Data Security

Learning Machine helps organizations issue official digital records that are securely recorded to your blockchain of choice. We take the security of your data seriously and are committed to being proactive in making our practices clear.

Data Encryption in Transit and at Rest

Learning Machine services support the latest recommended secure cipher suites and protocols to encrypt all traffic in transit using 256-bit SSL. Customer Data is also encrypted at rest with 256-bit AES.

Public & Private Key Management

The Learning Machine services use Hierarchic Deterministic (HD) wallets for issuer key generation. The initial seed is created by a BIP39 mnemonic phrase that is fully encrypted and connected to a customer-provided issuing password. This results in a keypair hive from which keychains can be derived. The customer-provided issuing password must be entered by the customer before each issuance.

Fraud Detection Monitoring

Learning Machine actively monitors for key leaks on behalf of issuing organizations. If a leak is detected or suspected, Learning Machine has a process to notify the issuing organization to revoke suspect certificates and enact a process for key rotation.


We place strict controls over our employees’ access to the data you and your users make available via Learning Machine services, as more specifically defined in your agreement with Learning Machine covering the use of the Learning Machine services (“Customer Data”), and are committed to ensuring that Customer Data is not seen by anyone who should not have access to it. The operation of Learning Machine services requires that some employees have access to the systems which store and process Customer Data. For example, in order to diagnose a problem you are having with Learning Machine services, we may need to access your Customer Data. These employees are prohibited from using these permissions to view Customer Data unless it is necessary to do so. We have technical controls and audit policies in place to ensure that any access to Customer Data is logged.

All of our employees and contract personnel are bound to our policies regarding Customer Data, and we treat these issues as matters of the highest importance within our company.

Personnel Practices

Learning Machine conducts background checks on all employees before employment, and employees receive security training during onboarding as well as on an ongoing basis. All employees are required to learn our comprehensive information security policy covering the security, availability, and confidentiality of Learning Machine services.


Learning Machine utilizes Amazon Web Services (AWS) to host the environment that runs Learning Machine Saas and Private Stack services. Amazon maintains multiple certifications for its data centers, including ISO 27001 compliance, PCI Certification, and SOC reports. For more information about their certification and compliance, please visit the AWS Security website and the AWS Compliance website.

Security Features for Team Members & Administrators

In addition to the work we do at the infrastructure level, we provide your Administrators with tools for passwords, roles, and permissions to enable their own users to operate securely.

Access Logging

Detailed access logs are available both to users and Administrators. We log every time data is edited and who edited it. Administrators can review consolidated access logs for their whole team.


Our infrastructure runs on systems that are protected against failures of individual servers or even entire data centers. Our operations team tests recovery measures regularly and staffs an on-call team to quickly resolve unexpected incidents.

Disaster Recovery

Customer Data is stored redundantly at multiple locations in our hosting provider’s data centers to ensure availability. We have well-tested backup and restoration procedures, which allow recovery from a major disaster. Customer Data and our source code are automatically backed up nightly.

Network Protection

In addition to sophisticated system monitoring and logging, we have implemented two-factor authentication for all server access across our production environment. Firewalls are configured according to industry best practices, and unnecessary ports are blocked by configuration with AWS Security Groups.

Host Management

We perform automated vulnerability scans on our production hosts and remediate any findings that present a risk to our environment.


Learning Machine maintains an extensive, centralized logging environment in its production environment which contains information pertaining to security, monitoring, availability, access, and other metrics about Learning Machine services. These logs are analyzed for security events via automated monitoring software, overseen by the security team. If data is encrypted, it will not be displayed unencrypted in the logs.

Incident Management & Response

In the event of a security breach, Learning Machine will promptly notify you of any unauthorized access to your Customer Data. Learning Machine has incident management policies and procedures in place to handle such an event.

Product Security Practices

Any new features, functionality, and design changes go through a security review process. In addition, our code is tested with automated analysis software and manually peer reviewed prior to being deployed to production. The security team works closely with development teams to resolve any additional security concerns that may arise during development.

Curious to know more? Download a free overview.