Lumin’s products are enforced with a rigorous and up-to-date security system. We work hard to deliver specialized security solutions alongside industry-standard compliance.

Our certifications reflect our commitment to a global standard of security. We have industry-accepted certifications and meet current industry compliance standards and regulations.

Lumin works with independent auditors to maintain a SOC 2 report. This report certifies our controls to ensure the ongoing security of customers’ data.
Learn more
Our certifications, business practices and compliance standards mean Lumin is fully compatible with CCPA regulations.
Learn more
Lumin is compliant with European data protection and privacy law. We have a comprehensive privacy policy available here.

Lumin complies with the Payment Card Industry Data Security Standard, meaning your credit, debit, and cash card transactions and associated information are protected.

Data in Lumin is stored with Amazon Web Services, which utilizes state-of-the-art security at a large scale. We are confident in AWS’s high standards.

eIDAS certification standards ensure that electronic signatures meet the highest levels of security and legal compliance across the EU.

BYO signing certificates offers businesses flexibility and enhanced security by allowing you to manage and utilize your own digital certificates for eSignatures.
All Lumin’s products are built with modern and robust security features.

Lumin uses Amazon Web Services for hosting. We routinely undergo penetration tests and AWS meets major international security compliances.

Require Google Workspace SSO for your Lumin workspace, so employees must sign in with Google. Control and verify Lumin users from your Workspace.

We use Transport Layer Security 1.2 or higher to encrypt data in transit. This helps to ensure your data is secure no matter where in the world you are.

Lumin encrypts your data at rest using AES 256, currently considered one of the most robust encryption standards.

We take pride in our Software Development Life Cycle. Every line of code is peer-reviewed and tested before it’s released into Lumin’s products.

We actively monitor and remediate vulnerabilities reported. We conduct regular penetration tests and run a bug bounty program to encourage reporting.

We have strong access controls on our production systems. Access is restricted to a small number of senior employees and requires MFA.
Signature requests generate an audit trail for the document, ensuring you know who signed what and when. We also verify document actions with comprehensive tracking and time stamping, ensuring secure, defensible proof of document activities.


Lumin Sign uses a secure third-party for payment processing.

We provide frequent monitoring of our customer environment and underlying infrastructure to ensure our tools work as expected.

We use auto-scaling, load balancing, rolling deployments and more to keep Lumin reliable. We perform daily encrypted backups of all databases.
Find security issues in Lumin and get a reward.

