Trust and security

Built with cybersecurity and customer privacy in mind, Lumana features secure by default and fully encrypted architecture.

lumana ai video security Lumana Bullet Cameralumana ai video security Lumana Bullet Camera

Complete protection. In transit and at rest.

Lumana rack-mounted server chassis with black front panel and ventilation grills.

Storage

Video remains on-premises, stored locally with AES 256 encryption.

AES 256

Shield icon with a padlock featuring a checkmark, symbolizing security and protection.

Network

No open ports. Data transfer is secured via HTTPS encryption with TLS v1.2.

AES 256, TLS v1.2

3D white cloud icon casting a shadow on a white surface with a black background.

Cloud

Data is always accessible and secured, in transit and at rest, with AES 256.

AES 256

Compliance

NDA icon

NDAA Compliant

Lumana cameras comply with the US 2019 National Defense Authorization Act (Section 889), which prohibits governing bodies from purchasing video communication equipment from specific manufacturers.

SOC compliance icon

SOC-2 Type 2

Advantage Partners, an independent auditor, has confirmed that Lumana's design and controls in protecting customer data meet the requirements outlined in the AICPA 2017 Trust Services Criteria for Security.

HIPAA compliance icon

HIPAA Compliant

Health Insurance Portability and Accountability Act safeguards the privacy, security, and integrity of individuals' health information, ensuring it is properly protectedand confidential.

Security-first leadership

Lumana maintains dedicated executive roles for cybersecurity and data privacy — a CISO who owns our security posture end-to-end, and a DPO who ensures compliance with GDPR and global data protection regulations.

CISO role icon

Chief Information Security Officer

Our CISO spearheads Lumana’s cybersecurity strategy, fortifying threat management and hardening our security architecture across every product and layer of infrastructure.

DPO role icon

Data Protection Officer

Our DPO embeds global data protection standards into every Lumana product and process, serving as the primary advocate for customer privacy and regulatory compliance at every stage of development

Application security

Secure lock with keyhole opening

Fortified
APIs

Unique organization-based API keys ensure only authenticated and authorized users can access the system.

Warning alert icon with an exclamation mark inside a triangle

Vulnerability management

Lumana is routinely pen tested and features automatic firmware updates to stay ahead of emerging threats.

Camera connected to a magnifying glass

Single sign-on
(SSO)

Unified credentials across applications streamline access management and enhance overall system security.

Stacked database or layered server architecture

Integrated audit
logs

Easily monitor how users interact with Lumana and see when activities occur and what specific actions have taken place.

Cloud storage with bidirectional data flow

Redundant cloud backup

Keep footage secure and inaccessible from physical and external threats by automatically storing video data in the cloud for up to 365 days.

security lock

Multi-factor authentication

Lumana supports Google Authenticator, offering robust Multi-Factor Authentication to protect against unauthorized access.


Multiple connected people or user network

Role-based access control

Customizable user permissions and organizational roles provide the appropriate levels of access to locations and cameras.


Split-screen or dual-panel layout

External
storage

Utilize external storage options, such as S3 compliance objects, to securely extend backup retention.


Security-first leadership

Icon of a prohibition symbol with a diagonal line through a circle

No port-forwarding

No port forwarding is required, limiting your exposure to open ports, security risks, unauthorized access, and cyber attacks.

Icon of a user profile with an upload arrow

User identity authentication

System users are automatically authenticated via Okta, a lead Identity and Access Management (IAM) provider, to verify system access.

Icon of a media player with audio waveform

HTTPS in transit

All network traffic operates via HTTPS, guaranteeing encryption, authentication, and data integrity during transmission.

Icon of a person presenting at a podium

Independent local network

Lumana Core enables physical separation of your camera's local network from the internet, utilizing dual NIC configuration.

Responsible AI policy

Lumana's AI Policy defines the principles and ethical safeguards governing how we develop, deploy, and operate artificial intelligence — ensuring transparency, fairness, and accountability at every stage.

Screenshot of Lumana AI Policy webpage showing terms of service, last updated January 2026, and introduction to AI Functions section.