Access Security
If you’ve identified a potential security flaw in our infrastructure or software, please let us know at g@linh.ai. We will look into the issue and get back to you.
1. Permissions and Authentication
Access to cloud infrastructure and other sensitive tools are limited to authorized employees who require it for their role.
Where available we have Single Sign-on (SSO), 2-factor authentication (2FA) and strong password policies to ensure access to cloud services are protected.
2. Least Privilege Access Control
We perform quarterly access reviews of all team members with access to sensitive systems.
3. Password Requirements
All team members are required to adhere to a minimum set of password requirements and complexity for access.
Last updated
Was this helpful?