Skip to content

Compliance & Security

At LogCentral, we take the security and privacy of your log data seriously. This document outlines our security practices, compliance posture, and the shared responsibilities between LogCentral and our customers.

  • Your logs belong to you
  • We process logs only for the services you’ve requested
  • No log data is shared with third parties
  • Data deletion is complete and irreversible when requested

Multiple layers of security protect your data:

  • Network security (firewalls, DDoS protection)
  • Application security (secure coding, regular audits)
  • Data security (encryption, access controls)
  • Operational security (monitoring, incident response)
Data StateEncryption
In TransitTLS 1.2+ for all connections
At RestAES-256 encryption
BackupsEncrypted with separate keys
  • Each organization’s data is logically isolated
  • Strict access controls between tenants
  • No cross-organization data access
  • Primary infrastructure in EU (France)
  • Data does not leave the EU unless specifically requested
  • GDPR-compliant data handling
  • Secure password requirements
  • OAuth 2.0 social login support
  • Session management with automatic timeouts
  • Role-based access control (RBAC)
  • Granular permissions per organization
  • Audit logging of all access
  • SSO/SAML integration (Enterprise plan)
  • IP allowlisting
  • Custom session policies
  • Hosted on enterprise-grade European cloud providers
  • Regular security patches and updates
  • Redundant systems for high availability
  • DDoS protection
  • Web Application Firewall (WAF)
  • Intrusion detection systems
  • Regular penetration testing
  • Data centers with 24/7 security
  • Biometric access controls
  • Video surveillance
  • Environmental controls

LogCentral is fully GDPR compliant:

  • Clear data processing agreements
  • Right to access, rectify, and delete data
  • Data portability support
  • Privacy by design principles

Enterprise customers receive a DPA covering:

  • Processing purposes and scope
  • Data subject rights
  • Security measures
  • Sub-processor list
  • International transfer mechanisms

Compliant with major security standards:

  • ISO 27001
  • SOC 2 Type II
  • GDPR

We also follow industry best practices including OWASP security guidelines.

We are responsible for:

  • Securing the LogCentral platform
  • Encrypting data in transit and at rest
  • Maintaining infrastructure security
  • Providing secure authentication
  • Regular security updates
  • Incident detection and response

You are responsible for:

  • Securing access credentials
  • Managing user permissions appropriately
  • Configuring IP allowlists if needed
  • Ensuring authorized use by your team
  • Complying with applicable laws for your data
  • Reporting suspected security incidents
  • 24/7 security monitoring
  • Rapid incident response team
  • Customer notification within 72 hours of confirmed breach
  • Post-incident reports and remediation

If you discover a security vulnerability:

  1. Email [email protected]
  2. Include detailed description
  3. Do not publicly disclose until resolved
  4. We aim to respond within 48 hours
Data TypeRetention
Active LogsPer your plan (7-365+ days)
Archived LogsPer your plan settings
Account DataUntil account deletion
Audit Logs2 years

When you delete data:

  • Active logs: Immediately removed from search
  • Archived logs: Marked for deletion, purged within 30 days
  • Account deletion: All data removed within 30 days
  • Backups: Purged within 90 days
  1. Use strong, unique passwords
  2. Enable two-factor authentication (if available)
  3. Regularly review user access
  4. Remove inactive users promptly
  1. Rotate API keys periodically
  2. Use least-privilege permissions
  3. Monitor API usage for anomalies
  4. Never commit API keys to code repositories
  1. Use IP allowlists for sensitive locations
  2. Ensure syslog traffic uses secure transport when possible
  3. Monitor for unauthorized access attempts

For security-related inquiries:

  • Email: [email protected]
  • Request our security documentation package
  • Schedule a security review call (Enterprise customers)

For compliance documentation:

  • DPA requests: [email protected]
  • Compliance questionnaires: Contact your account manager