

Compliance hub
Enterprise compliance, startup speed
One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.
SOC 2 Type II
GDPR
PCI DSS
OWASP Top 10


Compliance hub
Enterprise compliance, startup speed
One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.
SOC 2 Type II
GDPR
PCI DSS
OWASP Top 10


Compliance hub
Enterprise compliance, startup speed
One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.
SOC 2 Type II
GDPR
PCI DSS
OWASP Top 10

Compliance hub
Enterprise compliance, startup speed
One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10


SOC 2 Type II
Trust service criteria, mapped to real controls
Lyrie maps to SOC 2 trust service criteria across security, availability, and confidentiality. When your auditor asks “show me the control,” you open the dashboard — not a spreadsheet.
Access control
Role-based permissions, MFA enforcement, and session management across dashboard and API access.
Audit logging
Every authentication event, configuration change, and security action logged with timestamps and actor identity.
Encryption in transit
TLS 1.2+ enforced across all connections. WAF proxy, API endpoints, and agent communication — no exceptions.
Encryption at rest
Database encryption, scan result storage, and backup volumes protected with AES-256.
Incident response
Real-time alerting, correlated findings, and guided remediation workflows for rapid containment.
Change management
Version-tracked policy changes, configuration history, and rollback capability for every security control.
Availability monitoring
Uptime monitoring, health checks, and redundancy across platform components.
Vendor management
Minimal third-party dependencies. No data sharing with external model training pipelines.


SOC 2 Type II
Trust service criteria, mapped to real controls
Lyrie maps to SOC 2 trust service criteria across security, availability, and confidentiality. When your auditor asks “show me the control,” you open the dashboard — not a spreadsheet.
Access control
Role-based permissions, MFA enforcement, and session management across dashboard and API access.
Audit logging
Every authentication event, configuration change, and security action logged with timestamps and actor identity.
Encryption in transit
TLS 1.2+ enforced across all connections. WAF proxy, API endpoints, and agent communication — no exceptions.
Encryption at rest
Database encryption, scan result storage, and backup volumes protected with AES-256.
Incident response
Real-time alerting, correlated findings, and guided remediation workflows for rapid containment.
Change management
Version-tracked policy changes, configuration history, and rollback capability for every security control.
Availability monitoring
Uptime monitoring, health checks, and redundancy across platform components.
Vendor management
Minimal third-party dependencies. No data sharing with external model training pipelines.


SOC 2 Type II
Trust service criteria, mapped to real controls
Lyrie maps to SOC 2 trust service criteria across security, availability, and confidentiality. When your auditor asks “show me the control,” you open the dashboard — not a spreadsheet.
Access control
Role-based permissions, MFA enforcement, and session management across dashboard and API access.
Audit logging
Every authentication event, configuration change, and security action logged with timestamps and actor identity.
Encryption in transit
TLS 1.2+ enforced across all connections. WAF proxy, API endpoints, and agent communication — no exceptions.
Encryption at rest
Database encryption, scan result storage, and backup volumes protected with AES-256.
Incident response
Real-time alerting, correlated findings, and guided remediation workflows for rapid containment.
Change management
Version-tracked policy changes, configuration history, and rollback capability for every security control.
Availability monitoring
Uptime monitoring, health checks, and redundancy across platform components.
Vendor management
Minimal third-party dependencies. No data sharing with external model training pipelines.

Data subject
rights are not
a feature request
— they are built in
Access, deletion, portability, and consent management are native dashboard controls. Your users exercise their rights. You stay compliant. No engineering tickets required.

Right of access
Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.

Right to deletion
Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.

Data minimization
IP truncation, configurable retention windows, and region lock ensure you collect only what you need.

Consent management
Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.

Data portability
Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

No-training guarantee
Contractual commitment: your data is never used to train AI models. Period.


Right of access
Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.


Right to deletion
Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.


Data minimization
IP truncation, configurable retention windows, and region lock ensure you collect only what you need.


Consent management
Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.


Data portability
Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.


No-training guarantee
Contractual commitment: your data is never used to train AI models. Period.

Data subject
rights are not
a feature request
— they are built in
Access, deletion, portability, and consent management are native dashboard controls. Your users exercise their rights. You stay compliant. No engineering tickets required.

Right of access
Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.

Right to deletion
Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.

Data minimization
IP truncation, configurable retention windows, and region lock ensure you collect only what you need.

Consent management
Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.

Data portability
Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

No-training guarantee
Contractual commitment: your data is never used to train AI models. Period.


Right of access
Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.


Right to deletion
Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.


Data minimization
IP truncation, configurable retention windows, and region lock ensure you collect only what you need.


Consent management
Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.


Data portability
Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.


No-training guarantee
Contractual commitment: your data is never used to train AI models. Period.
PCI DSS
PCI DSS
Requirement mapping for payment security
One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.
REQ
6.6
WAF Protection
One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.
REQ
10.1
Audit Trail
All access to system components logged with user identity, timestamps, and action details.
REQ
10.2
Event Logging
Security events, authentication attempts, and configuration changes recorded and searchable.
REQ
10.6
Log Review
Dashboard analytics and alerting enable daily review of security events and anomalies.
REQ
11.2
Vulnerability Scanning
Scheduled and on-demand scans with professional reports for quarterly ASV validation support.
REQ
12.10
Incident Response
Real-time detection, correlated findings, and remediation workflows for rapid response.
REQ
6.6
WAF Protection
One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.
REQ
10.1
Audit Trail
All access to system components logged with user identity, timestamps, and action details.
REQ
10.2
Event Logging
Security events, authentication attempts, and configuration changes recorded and searchable.
REQ
10.6
Log Review
Dashboard analytics and alerting enable daily review of security events and anomalies.
REQ
11.2
Vulnerability Scanning
Scheduled and on-demand scans with professional reports for quarterly ASV validation support.
REQ
12.10
Incident Response
Real-time detection, correlated findings, and remediation workflows for rapid response.

Our data handling commitment

Encryption everywhere
TLS 1.2+ in transit, AES-256 at rest. Every data path is encrypted — dashboard, API, agent sync, scan storage.

No model training
Your data protects you and only you. Contractual guarantee that no request data, scan results, or telemetry feeds any training pipeline.

Region awareness
Region lock controls keep your data in the geography your compliance framework requires.

Configurable retention
Set how long data lives — 7, 30, 90, 180, or 365 days. When the window closes, data is deleted permanently.

Exportable audit logs
Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

Least-privilege access
Role-based permissions, MFA enforcement, and session controls limit exposure surface inside the platform.

Our data handling commitment


Encryption everywhere
TLS 1.2+ in transit, AES-256 at rest. Every data path is encrypted — dashboard, API, agent sync, scan storage.


No model training
Your data protects you and only you. Contractual guarantee that no request data, scan results, or telemetry feeds any training pipeline.


Region awareness
Region lock controls keep your data in the geography your compliance framework requires.


Configurable retention
Set how long data lives — 7, 30, 90, 180, or 365 days. When the window closes, data is deleted permanently.


Exportable audit logs
Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.


Least-privilege access
Role-based permissions, MFA enforcement, and session controls limit exposure surface inside the platform.
Ready to simplify your next audit?
Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.

Ready to simplify your next audit?
Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.

Ready to simplify your next audit?
Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.

Ready to simplify your next audit?
Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.
