Security & Compliance

The LNA: Built for Trust

The LNA helps teams reactivate dormant leads with human-reviewed emails generated from your authorized CRM context plus public business signals. We operate with read-only CRM access, CRM-native sending, and AWS-native isolation and encryption.

ISO/IEC 27001 Aligned

GDPR Processor Read

AWS-Hosted (Private by Design)

CRM Integrations & Scopes

We request only the minimum scopes needed to read target records and to invoke your CRM’s native email send after human approval.

Purpose

Salesforce

HubSpot

Reason

Read lead/contact data

api (read objects), refresh_token

Lead, Contact, Account, prior EmailMessage

crm.objects.contacts.read, crm.schemas.contacts.read, crm.objects.companies.read, crm.schemas.companies.read, crm.objects.deals.read, crm.objects.notes.read oauth, crm.lists.read

Populate drafts with name, company, fields, stage, conversation history; filter by client-selected stages/lists.

Send approved email via CRM

Simple Email Action / sendEmail REST (within api)

Transactional Single-Send API
(transactional-email scope)

Ensure mail logs, compliance footers, opt-outs, and analytics remain governed by your CRM.

Tokens stored encrypted in AWS Secrets Manager; never in logs or front-end.

Granular queries fetch only client-designated subsets (not full CRM exports).

Opt-out safeguards re-check suppression flags before any send.

Managed Cloud Architecture & Isolation

The LNA is deployed on AWS using VPC segmentation, private subnets, and service-to-service IAM with least privilege. Each customer’s data is isolated at the database level (single-tenant schema/database on Aurora PostgreSQL).

Network Segmentation

ALB in public subnets; app services in private; database not internet-reachable; HTTPS enforced.

Data Isolation

Per-tenant database/shard. No cross-client mixing. Multi-AZ, with snapshot backups.

Secret Management

AWS Secrets Manager for DB creds and OAuth tokens; rotation and least-privilege access.

Encryption & Access Controls

Cryptography

AES-256 at rest via AWS KMS–managed keys (Aurora, S3, EBS).

TLS 1.2+ for data in transit; HTTPS enforced at the edge.

Optional application-layer encryption for select secrets (e.g., refresh tokens).

Access Control

Strict IAM roles; principle of least privilege across services.

No standing human access to client databases; privileged access is approved, time-bound, and logged.

RBAC in-app; SSO/MFA options for customer users.

Visual in progress

Compliance Impact:

Supports CAN-SPAM/CASL/GDPR

practices by honoring CRM governance and ensuring organizational oversight per message.

Responsible AI:
Private Models per Client

The LNA uses AWS Bedrock to invoke foundation models (e.g., Anthropic Claude) within AWS. Your prompts and outputs stay in AWS, not used to train global models. Each client’s model behavior is customized via private LoRA adapters and a client-specific reinforcement loop (PPO) driven by your approvals and outcomes.

Client-isolated adapters; no cross-customer training or data sharing.

Bedrock calls over secure channels; PrivateLink when available.

Continuous improvement uses your own results (reply, edits, approvals).

Human-in-the-Loop Guarantee

No message is ever sent without explicit human approval from your team. The LNA initiates CRM-native send only after you confirm.

Draft → Review/Edit → Approve → CRM send

Logged to CRM records; full audit trail

Opt-out and footer compliance preserved by CRM

Privacy & GDPR

We act as a Data Processor; you are the Controller. We process only what you authorize for the purpose of drafting and sending approved messages.

Purpose Limitation

No secondary use; no data resale; no cross-client model training.

Data Subject Rights

Export/erasure supported on request via client admin; token and tenant purge on termination.

Data Residency

Default US (us-west-2); regional deployment available to meet residency requirements.

Incident Response & Business Continuity

Incident Response

Defined IR plan: identification, containment, eradication, recovery, post-mortem.

72-hour breach notification commitment (GDPR) where applicable.

Comprehensive audit logs and forensic evidence via CloudTrail and internal logs.

Continuity & Backups

Multi-AZ Aurora; daily snapshots with retention (configurable to customer needs).

Recovery drills and tested restore procedures.

CloudFront/WAF and autoscaling patterns for resilience.

Operations Security
& Continuous Monitoring

Secure SDLC

IaC via AWS CDK, code review, SAST, container image scanning, OWASP Top 10 practices.

Logging & Threat Detection

CloudWatch, CloudTrail, VPC Flow Logs, GuardDuty, Security Hub, WAF; alerts to DevSecOps.

Change & Separation

Change management with approvals; separate dev/stage/prod; no real data in non-prod.

ISO/IEC 27001:2022 Annex A

(Condensed Mapping)

A.5 Organizational Controls

ISMS policies, roles, security training, risk assessments; cloud use policy covering AWS.

A.8 Technological Controls

Get as many sequence drafts as you need, with human approval before anything sends.

A.9 Identity & Access

Formal access control, least privilege, user lifecycle, no standing prod DB access.

A.12 Network Security

VPC, subnets, SGs, NACLs, WAF; private endpoints where available.

A.13 Incident Management

IR plan, alerting, evidence, customer notification processes.

A.14 Continuity

Multi-AZ redundancy, backups, restore tests, autoscaling policies.

A detailed control-by-control mapping is available in the downloadable PDF.

Additional Security Measures

Penetration Testing

Annual 3rd-party tests on web app, API, and cloud posture; remediation tracked.

AWS Audit Manager

Continuous evidence collection mapped to ISO Annex A; monthly reviews.

Change Management

Ticketed approvals, recorded diffs, rollout gates, rollback plans.

Documentation & Security Contact

Need the full scope, diagrams, or a completed security questionnaire?