Security Overview
A summary of Landworth's security architecture, access controls, encryption standards, and infrastructure security practices.
1. Security Architecture
Landworth's platform is built with a defence-in-depth approach to security. Our architecture separates concerns across application, data, and infrastructure layers, with security controls applied at each level.
We maintain a formal information security policy that is reviewed at least annually. Our security practices are aligned to the ISO 27001 framework and are subject to ongoing internal review.
2. Access Controls
Access to the Landworth platform is governed by role-based access controls (RBAC). Administrators can configure roles, permissions, and user provisioning to ensure team members only access functionality and data appropriate to their role.
Single Sign-On (SSO)
Landworth supports single sign-on integration via SAML 2.0 and OpenID Connect, allowing organisations to centralise authentication through their existing identity provider. This enables enforcement of organisational password policies, MFA requirements, and session management at the IdP level.
Least Privilege
Internal access to production systems follows the principle of least privilege. Administrative access is restricted, logged, and subject to periodic review.
3. Encryption
- •At rest: All data at rest is encrypted using AES-256 encryption. Encryption keys are managed through a dedicated key management service with appropriate access controls and rotation policies.
- •In transit: All data in transit is protected using TLS 1.2 or higher. We enforce HTTPS across all endpoints and do not support legacy or deprecated cipher suites.
- •Key management: Encryption keys are stored separately from the data they protect. Key rotation is performed in accordance with our key management policy.
4. Infrastructure Security
Landworth is hosted on cloud infrastructure with security controls aligned to industry standards. Our hosting provider maintains relevant certifications including SOC 2 and ISO 27001.
Penetration Testing & Vulnerability Management
We conduct regular penetration testing through qualified third parties. Vulnerability assessments are performed on an ongoing basis, with findings triaged by severity and remediated within defined SLAs.
Monitoring & Logging
Security events are logged centrally and monitored for anomalous activity. Logs are retained in accordance with our data retention policy and are available for audit purposes.
5. Incident Response
Landworth maintains a documented incident response process covering identification, containment, eradication, recovery, and post-incident review. Key elements include:
- •Defined roles and responsibilities for incident response
- •Severity classification framework with corresponding response timelines
- •Communication protocols for notifying affected parties in accordance with regulatory requirements
- •Post-incident review and lessons-learned process to drive continuous improvement
6. Security Contact
For security-related enquiries, to report a vulnerability, or to request further detail on any of the above, please contact us at security@landworth.ai.
Version 1.0 · Last updated: March 2026
Contact: security@landworth.ai
This page is designed to be printable. Use Ctrl+P / Cmd+P to save as PDF.
