Documents
Featured Documents
Access Control
Access Control
Access is tightly monitored and controlled at Lext; we operate on a least-privilege principle to ensure only authorised personnel with an approved and relevant business need may access information assets.
Asset Management
Asset Management
Maintaining the confidentiality, integrity and availability of information is a paramount consideration for Lext. Lext ensures the security of all information assets in accordance with the organisation's ISO27001:2022 compliant Information Security Management System.
Data Security
Data Security
Lext implements ISO27001:2022 compliant data classification, retention and protection controls to ensure the utmost security of all information.
Continuous Monitoring
Continuous Monitoring
Lext continuously monitors its systems for security threats and vulnerabilities. Where issues do arise, Lext enforces a structured vulnerability tracking process for both internal and external software, system and process vulnerabilities.
Incident Response
Incident Response
To minimise disruptions on Lext's operations, Lext has strict controls in place to ensure immediate detection of and rapid response to any security breaches.

