edzlms AI

AI-powered LMS launch support Custom course development DevOps-ready deployments Enterprise-grade learning experiences AI-powered LMS launch support Custom course development DevOps-ready deployments Enterprise-grade learning experiences

Platform Security & Trust

Security Isn’t a Feature. It’s the Foundation Everything Else is Built On.

EdzLMS stores learner data, compliance records, assessment results, and organisational training history for thousands of users across regulated industries. We treat that responsibility seriously — with enterprise-grade encryption, infrastructure controls, data governance, and independent security testing that we’re prepared to document for any procurement or due diligence process.

AES-256 Encryption TLS 1.3 in Transit ISO 27001 Aligned GDPR Compliant 99.9% Uptime SLA Annual VAPT
Security Status · Live
All systems secure
Data encryption — AES-256
Active
WAF & DDoS protection
Active
Uptime (last 30 days)
99.98%
Last backup completed
2 hrs ago
Intrusion detection
No alerts
TLS certificate status
Valid · TLS 1.3
Automated security scan runs every 6 hours · Last scan: passed all checks

Security certifications & compliance

We are ISO and GDPR Compliant. We give no-compromoise attritude when it comes to security.

Our security philosophy

We assume a breach is always possible. Our architecture is designed so that if one ever happened, the damage would be minimal.

Security-by-design, not security-by-afterthought. Every architectural decision at EdzLMS is made with a threat model in mind — from how we store credentials (never in plain text, always hashed with bcrypt) to how we isolate tenant data (separate encrypted stores per organisation, never co-mingled).

We follow a defence-in-depth approach — multiple independent security layers mean a failure in one does not compromise the whole. Our security posture is continuously reviewed against the OWASP Top 10, CIS benchmarks, and NIST cybersecurity framework, and independently tested through annual penetration testing by a certified third-party security firm.

  • Security-by-design architecture — threat modelling from day one
  • Defence-in-depth — multiple independent security layers
  • Zero-trust network model — no implicit trust between components
  • Principle of least privilege — users and systems get minimum necessary access
  • Immutable audit logs — every action recorded and tamper-evident
  • Annual independent penetration testing with remediation tracking
Compliance frameworks & standards
ISO 27001
Information security management system — controls aligned to ISO 27001:2022 standard
Aligned
GDPR
EU General Data Protection Regulation — full data subject rights, DPA available, data processing agreements
Compliant
SOC 2 Type II
Service Organization Control 2 — security, availability, and confidentiality trust service criteria
In progress
VAPT Certified
Annual vulnerability assessment and penetration testing by certified third-party security firm
Annual
DPDP Act 2023
India’s Digital Personal Data Protection Act — data principal rights, consent management, breach notification
Aligned
OWASP Top 10
All OWASP Top 10 web application security risks addressed in development, tested in every release cycle
Addressed

Encryption & data security

Your data is encrypted everywhere — at rest, in transit, and in backups.

Encryption is not a compliance checkbox for us. It is how we store and move data by default — with no unencrypted pathway for learner records or organisational data at any stage of the data lifecycle.

Active

AES-256 Encryption at Rest

Every piece of data stored on EdzLMS — learner profiles, course content, assessment results, compliance records, uploaded files — is encrypted using AES-256, the same standard used by financial institutions and government agencies globally. Encryption keys are managed separately from the data they protect, rotated on schedule, and stored in a hardware security module (HSM).

AES-256-GCM HSM key storage Key rotation Per-tenant isolation
Active

TLS 1.3 Encryption in Transit

All data transmitted between your learners, your administrators, and EdzLMS servers is encrypted using TLS 1.3 — the latest and most secure version of the Transport Layer Security protocol. We enforce HTTPS across all endpoints with HSTS headers, reject any connection attempting to use TLS 1.0 or 1.1, and use only strong cipher suites with forward secrecy.

TLS 1.3 only HSTS enforced Forward secrecy A+ SSL rating
Password Security
Passwords hashed with bcrypt (cost factor 12). Salted individually. Never stored in plain text. Never logged.
Tenant Isolation
Each organisation’s data is stored in an isolated encrypted partition. No cross-tenant data access is architecturally possible.
Database Security
Databases are not publicly accessible. All access is through an encrypted VPC tunnel, with IP whitelisting and connection logging.
Encrypted Backups
All backup files are AES-256 encrypted before leaving the production environment. Keys stored separately from backup data.

Hosting & infrastructure

Enterprise-grade cloud infrastructure with 99.9% uptime SLA and active DDoS protection.

EdzLMS is hosted on enterprise-grade cloud infrastructure with redundant availability zones, auto-scaling, global CDN distribution, and a Web Application Firewall that blocks threats before they reach your learners’ data.

Cloud provider & regions
Hosted on AWS / Azure with primary data residency in India (Mumbai ap-south-1). Regional deployments available for UAE, UK, and Singapore clients on request.
WAF & DDoS protection
Cloudflare Enterprise WAF protects all endpoints against SQL injection, XSS, CSRF, and volumetric DDoS attacks. Threat intelligence updated in real time.
High availability & auto-scaling
Multi-AZ deployment with load balancing. Auto-scaling responds to traffic spikes (exam season, batch launches) within 60 seconds. No performance degradation under load.
Global CDN delivery
Course videos and static assets served from 200+ edge nodes globally. Learners in Dubai, London, or Bengaluru all get sub-200ms load times regardless of server region.
Infrastructure health · 30-day window
Platform uptime 99.98%
30 days agoToday
SLA uptime
99.9%
Contractually guaranteed
Avg response time
<180ms
Global CDN average
DDoS protection
10 Tbps
Cloudflare network capacity
Incident response
P1: <1hr
P2: <4hrs · P3: <24hrs
Data residency options India (Mumbai) · UAE (Dubai) · UK (London) · Singapore — data stays in the region you choose. No cross-border transfer without explicit consent.

Backup & disaster recovery

Your data is backed up every 6 hours. Recovery time tested, not assumed.

Disaster recovery is only valuable if it’s been tested. We run quarterly DR exercises against documented RTO and RPO targets — and we publish those results to clients on request.

Backup schedule & retention
6h
Full database snapshot
Every 6 hours · AES-256 encrypted · Cross-region copy
30 days
Daily
Full application backup
Configuration, files, media · Verified with integrity check
90 days
Weekly
Long-term archive snapshot
Cold storage · Geographically separate region
1 year
Backup restores are tested quarterly We don’t assume backups work — we test them. A full restore exercise is run every quarter, timed against our RTO target. Results are documented and available to enterprise clients on request.
Recovery objectives
RPO
6 hrs
Recovery Point Objective — maximum data loss in a worst-case scenario
RTO
4 hrs
Recovery Time Objective — maximum time to restore full service after a declared disaster
DR activation steps
1 Automated health monitoring detects failure · Alert fired to on-call team
2 Incident declared · DR runbook activated · Client notification sent
3 Failover to secondary availability zone triggered automatically
4 Latest backup restored · Data integrity verified · Service resumed
5 Post-incident report delivered to client within 48 hours

Data lifecycle & your rights

You own your data. We hold it on your behalf. You can take it back — or delete it — any time.

Data portability and the right to deletion are not exceptions we handle reluctantly — they are built into the platform as first-class operations with documented workflows and confirmation timelines.

What data we collect

We collect only the data necessary to operate the LMS: learner profile information, learning activity records, assessment results, certificates, and system access logs. We collect no behavioural tracking data beyond what is needed to measure learning engagement. We do not sell data to third parties under any circumstance.

  • Learner name, email, role, and department
  • Course enrolment and completion records
  • Assessment attempts, scores, and answers
  • Login timestamps and session duration
  • Certificates issued and download history

Data portability & export

You can export your complete organisational data at any time — learner records, completion data, certificate archives, assessment histories, and course content — in standard formats (CSV, JSON, SCORM). No lock-in. No export fees. We provide a full data export within 5 business days of a written request.

  • Full learner data export in CSV / JSON on request
  • Course content export in original SCORM format
  • Certificate archive with verification metadata
  • Assessment records with full answer history
  • Delivered within 5 business days — no charge

Data deletion & right to erasure

When a learner requests erasure (GDPR Article 17) or an organisation offboards from EdzLMS, all personal data is deleted from production systems within 30 days and from encrypted backups within 90 days. We provide a written deletion confirmation. Portal-level deletion removes all organisational data, content, and learner records permanently and irreversibly.

  • Individual learner erasure request: 30-day processing
  • Backup purge: 90 days from deletion request
  • Full portal deletion: 30 days — all data permanently removed
  • Written deletion confirmation certificate provided
  • Audit log of deletion actions retained for legal compliance
GDPR & DPDP data subject rights — all supported
Right of Access
Full data export provided within 5 days
Right to Erasure
Processed within 30 days with confirmation
Right to Portability
CSV / JSON export, no charge, within 5 days
Breach Notification
Notified within 72 hours as required by GDPR

Access control & identity management

The right people see the right data. Everyone else sees nothing.

Identity and access management is one of the most common attack vectors. EdzLMS enforces role-based permissions, enterprise SSO, multi-factor authentication, and a complete audit trail of every privileged action.

Role-Based Access Control (RBAC)

Six default permission roles — Super Admin, Organisation Admin, Department Manager, Instructor/Faculty, Learner, and Auditor-Read-Only. Custom roles configurable per deployment. Permissions enforced at API level — no client-side only restrictions.

  • Granular permissions per module and feature
  • Department-scoped visibility — managers see only their team
  • API-level enforcement — no bypass via client manipulation

Enterprise SSO & MFA

Full enterprise SSO via SAML 2.0, OAuth 2.0, Azure Active Directory, Okta, and Google Workspace. Multi-factor authentication available for all user roles — enforced for admin accounts by default. Brute-force protection and account lockout after 5 failed attempts.

  • SAML 2.0 · OAuth 2.0 · OIDC · LDAP
  • TOTP, SMS, or hardware key MFA options
  • Session timeout configurable per role

Immutable Audit Logs

Every administrative action, data access event, login attempt, permission change, and content modification is logged with a timestamp, user ID, IP address, and action detail. Logs are write-once, tamper-evident, and retained for 24 months. Available for export for compliance audits.

  • 24-month retention · write-once · tamper-evident
  • Searchable and filterable by user, action, date
  • Exportable as CSV for external SIEM integration
Sample audit log entries
TimestampUser IDIP AddressActionDetail
2025-04-10 09:14:32USR-0492122.x.x.xLOGIN_SUCCESSAdmin login via SSO · 2FA verified
2025-04-10 09:16:05USR-0492122.x.x.xROLE_CHANGEDUSR-1204 promoted: Learner → Instructor
2025-04-10 09:22:17USR-021189.x.x.xLOGIN_FAILEDIncorrect password · Attempt 3/5
2025-04-10 11:04:55USR-0492122.x.x.xDATA_EXPORTLearner records export · Format: CSV · 847 rows
2025-04-10 14:31:02SYSTEMACCOUNT_LOCKEDUSR-0211 locked after 5 failed login attempts

Vulnerability management & testing

We test our own security before attackers do.

Annual VAPT by a certified third-party firm is the minimum standard. We also run continuous automated scanning, static code analysis in every deployment pipeline, and a responsible disclosure programme for external researchers.

  • Annual VAPT — full black-box and grey-box penetration test by CERT-In empanelled firm
  • OWASP scanning — automated DAST scanning against OWASP Top 10 in every release
  • SAST in CI/CD — static code analysis runs on every commit before deployment
  • Dependency scanning — third-party libraries scanned for known CVEs daily
  • Vulnerability SLAs — Critical patched within 24 hrs, High within 7 days, Medium within 30 days
  • Responsible disclosure — security@edzlms.com · acknowledged within 48 hours
VAPT reports available to enterprise clients The executive summary of our most recent penetration test is available to enterprise customers under NDA as part of the vendor due diligence process. Contact security@edzlms.com to request it.
Vulnerability remediation SLAs All current · No open criticals
Critical (CVSS 9.0+)
Patch within 24 hrs
Emergency patch deployed to production. All affected clients notified within 4 hours of discovery.
High (CVSS 7.0–8.9)
Patch within 7 days
Hotfix or next scheduled release. Clients notified in security advisory if exploitability is high.
Medium (CVSS 4.0–6.9)
Patch within 30 days
Addressed in the next planned release cycle with standard change management.
Low (CVSS <4.0)
Next quarterly release
Tracked in security backlog and addressed in the next quarterly release cycle.

Enterprise trust & legal agreements

The documentation your procurement and legal teams need — ready and waiting.

Enterprise procurement processes require security documentation, legal agreements, and vendor assessments. We have all of it. We’ve done this before — and we know what your InfoSec team and legal counsel will ask for.

Data Processing Agreement (DPA)

GDPR-compliant DPA available for all enterprise customers. Defines our role as data processor, your rights as data controller, sub-processors used, and cross-border transfer safeguards. Signed on request before contract signature.

Request DPA

Security Questionnaires

Pre-filled responses to the most common vendor security questionnaires (VSQs), including SIG Lite, CAIQ, and custom enterprise formats. Most questionnaires completed and returned within 3–5 business days.

Submit questionnaire

VAPT Executive Summary

The executive summary and methodology overview of our most recent VAPT report is available to enterprise clients under NDA. Includes scope, testing methodology, findings summary, and remediation status.

Request under NDA

Uptime SLA & Incident Response Plan

Contractual 99.9% uptime SLA with defined P1/P2/P3 response times, incident notification obligations, and service credits for SLA breaches. Incident response plan available on request for enterprise review.

Request SLA documentation
Shared responsibility model
EdzLMS is responsible for the security of the platform infrastructure, application, and data we process on your behalf. You are responsible for managing the credentials and access of your administrator accounts, the accuracy of the data your organisation imports, and the security of the devices your learners use to access the platform. Our onboarding documentation outlines these responsibilities clearly before go-live.

Ready to assess EdzLMS for your enterprise?

We welcome due diligence. Send us your security questionnaire.

Whether your InfoSec team needs a pre-filled SIG questionnaire, your legal team needs a DPA, your CISO wants the VAPT report, or your procurement committee wants a security architecture walkthrough — our security team will respond within 3 business days. No pushback. No deflection.

Security questionnaires returned in 3–5 days DPA available immediately on request VAPT report under NDA for enterprise security@edzlms.com

    BOOK YOUR FREE DEMO

    Our LMS experts will get in touch with you shortly