Cryptlex Documentation
  • Welcome to Cryptlex!
  • Getting Started
    • Overview
    • Licensing Models
  • License Management
    • License Templates
    • Implementing License Models
    • Creating Licenses
    • License Subscriptions
    • Custom License Fields
    • Meter Attributes
    • Suspending Licenses
    • Revoking Licenses
    • Maintenance Policies
  • Feature Management
    • Overview
    • Features and Entitlement Sets
    • License Feature Entitlements
    • Accessing Feature Entitlements
    • Use Cases
  • User Management
    • Roles
    • Creating Users
    • Authenticating Users
    • Organizations
    • Resellers
    • Customer Portal
    • Reseller Portal
    • Google SSO
    • SAML SSO
  • Release Management
    • Overview
    • Creating Releases
    • Distributing Releases
  • Node Locked Licenses
    • Overview
    • Using LexActivator
      • Using LexActivator with C, C++ and Objective C
      • Using LexActivator with C#
      • Using LexActivator with VB.NET
      • Using LexActivator with Java
      • Using LexActivator with Delphi
      • Using LexActivator with Python
      • Using LexActivator with Go
      • Using LexActivator with Node.js
      • Using LexActivator with Ruby
      • Using LexActivator with Android
      • Using LexActivator with iOS
      • Using LexActivator with Flutter
    • Using Web API
    • Offline Activations
    • Proxies and Firewall
  • Floating Licenses
    • Overview
    • Hosted Floating License Server
    • On-Premise Floating Licenses
      • LexFloatServer
      • Using LexFloatClient
        • Using LexFloatClient with C, C++ & Objective C
        • Using LexFloatClient with C#
        • Using LexFloatClient with VB.NET
        • Using LexFloatClient with Java
        • Using LexFloatClient with Delphi
        • Using LexFloatClient with Python
        • Using LexFloatClient with Node.js
        • Using LexFloatClient with Go
        • Using LexFloatClient with Android
        • Using LexFloatClient with iOS
      • Offline Floating License
  • Named User Licenses
  • Timed Trials
    • Verified Trials
    • Unverified Trials
  • Licensing Docker Apps
  • Webhooks
  • Automated Emails
  • Web Integration
    • Personal Access Tokens
    • Using Web API
    • Using Zapier
    • Using FastSpring
    • Custom Development
  • Changelog
    • Web API
    • LexActivator
    • LexFloatClient
    • LexFloatServer
  • Legal
    • Terms of Service
    • Privacy Policy
    • Subprocessors
    • Data Processing Addendum
    • Service Level Agreement
    • Security, Privacy, and Compliance
    • Open Source Licenses
  • Cryptlex On-Premise
    • Overview
    • System Requirements
    • Server Layout
    • Installation Guide
      • Docker Compose
      • Kubernetes
    • Configuring Client Libraries
    • Monitoring and Error Reporting
Powered by GitBook
On this page
  • Shared responsibility
  • Certifications
  • ISO 27001, ISO 27017, ISO 27018
  • SOC 1, SOC 2, SOC 3
  • Cryptlex security features
  • Basic features
  • Advanced features
  1. Legal

Security, Privacy, and Compliance

PreviousService Level AgreementNextOpen Source Licenses

Last updated 6 months ago

Cryptlex is committed to ensuring that your privacy and the data you share with us is protected. When you license your software applications using Cryptlex, you are entrusting Cryptlex with critical and sensitive data about your business and about your customers. We use the best industrial practices to secure and protect the important business data you store within Cryptlex.

Shared responsibility

As a Cryptlex customer, you are part of the team that keeps your data safe. You are responsible for implementing strong security measures, offered by Cryptlex, for properly managing access to your Cryptlex account and resources.

Cryptlex offers fine-grained role-based access control, which can be used to limit access to your account. It also provides two-factor authentication, which should be enabled to give your account an extra layer of security.

Certifications

ISO 27001, ISO 27017, ISO 27018

Cryptlex data centres are compliant with ISO 27001, ISO 27017, and ISO 27018 certifications. These internationally accepted security standards cover the systems, applications, people, technology, policies, procedures, and data centres serving customers. Our hosting provider, AWS (Amazon Web Services), has achieved , , and certifications.

SOC 1, SOC 2, SOC 3

Cryptlex data centres are compliant with SOC 1, SOC 2, and SOC 3 certification. Our hosting provider, AWS (Amazon Web Services) has achieved .

Cryptlex security features

Cryptlex has a number of basic and advanced features that help us keep your data secure and our services highly available.

Basic features

Cryptlex offers basic security features for your accounts, including:

  • Account-level two-factor authentication

  • Transport security via TLS/SSL for all incoming and outgoing network traffic (HTTPS)

  • Fine-grained role-based access control to limit access to your account and resources

  • Audit logs to allow you to view the details of every user action

Advanced features

Additional features to protect and secure your data such as:

  • Best in class, secure, battle-tested, and DDoS protected infrastructure

  • Two-factor authentication enabled for all cloud hosting providers

  • Only authorized personnel have access to data with two-factor authentication being mandatory

Highly available and fully secured

ISO 27001
ISO 27017
ISO 27018
SOC1, SOC 2, and SOC3 certifications
database