Information Security Policy

LogYou GmbH — LogShip ERP Platform

Version: 1.0 Effective: March 2026 Classification: Confidential Owner: IT Management

1. Purpose & Scope

This policy establishes the information security framework for LogYou GmbH's LogShip ERP platform and all associated systems. It applies to all employees, contractors, and systems that process, store, or transmit business data, including data received from third-party integrations such as the Amazon Selling Partner API (SP-API).

The policy ensures compliance with:

2. Security Principles

All security decisions are guided by the following principles:

3. Infrastructure Security

3.1 Hosting Environment

All systems are hosted at Hetzner, a German datacenter provider with ISO 27001 certification and SOC compliance. Servers are located in Germany, ensuring EU data residency.

3.2 Virtualization

All servers run as isolated virtual machines on Proxmox VE hypervisor. The Proxmox management interface is restricted to the internal network and is not accessible from the public internet. VM isolation ensures that compromise of one service does not affect others.

3.3 Network Security

3.4 Operating System Hardening

4. Data Protection

4.1 Encryption in Transit

4.2 Encryption at Rest

4.3 Data Classification

ClassificationExamplesControls
ConfidentialAPI credentials, encryption keys, database passwordsEncrypted at rest, encrypted in transit, restricted access, never logged
InternalBusiness records, order data, partner informationEncrypted in transit, role-based access, audit logging
PublicCompany website, tracking pagesStandard web security controls

5. Access Control

5.1 Authentication

5.2 Role-Based Access Control (RBAC)

5.3 Access Lifecycle

5.4 Server Access

6. Application Security

6.1 Secure Development Practices

6.2 OWASP Protection

6.3 Server-Side Architecture

All sensitive operations, including Amazon SP-API calls, are executed server-side in Nuxt API routes. The browser client never receives API credentials, access tokens, or direct access to backend services. This architecture eliminates client-side credential exposure risk.

7. Amazon SP-API Data Handling

7.1 Purpose Limitation

Amazon SP-API integration is used for order fulfillment and accounting workflows:

No Amazon data is used for marketing, analytics, profiling, or any purpose beyond order fulfillment and accounting.

7.2 PII Data Inventory

DataStored?EncryptionPurposeRetention
Customer NameYesAES-256Shipping labels, invoicesBusiness lifecycle / deletion request
Email AddressYesAES-256Shipping notificationsBusiness lifecycle / deletion request
Phone NumberYesAES-256Shipping labels (carrier requirement)Business lifecycle / deletion request
Shipping AddressYesAES-256Shipping labelsBusiness lifecycle / deletion request
Billing AddressYesAES-256Invoice generationBusiness lifecycle / deletion request
Amazon Order IDYesAES-256Order linkingBusiness lifecycle
SP-API CredentialsYesAES-256API authenticationUntil admin removes
LWA Access TokensNo (in-memory)N/APer-operation authDiscarded after use
Payment/Financial DataNoN/ANot accessedN/A

7.3 PII Encryption

7.4 Credential Security

7.5 Third-Party PII Sharing

Amazon customer PII is shared with the following third parties, exclusively for order fulfillment:

RecipientPII SharedPurposeSecurity
DHLName, address, email, phoneShipping label creationHTTPS/TLS + OAuth 2.0
SendcloudName, addressMulti-carrier label creationHTTPS/TLS + Basic Auth
Amazon (SP-API)Invoice with billing detailsVAT compliance uploadHTTPS/TLS + LWA OAuth

Both DHL and Sendcloud are GDPR-compliant EU service providers. No Amazon PII is shared with analytics, marketing, advertising, or any non-operational service.

7.6 Data Deletion

Amazon customer PII can be deleted through the admin interface at any time. When a seller revokes SP-API authorization or the business relationship ends, all associated customer records, order data, and marketplace credentials are removed from the system. Individual customer records can be deactivated or fully purged by authorized admin users. We comply with both Amazon's Data Protection Policy and GDPR Article 17 (right to erasure), subject to legal retention obligations under German tax law (10-year retention for financial records).

8. Monitoring & Incident Response

8.1 Logging

8.2 Incident Response Procedure

  1. Detection: Monitor logs for unusual activity, failed auth attempts, unexpected errors, IDS/IPS alerts
  2. Assessment: Evaluate severity, scope, and data impact. Determine if Amazon seller data is affected
  3. Containment: Isolate affected services, revoke compromised credentials, block suspicious IPs via OPNsense
  4. Notification: If Amazon seller data is involved, notify Amazon and affected sellers within 24 hours per DPP requirements. Notify relevant authorities per GDPR if personal data is breached (72-hour deadline)
  5. Eradication: Remove threat, patch vulnerabilities, rotate affected credentials
  6. Recovery: Restore services from backups if needed, verify system integrity, deploy fixes
  7. Post-Mortem: Document root cause, timeline, impact, and preventive measures

Approval: This incident response plan is approved by senior management and reviewed every 6 months. Amazon will be notified at security@amazon.com within 24 hours if Amazon seller data is potentially affected.

8.3 Business Continuity

9. Vulnerability Management

9.1 Scanning Schedule

9.2 Remediation Timelines

SeverityRemediation Deadline
CriticalWithin 7 days
HighWithin 30 days
MediumWithin 90 days
LowNext scheduled maintenance

9.3 Penetration Testing

Application security assessments are performed periodically (minimum every 365 days), covering the public-facing HTTPS endpoint, OAuth/LWA token flows, and any backend logic processing third-party API data.

10. Privacy & GDPR Compliance

11. Third-Party Management

External services used by the platform:

ServicePurposeAmazon PII Shared?Security
Amazon SP-APIOrder import, invoice uploadYes (invoices with customer data)OAuth 2.0 / LWA, HTTPS
DHL APIShipping labelsYes (name, address, email, phone)OAuth 2.0, HTTPS
SendcloudMulti-carrier shippingYes (name, address)Basic Auth, HTTPS
ShopifyE-commerce channelNoOAuth 2.0, HTTPS
HetznerInfrastructure hostingN/A (IaaS provider)ISO 27001, physical security

Policy: Amazon customer PII is shared exclusively with shipping carriers (DHL, Sendcloud) for the operational purpose of creating shipping labels. Both carriers are GDPR-compliant EU service providers. No Amazon data is shared with analytics, marketing, or non-operational services. All third-party API communications use encrypted HTTPS connections.

12. Policy Review

This security policy is reviewed and updated at least annually, or whenever significant changes occur to the infrastructure, application, or regulatory requirements. All team members are informed of policy updates.

LogYou GmbH — Information Security Policy v1.0

Approved by: IT Management — Effective: March 2026

This document is confidential and intended for internal use and authorized assessment processes only.