Security Compliance

Lens implements comprehensive security controls aligned with industry best practices and regulatory requirements. This page provides security teams, auditors, and partners with a transparent view of Lens security architecture, controls, and compliance posture.

GDPR CompliantCCPA CompliantOWASP Top 10 Mitigated

Compliance Basis

Lens security compliance is based on the C2PA Security Considerations v2.2 and C2PA Harms Modelling v2.2 specifications. These documents provide the foundational framework for our security architecture, threat modeling, and harm mitigation strategies.

Primary References:

All security controls, threat mitigations, and privacy protections documented on this page align with the guidance and recommendations provided in these C2PA specifications.

Compliance Summary

Data Protection
GDPR, CCPACompliant
Cryptographic Security
Industry-standard (Secure Enclave, ECDSA P-256, TLS 1.3)Implemented
Mobile Security
OWASP Mobile Top 10Mitigated
Privacy
Privacy by DesignImplemented
Incident Response
ISO 27001-alignedDocumented

Security Architecture

Lens follows a defense-in-depth security model with multiple layers of protection.

Hardware-backed security via iOS Secure Enclave
Zero-trust architecture for all data access
Privacy by design in all features
Minimal data collection principle
End-to-end encryption for sensitive operations

Security Layers

1. Device Security

ControlImplementationStatus
Secure Enclave IntegrationHardware-backed P-256 keys, non-extractableActive
Keychain ServicesiOS Keychain for credential storageActive
App SandboxingiOS App Sandbox isolationActive
Code SigningApple Developer certificate validationActive
Runtime ProtectionASLR, stack canaries, code signingActive

2. Data Protection

ControlImplementationStatus
Encryption at RestiOS Data Protection API (Class A)Active
Encryption in TransitTLS 1.3 for all network communicationsActive
File System EncryptioniOS File Protection APIActive
Key ManagementSecure Enclave hardware keysActive
Certificate PinningNot implementedOptional (planned)

3. Network Security

ControlImplementationStatus
TLS ConfigurationTLS 1.3 minimum, perfect forward secrecyActive
Certificate ValidationFull chain validation with OCSPActive
Network IsolationNo direct internet access requiredActive
Offline-FirstCore functionality works offlineActive
Rate LimitingClient-side (feedback); server-side depends on third-party APIsClient-side only

4. Application Security

ControlImplementationStatus
Input ValidationAll user inputs sanitized and validatedActive
Output EncodingXSS prevention via output encoding & content sanitizationActive
SQL Injection PreventionParameterized queries (if applicable)N/A
Memory SafetySwift memory safety, ARCActive
Dependency ManagementRegular security updates, vulnerability scanningActive

Data Protection & Privacy

Lens implements privacy by design principles throughout the application.

Privacy Principles:

  • Data Minimization: Only collects data necessary for core functionality
  • Purpose Limitation: Data used only for stated purposes
  • Storage Limitation: Data retained only as long as necessary
  • User Control: Users control what data is captured and stored
  • Transparency: Clear privacy policy and data handling disclosures

GDPR & CCPA Compliance

User Rights

RightImplementationStatus
Right to AccessExport functionality for user dataImplemented
Right to DeletionDelete all app data via settingsImplemented
Right to PortabilityExport media files with metadataImplemented
Right to RectificationEdit metadata before exportImplemented
Right to ObjectOpt-out of analytics and telemetryImplemented
Right to RestrictionPause data processingImplemented

Cryptographic Security

Key Management

Keys are generated in hardware (Secure Enclave); password-based key derivation is not used.

AspectImplementationStandard
Key GenerationSecure Enclave hardware RNGPlatform (Apple); NIST SP 800-90A aligned per vendor documentation
Key StorageSecure Enclave, non-extractableApple Secure Enclave (see Apple platform security)
Key RotationPer-device certificates, revocation supportIndustry best practice
Key BackupDevice-only; no key export or iCloud backupN/A

Encryption Standards

Use CaseAlgorithmKey SizeStatus
C2PA SigningECDSA P-256256-bitActive
TLSECDHE + AES-256-GCM256-bitActive
File ProtectionAES-256256-bitActive

Vulnerability Management

Security Testing

Test TypeFrequencyStatus
Static AnalysisPre-commit, CI/CDActive
Dependency ScanningWeekly automated scansActive
Penetration TestingAnnual third-party auditsPlanned
Code ReviewAll changes reviewedActive
Security AuditsQuarterly internal reviewsActive

OWASP Mobile Top 10 Coverage

ThreatMitigationStatus
M1: Improper Platform UsageiOS HIG compliance, secure APIsMitigated
M2: Insecure Data StorageiOS Data Protection, encryptionMitigated
M3: Insecure CommunicationTLS 1.3, certificate pinningMitigated
M4: Insecure AuthenticationSecure Enclave, biometric authMitigated
M5: Insufficient CryptographyIndustry-standard algorithmsMitigated
M6: Insecure AuthorizationApp sandbox, permission modelMitigated
M7: Client Code QualitySwift memory safety, code reviewMitigated
M8: Code TamperingCode signing, runtime checksMitigated
M9: Reverse EngineeringCode obfuscation (optional)Partial
M10: Extraneous FunctionalityMinimal dependencies, code auditMitigated

Vulnerability Disclosure:

  • Responsible Disclosure: lens@field-notes.dev
  • Response Time: 48 hours acknowledgment, 90 days resolution target
  • CVE Assignment: For critical vulnerabilities
  • Public Disclosure: After patch deployment and user notification

Dependency vulnerability management

We are committed to remediating Critical and High CVEs in our dependencies within 90 days. Our process (SCA, SBOM, policy, and runbook) is documented in our Product Security Architecture and dependency-vulnerability-management runbook. We use GitHub Dependency Graph and Dependabot for visibility and alerts, and Trivy in CI for vulnerability scanning and CycloneDX SBOM generation. For dependency CVE reports or questions: lens@field-notes.dev.

Compliance Certifications

CertificationStatusNotes
ISO 27001Not CertifiedAligned with controls
SOC 2 Type IINot CertifiedPlanned for future
GDPRCompliantSelf-assessment
CCPACompliantSelf-assessment
HIPAANot ApplicableNot a healthcare app