Compliance
Sudennian AI
Welcome to the Sudennian AI. Sudennian AI is an AI is a research company that works to create reliable, interpretable and orientable AI systems to assist develop games, reduce costs, increase productivity and reduce human effort during periods of long working hours. We believe deeply in transparency and the need for secure practices in this continuously evolving industry.
This page acts as an overview to demonstrate our commitment to compliance and security. Here you can find our certifications, request documentation, and view high level details on controls we adhere to. To access sensitive documents or receive updates within this portal please contact us
Compliance
______________________________________________________________________________________________________________
Risk Profile
______________________________________________________________________________________________________________
______________________________________________________________________________________________________________
Product Security
______________________________________________________________________________________________________________
Reports
Self-Assessments
______________________________________________________________________________________________________________
______________________________________________________________________________________________________________
Data Security
______________________________________________________________________________________________________________
App Security
______________________________________________________________________________________________________________
______________________________________________________________________________________________________________
Legal
______________________________________________________________________________________________________________
Data Privacy
______________________________________________________________________________________________________________
Access Control
______________________________________________________________________________________________________________
Infrastructure
______________________________________________________________________________________________________________
Endpoint Security
______________________________________________________________________________________________________________
Network Security
Corporate Security
Policies
Security Grades
Sudennian AI is reviewed and trusted by
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Third Party Dependence
Hosting
Integrations
Multi-Factor Authentication
Role-Based Access Control
SSO Support
(ON GOING)
Network Diagram
Sudennian AI System Cards
Pentest Report
SOC 2 Report
CAIQ
CAIQ Lite
HECVAT Lite
SIG Core
VSA Full
______________________________________________________________________________________________________________
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Backups Enabled
Data Deletion / Data Retention
Encryption-at-rest
Encryption-in-transit
Physical Security
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
______________________________________________________________________________________________________________
Responsible Disclosure
Code Analysis
Credential Management
Secure Development Policy
Vulnerability & Patch Management
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Subprocessors
Cyber Insurance
Data Processing Agreement
Master Services Agreement
Privacy Policy
Service-Level Agreement
Terms of Service
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Cookies
Data Breach Notifications
Data Privacy Officer
Data Transfer Impact Assessment (DTIA)
Employee Privacy Training
PII Usage
(ON GOING)
(ON GOING)
(ON GOING)
Data Access
Logging
Password Security
(ON GOING)
(ON GOING)
(ON GOING)
Status Monitoring
Azure
AWS
BC/DR
InfrastructureSecurity
Network Time Protocol
Separate Production Environment
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Disk Encryption
DNS Filtering
Endpoint Detection & Response
Mobile Device Management
Threat Detection
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Data Exfiltration Monitoring
DMARC
Firewall
IDS
Security Information and Event Management
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Email Protection
Employee Training
HR Security
Incident Response
Internal Assessments
Internal SSO
Penetration Testing
Security Operations Center
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
Acceptable Use Policy
Access Control Policy
Code of Conduct
Cryptography Policy
Data Management Policy
Incident Response Policy
Information Security Policy
Operations Security Policy
Risk Management Policy
Secure Development Policy
Third Party Management Policy
Vulnerability Management Policy
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
BitSight
ImmuniWeb
Qualys SSL Labs
(ON GOING)
(ON GOING)
(ON GOING)
(ON GOING)
______________________________________________________________________________________________________________
(ON GOING)
(ON GOING)
(ON GOING)
Sudennian AI
© 2024 Sudennian AI .Inc