Cloud Security
If you’ve identified a potential security flaw in our infrastructure or software, please let us know at g@linh.ai. We will look into the issue and get back to you.
Last updated
Was this helpful?
If you’ve identified a potential security flaw in our infrastructure or software, please let us know at g@linh.ai. We will look into the issue and get back to you.
Last updated
Was this helpful?
1. Cloud infrastructure and data hosting security
We host all of our services through Amazon Web Services (AWS) that employs a robust security program with multiple certifications. Visit to learn more about our provider's security processes.
We host all of our data on Amazon Web Services (AWS) Singapore. Please reference the above vendor specific documentation linked above for more information.
All databases are encrypted at rest.
Our applications encrypt in transit with TLS/SSL only.
We perform vulnerability scanning and actively monitor for threats with .
We actively monitor and log various cloud services.
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.