lumari is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Ctrl+K

Compliance Certifications

We maintain the highest industry standards and regularly undergo rigorous third-party audits to ensure compliance.

SOC 2 Type IICompliant

SOC 2 Type II

Audited controls for security, availability, and confidentiality trust service principles with an observation period.

Last audit: August 2025
SOC 2 Type ICompliant

SOC 2 Type I

Audited controls for security, availability, and confidentiality trust service principles.

Resource Library

Access our security documentation, policies, and compliance reports.

PDF

SOC 2 Type I

Compliance report

PDF

SOC 2 Type II

Compliance report

PDF

Personnel Security Policy

Personnel Security Policy document

Updated: December 2025
PDF

Acceptable Use Policy

Acceptable Use Policy document

Updated: December 2025
PDF

Information Security Policy

Information Security Policy document

Updated: December 2025
PDF

Access Control and Termination Policy

Access Control and Termination Policy document

Updated: December 2025

Security controls

Our comprehensive security program includes controls across multiple domains to protect your data.

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Review of Infrastructure
Completed
Employee Handbook
Completed

Data Protection & Privacy

LIVE
Access Restricted to Modify Infrastructure
Completed
Customer Termination
Completed
Customers List
Completed

Governance & Oversight

LIVE
Background Checks
Completed
Customer Support Issue Submission Form
Completed
Customer Support Issues Resolved
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Register List
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Board Charter
Completed
Board Meeting Minutes
Completed

Security & Incident Management

LIVE
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Antivirus and Malware Configurations
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Review of Infrastructure
Completed
Employee Handbook
Completed
Environmental Security Control
Completed

Data Protection & Privacy

LIVE
Access Restricted to Modify Infrastructure
Completed
Customer Termination
Completed
Customers List
Completed
Encryption of Data
Completed

Governance & Oversight

LIVE
Background Checks
Completed
Customer Support Issue Submission Form
Completed
Customer Support Issues Resolved
Completed
Employee Annual Performance Reports
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Register List
Completed
Asset Register Maintaining
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Board Charter
Completed
Board Meeting Minutes
Completed
Chief Information Security Officer Appointment
Completed

Security & Incident Management

LIVE
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Antivirus and Malware Configurations
Completed
Breach Notification Communication
Completed

Access Control & Authorization

LIVE
Access Control Procedures
Completed
Access Review of Infrastructure
Completed
Employee Handbook
Completed
Environmental Security Control
Completed

Data Protection & Privacy

LIVE
Access Restricted to Modify Infrastructure
Completed
Customer Termination
Completed
Customers List
Completed
Encryption of Data
Completed

Governance & Oversight

LIVE
Background Checks
Completed
Customer Support Issue Submission Form
Completed
Customer Support Issues Resolved
Completed
Employee Annual Performance Reports
Completed

IT & Operational Security

LIVE
Alerts and Remediation
Completed
Application Outages
Completed
Asset Register List
Completed
Asset Register Maintaining
Completed

Risk & Compliance Management

LIVE
Access Control Procedures
Completed
Board Charter
Completed
Board Meeting Minutes
Completed
Chief Information Security Officer Appointment
Completed

Security & Incident Management

LIVE
Access Restricted to Modify Infrastructure
Completed
Alerts and Remediation
Completed
Antivirus and Malware Configurations
Completed
Breach Notification Communication
Completed

Subprocessors directory

We carefully select and monitor all third-party services that process data on our behalf.

Gemini logo

Gemini

AI & ML Services

Supabase logo

Supabase

Data Stores & Warehouses

Anthropic logo

Anthropic

AI & ML Services

OpenAI logo

OpenAI

AI & ML Services

Sentry logo

Sentry

Logging & Observability

Google Cloud Platform logo

Google Cloud Platform

Cloud Infrastructure & Platform Services

Showing 6 of 13 subprocessors

Frequently Asked Questions

Find answers to common questions about our security and compliance practices.

Our Security Commitment

Security Shield

At Lumari, security is part of how we operate every day. It guides how we design our systems, build our products, and make decisions across the organization. We handle the data shared with us with care and responsibility. Whether it comes from customers, partners, or anyone who relies on our platform, we treat it as something that must be protected. Security is built into our processes and culture so we can deliver reliable products without compromising on trust.

Monitored byDelve Logo
Security Shield