This document covers LocalOps SaaS version.You can also run LocalOps in your cloud account for more privacy/control. Your team can manage the instance (self-hosted) or we can manage them remotely for you (BYOC). Talk with us at [email protected] / https://go.localops.co/tour and we can get it running in just a few days.
Secure cloud infrastructure
LocalOps hosts its platform and services in Amazon Web Services, in the US Oregon region. AWS is ISO 27001, PCI DSS Service provider Level 1 and SOC2 compliant cloud provider.



- High Availability and Redundancy: All systems are designed with high availability and redundancy, as certified by independent third party auditors and certifications.
- 24/7 Physical Access Security: Physical access is safeguarded 24/7 with CCTV surveillance and strict access control policies.
- Network, Compute, and Storage Redundancy: Assets in the network, compute, and storage layers have high redundancy and availability built in.
- Environmental Safeguards: Backup power, HVAC systems, fire suppression equipment, flood prevention, and other controls are implemented to safeguard against natural and environmental risks.
- Business Continuity and Disaster Recovery: Business continuity and disaster recovery procedures are in place to provide quick turnaround and resolutions during disruptions.
Secure software development
LocalOps follows secure software development cycle practices while building its platform.- Version Control: Code versions are managed using Git and hosted privately in Github. Git is the same version control system used by the Linux community in building Linux Kernel which powers most of the internet.
- Environment Isolation: Development, staging and production environments are isolated from each other.
- Peer & Automated Code Reviews: All new features and changes are reviewed by peer engineers and/or AI code review tools to detect errors and security vulnerabilities early in the cycle.
- Pre-Release Testing: All new changes are tested in development and staging environments before getting released in production.
- Automated Testing: Automated tests are run before every release to ensure releases are free of common bugs and vulnerabilities.
- No Production Data in Development: No production data is used during development or testing.
- Dependency Vulnerability Monitoring: We use third party tools like Github Dependabot to continuously monitor for vulnerabilities on third party libraries used in the application.
- OWASP Vulnerability Mitigations: Frameworks & libraries used by our application have built-in mitigations for common OWASP vulnerabilities such as SQLi, XSS, CSRF and others.
Secure software hosting
All our services are hosted and maintained in AWS, by following the below security controls:- Secure networks: Production environment is hosted in its own logically isolated virtual private network (VPC and subnets).
- Private server hosting: All servers are hosted in private subnets of the VPC, except for those servers that accept requests from clients.
- Firewall rules: Strong firewall rules are implemented to allow only required ports in each of the compute instances that host LocalOps services.
- Redundancy: Servers are hosted in multiple AZs (Availability Zones) for redundancy.
- Uptime monitoring: Service uptime is monitored using third party tools.
- Secure deployments: New software changes are built & deployed securely and automatically by our CI/CD setup.
- Resource monitoring: All servers are monitored for their resource consumption and alerts are set up for any anomalies.
- Traffic security: HTTP/HTTPS Traffic to the software is safeguarded against bots, malicious actors & DDoS attacks using Cloudflare CDN and CloudFront CDN.
Secure customer data
The following security controls are in place to safeguard data in the LocalOps platform:- Isolated Virtual Machines: Software is hosted in isolated VMs provided by AWS Elastic Compute Cloud. AWS ensures that no two VMs share common memory space. VMs are fully scrubbed after deletion.
- Secure Firewall Rules: Secure firewall rules are implemented to allow only authorized access.
- Encryption in Transit: Encryption is turned on during transit. Data transmitted from the application UI to our web servers is encrypted using HTTPS/TLS 1.2, RSA, and 2048-bit keys at all times.
- Encryption at Rest: Encryption is turned on at rest. All data is encrypted before it is stored in AWS disk volumes.
- Encrypted Backups: Backups are encrypted before they get stored in Amazon S3, and are automatically deleted by AWS after 30 days.
- Protection Against OWASP Vulnerabilities: Incoming HTTP traffic is secured against OWASP vulnerabilities using Cloudflare CDN, CloudFront CDN, and the web framework we use to build services.
- Strict Internal Authentication: All internal data services have strict authentication turned on.
- Restricted SSH Access: SSH access is enabled only for a select few authorized personnel in the company.
- Multi-Factor Authentication (MFA): All access to servers is safeguarded by MFA.
- Command Auditing and Logging: All commands used in the hosting environment are audited and logged.
Incident response plan
Alert rules are configured in all parts of the software stack to detect issues and escalate anomalies to the team. Recovery Time Objective (RTO): Services are recovered within 24 hours.- Communication/escalation: Internal & instant communication tools are active all the time, to communicate, escalate and recover from incidents.
- Clear assignments: Assignments are done within the team to own and recover from specific issues
- RCAs: Root cause analysis is carried out by the assignee(s)
- Review/approval: Fixes are made to software, configuration or infrastructure after internal review & approval from the owners of the system(s).
- Post mortems: Post mortems are conducted post the incident to prevent similar issues in future
Disaster recovery procedures
LocalOps has outlined clear disaster recovery procedures to recover services during major incidents. These procedures are also tested regularly.- Backup Storage: All backups are stored in Amazon S3.
- Geographic Redundancy: Backups are stored in the US-east while our services are running in the US-west, to mitigate risks of regional failures in the US-west.
- Backup Frequency & Security: Backups are taken and transferred securely to S3, every hour.
- Backup Retention: All backups are kept for 30 days.
- Recovery Point Objective (RPO): Data is restored from the most recent backup that is less than or up to 60mins old.
Product security
Within LocalOps platform and services, all the following security controls are implemented to protect your account logins and data.- Passwordless Logins: Logins don’t accept passwords at all to eliminate all vulnerabilities that arise out of weak passwords.
- Two-Factor Authentication (2FA) & OAuth: 2FA is the default sign in method for all users using email-based login. Otherwise, OAuth logins powered by Google or Github secure the login process.
- Session Expiry: All login sessions expire automatically in 24 hours.
- Role-Based Access Control (RBAC): Users can be assigned roles using our RBAC module to restrict them from accessing all of the account and data.
- Audit Logging: Audit logs record actions taken by users in your LocalOps account.
Organization security
- Employee Screening: All employees go through relevant reference checks, background checks, and verification before they are onboarded.
- NDA and Confidentiality: All new hires are required to sign a Non-Disclosure Agreement (NDA) as part of their employment contract.
- Mandatory 2FA: Two-Factor Authentication (2FA) is mandatory for all access to all software tools we use.
- Security Awareness Training: The team receives training and orientation on different security vulnerabilities that can occur in code, product, infrastructure, and in general at work—including phishing—to raise awareness and protect all their software access.
- Access Auditing: All access is audited within the organization.