Compliance

Sudennian AI

Welcome to the Sudennian AI. Sudennian AI is an AI is a research company that works to create reliable, interpretable and orientable AI systems to assist develop games, reduce costs, increase productivity and reduce human effort during periods of long working hours. We believe deeply in transparency and the need for secure practices in this continuously evolving industry.

This page acts as an overview to demonstrate our commitment to compliance and security. Here you can find our certifications, request documentation, and view high level details on controls we adhere to. To access sensitive documents or receive updates within this portal please contact us

Compliance

______________________________________________________________________________________________________________

Risk Profile

______________________________________________________________________________________________________________

______________________________________________________________________________________________________________

Product Security

______________________________________________________________________________________________________________

Reports

Self-Assessments

______________________________________________________________________________________________________________

______________________________________________________________________________________________________________

Data Security

______________________________________________________________________________________________________________

App Security

______________________________________________________________________________________________________________

______________________________________________________________________________________________________________

Legal

______________________________________________________________________________________________________________

Data Privacy

______________________________________________________________________________________________________________

Access Control

______________________________________________________________________________________________________________

Infrastructure

______________________________________________________________________________________________________________

Endpoint Security

______________________________________________________________________________________________________________

Network Security

Corporate Security

Policies

Security Grades

Sudennian AI is reviewed and trusted by

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Third Party Dependence

Hosting

Integrations

Multi-Factor Authentication

Role-Based Access Control

SSO Support

(ON GOING)

Network Diagram

Sudennian AI System Cards

Pentest Report

SOC 2 Report

CAIQ

CAIQ Lite

HECVAT Lite

SIG Core

VSA Full

______________________________________________________________________________________________________________

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Backups Enabled

Data Deletion / Data Retention

Encryption-at-rest

Encryption-in-transit

Physical Security

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

______________________________________________________________________________________________________________

Responsible Disclosure

Code Analysis

Credential Management

Secure Development Policy

Vulnerability & Patch Management

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Subprocessors

Cyber Insurance

Data Processing Agreement

Master Services Agreement

Privacy Policy

Service-Level Agreement

Terms of Service

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Cookies

Data Breach Notifications

Data Privacy Officer

Data Transfer Impact Assessment (DTIA)

Employee Privacy Training

PII Usage

(ON GOING)

(ON GOING)

(ON GOING)

Data Access

Logging

Password Security

(ON GOING)

(ON GOING)

(ON GOING)

Status Monitoring

Azure

AWS

BC/DR

InfrastructureSecurity

Network Time Protocol

Separate Production Environment

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Disk Encryption

DNS Filtering

Endpoint Detection & Response

Mobile Device Management

Threat Detection

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Data Exfiltration Monitoring

DMARC

Firewall

IDS

Security Information and Event Management

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Email Protection

Employee Training

HR Security

Incident Response

Internal Assessments

Internal SSO

Penetration Testing

Security Operations Center

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

Acceptable Use Policy

Access Control Policy

Code of Conduct

Cryptography Policy

Data Management Policy

Incident Response Policy

Information Security Policy

Operations Security Policy

Risk Management Policy

Secure Development Policy

Third Party Management Policy

Vulnerability Management Policy

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

BitSight

ImmuniWeb

Qualys SSL Labs

(ON GOING)

(ON GOING)

(ON GOING)

(ON GOING)

______________________________________________________________________________________________________________

(ON GOING)

(ON GOING)

(ON GOING)