How Lucidchart Protects Your Data
Nathan Cooper, Senior Security Engineer
David Torgerson, Director of Engineering
Lucidchart, provided by Lucid Software, Inc., is the essential visual productivity platform that helps anyone understand and share ideas, information, and processes with clarity. The power, simplicity, affordability, and security of Lucidchart have driven its adoption by millions of individuals and teams from numerous businesses and educational institutions.
The following paper introduces Lucidchart’s security policies, practices, and procedures. Review it to gain an understanding of how Lucidchart employees, service providers, and partners safeguard customer data.
Lucidchart import and export options
Lucidchart is delivered through a software-as-a-service model that avoids upfront costs and IT operational burden. It is designed to be seamlessly compatible with several productivity platforms.
Microsoft Office 365
Information security governance
Securing customer data is a primary objective at the highest levels of management at Lucid Software. To this end, Lucid maintains a team dedicated to securing Lucid’s systems, processes, and controls. This team develops and implements the overall security program at Lucid, including training sessions, internal audits, and evaluations of compliance.
The security team at Lucid assists operations in maintaining systems related to event reporting, identity management, and configuration management, ensuring that they are properly geared to accommodate the security requirements of the customer.
Secure architecture, controls, and partners
Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS)
U.S. General Services Administration FISMA Moderate level operation
ISO 27001 certification
To learn more about the security procedures employed by AWS, please review their documentation.
SAS70 Type II audits
Lucidchart delivers secure diagramming through a defensive application architecture, a system of internal controls, and a set of policies governing partnerships and integrations. Lucidchart provides security across many dimensions, including data secrecy, authentication, authorization, and auditing.
Lucidchart is powered by Amazon Web Services (AWS), the industry’s leading provider of secure computing infrastructure. AWS meets stringent security requirements, including a variety of physical controls to the data centers, data privacy guarantees, and robust controls to its services. AWS has published white papers on risk and compliance and security processes. AWS has achieved the following certifications and third-party attestations:
Lucid Software understands the sensitivity of private business documents, communication, and personally identifiable information. To ensure the privacy of this information, all data is transferred between user devices and Lucidchart servers using up to 256-bit encryption via TLS 1.2 and a world-class certificate provider.
Lucidchart also employs encryption at rest to protect the secrecy of all data persisted by the application. All databases, database-backed caches, and other components with persisted data have their disks initialized with random data using a high-entropy, random data source. During use, the disks encrypt their contents with 256-bit AES with ESSIV. The cryptographic keys are protected by a pair of redundant passphrases stored in separate environments.
Lucidchart runs in an AWS Virtual Private Cloud (VPC) that is not accessible from the public Internet. All traffic to and from the public Internet must travel through specific gateways.
The Lucid Software operations team uses secure connections for working on VPC machines. Network access to the environment happens through an industry-standard VPN solution that is locked down to a strict set of clients. SSH connections to the VPC servers use Diffie-Hellman 2048 for key exchange and encrypt the entire session with industry-standard Blowfish cipher and 2048-bit unique keys. Keys are generated per user and can be shut off individually upon termination.
To provide rigorous access control, the various services and service tiers are segregated by network layer (IP) and transport layer (TCP & UDP) firewalls. The firewalls are implemented by AWS Security Groups and limit all inbound network connection attempts, except with strict sets of client machines for each service (see Figure 1 below).
An integral part of the Lucidchart service is the ability to securely access the tool at any time and from any device or location.
Documents, account information, access control lists, and other persistent data is replicated across availability zones using industry-standard database management systems, replication, and failover solutions.
All services are clustered and served through AWS Elastic Load Balancers (ELBs), giving users access to their documents whenever they need it.
One of the benefits to software-as-a-service is that users always get the latest version of the software at no cost and without any work by IT. That is true for Lucidchart, plus our biweekly upgrades are done with no downtime. Users will never receive a “down for scheduled maintenance” page when they need to finalize critical documents for a meeting or deadline.
Because components may fail on occasion, the Lucid Software operations team maintains a robust automated live site monitoring system and a 24/7 on-call rotation to ensure that the redundancy, failover, and self-healing mechanisms work properly at all times.
Customer documents and related data are backed up hourly to multiple physical environments across availability zones in encrypted format. The Lucid Software operations team performs regular validations of these snapshots to ensure that they can be used for restoration in the event of an emergency.
Lucidchart gives team administrators the flexibility to set the password policy for their account. They can set the required password length, required character classes, and frequency of password changes. Admins may also manually force all team members or individuals to reset their passwords.
Passwords are never transmitted in plain text. Only salted one-way hashes of passwords are ever stored by Lucidchart servers, never the passwords themselves. Individual user identity is authenticated and re-verified with each transaction, using a secure token created at login.
We follow security best practices and protect your data by using the principle of least privilege access. A simple role-based permissions system allows administrators to manage access to documents owned by the account. There are two primary sets of access controls: account controls and document controls. Four roles exist in regards to account management: account administrator, team administrator, user, and billing administrator. The following table lists the features that each role may access.
Comment on document
Restrict publishing of documents as web pages, exportable documents, and images.
Manage team settings
Manage integrations with other apps
The account management tools allow account and team admins to remove users from their account, as well as delete users that are part of their account. In the latter case, the admin has the option to take ownership of any documents that the deleted user owns.
Through the team settings page, admins can:
In relation to Lucidchart documents, there are four roles that users could have: owner, editor, commenter, and viewer. The creator of the document automatically occupies the role of owner, though this setting can be changed. Documents are private by default, i.e. no other user has any level of access to the document. The following table lists the features that each role may access.
Restrict the generation of public links to documents.
List team members
Manage group membership
Manage team admins
Set (not view) user passwords
Restrict document sharing on social networks.
Restrict sharing to users with email addresses under certain domains.
Manage subcription level
Lucidchart claims no ownership over any documents created through our services. Users retain copyright and any other rights, including all intellectual property rights, on created documents and all included content.
We respect your privacy and will never make your documents or other information publicly available without permission.
Lucid Software uses a multidimensional control framework to ensure that security is maintained and continually improved. Company leaders support security and provide a positive control environment. Risk assessment is performed by both internal and external system reviews. Security information and objectives are openly shared among team members, and security measures are continually monitored and improved.
Administrative access to the production environment of Lucidchart is controlled. Only authorized members of the Lucid Software operations team have access to the AWS console that manages the environment. Least privilege access is designed so that team members with a legitimate need to access components, such as production logs, may do so without administrative access to critical processes and secure drives.
Security reviews are performed at multiple stages in the development process. All critical architecture designs are reviewed by the relevant system maintainers. Code reviews of implemented designs include security reviews. These reviews verify secrecy, authentication, authorization, and other security needs of each feature or component.
Lucid Software hires a third party to perform penetration testing. These security professionals analyze Lucidchart for vulnerabilities such as the OWASP Top 10 threats and WASC threat classes. These analyses are performed semi-annually using industry-leading automated tools and extensive manual testing.
Many users are attracted to Lucidchart because of its easy integration with a variety of popular business applications. These integrations include on-premise applications like local Confluence instances and Microsoft Word, as well as many cloud-based services like Google Drive and Confluence OnDemand. Lucidchart integrations can be managed by account and team admins.
Lucidchart supports single sign-on (SSO) using the popular OpenID technology. Supported OpenID providers include Google and Yahoo.
Lucidchart also supports single sign-on through Security Assertion Markup Language (SAML). SAML is an XML-based framework for communicating user authentication, entitlement, and attribution information. When a customer enables SAML integration, Lucidchart acts as the service provider and the customer’s SAML service acts as the identity provider.
Lucidchart’s Microsoft Word integration uses a sandboxed browser built into Word. The browser opens up a version of the Lucidchart site on the lucidchart.com domain. Because the integration occurs through the browser, a user can access their diagrams using standard username and password. Those credentials are not shared with Word.
Admins for on-premise Confluence instances have the option to add the
Lucidchart plugin if desired. It is configured using an OAuth key and secret that are unique to that team and that only team and account admins can access on lucidchart.com. Confluence users are then able to insert Lucidchart diagrams using industry-standard OAuth.
Lucidchart integrates with Google Apps, Google Drive, and Jive using OAuth. Because these applications use OAuth, user passwords are never entered into or stored by a third-party application. The integrations require minimal configuration by the admin.
Lucidchart integrates with Confluence Cloud using JSON Web Token (JWT) authentication. Like OAuth, user passwords are never entered into or stored by a third-party application, and the integrations require minimal configuration.
Lucidchart supports the viewing of Microsoft Visio files on the web through its Visio API. Lucidchart plugins with Box.com and on-premise Confluence instances enable users of those apps to view Visio files.
Users access the viewer by manually selecting a single Visio file to view in Lucidchart. The file is sent over a secure HTTPS connection (see data encryption section) to the Lucidchart servers, and the plugin receives an HTTPS URL to a web page that allows the user to privately view the diagram. The web page is secured by a time-limited, secure token known only to that client.
The Visio files are not stored permanently by Lucidchart unless the user manually selects to import it into their Lucidchart account after viewing it. If the user does import the file, it is protected by all of the standard authentication and authorization mechanisms described above.
Lucidchart employs powerful defense procedures to keep its customers’ documentation secure. It provides secure diagramming to business users through a secure architecture, effective administrative tools, and a selection of partners respected by enterprises for their security.
The architecture implements secrecy through encrypted transmissions and storage of data. That data is made highly available and reliable through modern replication, backup, failover, and monitoring techniques. Authentication and authorization are foundational features of the service, with administrative controls to tune the system to meet different corporate guidelines and policies. In its integrations with several popular business tools, Lucidchart applies the same rigorous security standards.
Lucid Software is also committed to following information systems best practices of internal controls and external reviews.
To explore Lucidchart’s features, including a range of collaboration options and shape libraries, join our sales team for a live demo of the software. We’re happy to demonstrate its ease of use and answer any questions you might have.
About Lucid Software
Lucid Software is the parent company of two cloud-based visual productivity applications: Lucidchart and Lucidpress. Lucidchart is an essential visual productivity platform that helps anyone understand and share ideas, information, and processes with clarity. Lucidpress is an intuitive design and brand management platform allowing anyone to create on-brand content faster. Both are utilized in over 175 countries by more than 10 million users, including Comcast, NASA, Netflix, Target, and Xerox. Since the Utah-based company’s founding in 2010, Lucid Software has grown in revenue by nearly 100 percent each year and has received numerous awards for its business and workplace culture. For more information about Lucid Software, visit