Trust & Compliance

Security you can build on

LightYear is built with security as a first principle — not an afterthought. From AES-256 encryption and TLS 1.3 to always-on DDoS protection and SOC 2 Type II certification, every layer of our infrastructure is designed to protect your workloads.

End-to-end security architecture

Six layers of protection — from the physical data center to the application layer — working together to keep your data safe.

Responsible Disclosure

Vulnerability disclosure program

We welcome security researchers who responsibly disclose vulnerabilities. We commit to acknowledging all reports within 48 hours and coordinating public disclosure after remediation.

01

Discover & Document

Identify a potential vulnerability and document the reproduction steps, affected components, and estimated impact.

02

Report Privately

Email [email protected] with your findings. Use our PGP key (available on the contact page) for sensitive reports.

03

Acknowledgement

We acknowledge all reports within 48 hours and provide an initial severity assessment within 5 business days.

04

Remediation

Our security team works to remediate confirmed vulnerabilities. We keep you updated on progress throughout the process.

05

Disclosure

We coordinate public disclosure with you after a patch is deployed. Researchers may be credited in our security advisories.

Report a vulnerability

Email [email protected] with a description of the issue, reproduction steps, and estimated impact. Use our PGP key for sensitive disclosures. We do not pursue legal action against researchers who follow responsible disclosure guidelines.

Report Now
Incident Response

Rapid response when it matters most

Our incident response process is designed to minimise customer impact. We follow a structured four-phase approach with defined SLAs at every stage.

Detection & Triage

< 30 min

Automated monitoring and alerting detects anomalies within minutes. On-call security engineers triage and classify the incident within 30 minutes of detection.

Containment

< 1 hour

Affected systems are isolated to prevent lateral spread. Impacted customers are notified via status page and email within 1 hour of confirmed incident.

Eradication & Recovery

< 4 hours

Root cause is identified and eliminated. Systems are restored from verified clean backups. Full service restoration is the primary objective.

Post-Incident Review

< 5 days

A detailed post-mortem is published within 5 business days. Root cause analysis, timeline, and remediation steps are shared publicly on our status page.

All incidents are published on our public status page with full post-mortem reports.

View System Status

Security FAQ

Common questions about LightYear's security and compliance program.

Ready to build on secure infrastructure?

Deploy your first server in under 60 seconds. SOC 2 Type II certified, GDPR compliant, with always-on DDoS protection and AES-256 encryption included on every plan.

Compliance documentation available to enterprise customers · [email protected]

Your cookie choices for this website

This site uses cookies and related technologies, as described in our privacy policy, for purposes that may include site operation, analytics, and enhanced user experience. You may choose to consent to our use of these technologies, or manage your own preferences. Cookie policy