Skip to main content

Compliance & Security

At LogCentral, we structure our compliance and security approach around a few guiding principles. Below is a clear, understandable overview of our commitments and the shared responsibilities.

Updated over 2 weeks ago

Our public website has a few sections that might be of interest for you :

Yet, here is an overview.

1. Privacy & Data Protection by Design

We build our systems with privacy first. From the start, we emphasize data minimization, pseudonymization, encryption, and strong access controls.

Our architecture is designed so that sensitive or personal data is handled cautiously, not by default.


2. Clear Roles & Accountability

We operate as a data processor with respect to logs you send us. You remain the data controller and retain control over which data is collected, stored, or redacted.

We support you in meeting your compliance obligations, but responsibility for data governance lies with you.


3. Secure by Default

  • Encryption: All data is encrypted while in transit and at rest.

  • Access control: Role-based permissions and multi-factor authentication guard against unauthorized access.

  • Operational security: Ongoing monitoring, security audits, vulnerability testing, and incident preparation are baked into our operations.


4. Retention, Deletion & Transparency

We encourage well-defined retention policies. Logs shouldn’t be kept longer than necessary.

We provide means to delete or purge data in a controlled way, and we are transparent about how data is processed and stored.


5. Incident Response & Notification

While security is a top priority, no system is immune. If a breach impacting personal data occurs, we commit to timely investigation, notification, and remediation.

We also assist you with your regulatory obligations (for example, breach reporting).


6. Shared Responsibility Model

Security and compliance are a collaborative effort. Below is how responsibilities are shared:

Area

LogCentral’s Responsibility

Your Responsibility

Infrastructure security, patching, sub-processor oversight

Data encryption, logging infrastructure, system monitoring

Deciding/data filtering of what logs to send

Access management of your users, roles, MFA

Data subject rights (requests for deletion, access)

✅ (support)

✅ (primary)

Policy definition (retention, anonymization, audit)

Did this answer your question?