ISO 27001 certified ELK logging and metrics company

ISO 27001 Certified

GDPR compliant ELK logging and metrics company

GDPR Compliant

HIPAA compliant ELK logging and metrics company

HIPAA Compliant

SOC2 compliant ELK logging and metrics company

SOC 2 Compliant

Controlled Data center access by CCTV

Access to our facilities are protected by security staff with video surveillance

HTTPS and TLS secure connections

Logit uses HTTPS for all services using TLS (SSL) on our public website and the platform.

Data is transmitted securely from your system to Logit using Transport Layer Security (TLS). We offer a range of endpoints, giving you the choice of the protocol used.

Our endpoints can require the use of unique API keys that are specific to each ELK stack. API keys allow you to ingest data only from trusted sources. API Keys are managed and owned by you.

Data which contains restricted information can be filtered out before it leaves your infrastructure.

Send your Logging and Metrics data via SSL/TLS, Secure data in transit
Secure and authenticate your logging and metrics data
Secure Authentication

To get access to your data, your team may login to our secure web application through HTTPS. Users access their data through secure sessions encrypted using TLS.

We enforce best practices for password creation with rules including a minimum character count and the use of uppercase characters and digits.

We also offer our customers Federated Identity (FID) or Single Sign-On (SSO), including Google Sign-in, SAML, Otka, One Login and more.

Additionally, two factor authentication can be turned on to secure your Logit account.

Role-Based Access Control

We give you control over which members of your organisation have access, which ELK stacks they are allowed to see, and which settings they are allowed to change.

Role Based Access control to you logging and metrics
Compliance and Certifications

Logit is audited by an ISO/IEC 27001:2013 UKAS certified auditor and is ISO/IEC 27001:2013 certified. ISO/IEC 27001:2013 is a standard for an Information Security Management System (ISMS), specifying the policies and procedures for all legal, physical, and technical controls used by an organisation to minimise risk to information.

It is Logit’s policy to maintain an ISMS designed to meet the requirements of the ISO/IEC 27001:2013 standards in pursuit of its primary objectives, purpose and the context of the organisation. We also operate in compliance with GDPR, HIPAA and SOC 2.

To accomplish this we make use of industry leading security tools and best practices to ensure the highest level of security at Logit. You can request a copy of the certification from your Logit sales representative.

ISO 27001 Compliance giving you the confidence in our commitment to security
Data Storage and Deletion

All data is encrypted at rest with AES-256, keys are rotated and monitored continuously. All of your logging and metrics data is permanently deleted at the end of your retention period or on deletion of a stack.

Elastic search logging and metrics data is encrypted at rest and securely deleted after your retention period
Full Incident response procedures
Incident response

We take security incidents very seriously. We will investigate the issues and seek to resolve them quickly. When a security issue has the potential to affect our customers, we will follow industry best practices for disclosure and notification. If you have questions, suggestions, or believe you have identified a vulnerability, please contact us directly at compliance@logit.io.

If you have any questions after reading this, or have any issues at all please get in touch.

Ready to get going?

Try our 14 day free trial

No credit card required

Create Free Trial