Security

Last updated: 25th Oct 2025

Overview

Layla follows industry good practices for cloud-native security, covering encryption, access control, application security, safety systems, vendor management, and incident response.

Data protection

  • Encryption: TLS 1.2+ in transit; strong encryption at rest for databases and backups.
  • Secrets management: secure vaulting with rotation; separate keys per environment.
  • Backups: encrypted, integrity-checked, and periodically tested for restore.

Access control

  • Role-based access and least privilege for engineering and support.
  • Multi-factor authentication for production/admin consoles.
  • Centralized audit logs for access and admin actions with retention.

Application security

  • Secure SDLC: peer reviews, dependency scanning, SAST/SCA in CI, and pre-release checks.
  • Vulnerability management: periodic scans, penetration tests, and timely patching.
  • Abuse prevention: rate limiting, anomaly detection, and content moderation controls.

Infrastructure

  • Segregated environments (dev/stage/prod) and network segmentation.
  • Firewalls/security groups restricting ingress/egress; DDoS mitigation via cloud controls.
  • Configuration hardening and continuous posture assessment.

Model and safety systems

  • Content filters to reduce harmful outputs; protections for minors and self-harm signals.
  • Human escalation pathways for critical safety events where lawful and appropriate.
  • Logging and review focused on safety, not surveillance.

Payments

Handled by PCI DSS–compliant providers. Layla does not store full card numbers.

Incident response

  • Documented runbooks and on-call rotation.
  • Breach notifications to users/regulators as required by law, within applicable timelines.

Vendor management

  • Data Processing Agreements with key vendors and subprocessors.
  • Security due diligence and periodic reviews for critical providers.
  • Geographic data mapping and controls for cross-border processing.

User controls

  • Export and delete your data via settings or by emailing grievance@talktolayla.com.
  • Manage active sessions and device logouts from your account.

Responsible disclosure

Report vulnerabilities to support@talktolayla.com. Good-faith research is welcomed under coordinated disclosure.

Compliance roadmap

Alignment with India’s DPDP Act (consent, notices, rights handling, grievance redressal).

IT Rules diligence and content moderation standards; periodic readiness reviews (e.g., ISO 27001) as the company scales.