1. Security principles
- Security is risk-based and purpose-driven.
- Controls are applied by role and responsibility.
- Periodic reviews are performed to improve effectiveness.
LLA applies access control, data protection, operational monitoring, and incident response principles to support high-reliability enterprise systems.
LLA applies appropriate access controls for users, operations teams, and administration teams. Access rights are granted based on job need and periodically reviewed to limit unnecessary privilege.
Data that requires protection is handled with appropriate technical and governance controls both in transit and at rest. Protection levels are adjusted to data sensitivity, business requirements, and applicable law.
LLA records important events related to access, configuration changes, and system operations to support traceability when needed. Monitoring is performed to detect anomalies and enable early response.
LLA maintains backup policies and recovery validation appropriate to each system group to reduce operational disruption and support service continuity.
Third parties participating in service delivery are evaluated for security, privacy, and legal alignment before operational integration.
LLA maintains intake, analysis, containment, remediation, and recovery procedures for security incidents. Where notification duties apply, LLA follows timelines and conditions defined by applicable law.
LLA operates under applicable legal frameworks related to security, information safety, and personal data in the markets where services are delivered.