LegadoESTATE

Enterprise-Grade Security

Your legacy information is protected with bank-level security measures

End-to-End Encryption

All data is encrypted with AES-256 encryption at rest and TLS 1.3 in transit, ensuring your information remains private and secure.

Secure Data Storage

Your files are stored in geographically distributed data centers with automatic backups and redundancy to prevent data loss.

Authentication & Access Control

Secure authentication with password hashing and strict access controls ensure only authorized users can access your data.

Privacy by Design

We never sell your data. Your information is used solely to provide our services and is never shared with third parties without consent.

Infrastructure Security

Hosted on Supabase with AWS-backed infrastructure, featuring DDoS protection, firewalls, and intrusion detection systems.

Regular Security Audits

We conduct regular security assessments, penetration testing, and vulnerability scans to maintain the highest security standards.

Our Security Commitments

GDPR & CCPA Compliant

We comply with international data protection regulations including GDPR and CCPA, giving you control over your personal information.

SOC 2 Type II Standards

Our infrastructure partners maintain SOC 2 Type II compliance, ensuring robust security controls and processes.

24/7 Monitoring

Our systems are monitored around the clock for suspicious activity, with automated alerts and incident response procedures.

Secure Development Practices

Our development team follows secure coding practices with regular code reviews and automated security testing.

Data Residency Options

Your data is stored in secure, tier-certified data centers with options for geographic data residency preferences.

Employee Training

All team members undergo regular security training and follow strict access control policies.

Technical Security Details

Encryption

  • • AES-256 encryption for data at rest
  • • TLS 1.3 for data in transit
  • • Encrypted database backups
  • • Secure key management (AWS KMS)

Authentication

  • • bcrypt password hashing
  • • Secure session management
  • • JWT-based authentication tokens
  • • Protection against brute force attacks

Infrastructure

  • • Supabase (PostgreSQL + AWS)
  • • Distributed CDN for performance
  • • Automated failover systems
  • • DDoS protection and rate limiting

Application Security

  • • Row-level security (RLS) policies
  • • Input validation and sanitization
  • • SQL injection prevention
  • • XSS and CSRF protection

Security Concerns?

If you discover a security vulnerability, please report it to our security team immediately.

Report Security Issue