
Aikido
- Websitehttps://aikido.dev
- Trust Centerhttps://aikido.trust.page
- Compliance
- GDPR
Aikido is in full support of the General Data Protection Regulation (GDPR). GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. The regulation allows EU citizens to request all the information a company has saved on them, in addition to requesting that all personal information is removed from a company's systems and any subprocessors who have handled their data.
- Product Security
- GitHub SSO
- Data Security
- Data Encrypted At-Rest
- Data Encrypted In-Transit
- Privacy
- Privacy Policy
Your privacy is important at Aikido. Please see our Privacy Policy for specific information.
- Data Retention Policy
null
1 more topic
- Incident Management & Response
- Incident Response Plan (IRP)
Aikido's Incident Response Plan is intended to establish controls to ensure detection of security vulnerabilities and incidents, as well as quick reaction and response to security breaches.
This plan also provides implementing instructions for security incident response, to include definitions, procedures, responsibilities, and performance measures (metrics and reporting mechanisms).
If you would like to learn more, please request a copy of Aikido's Incident Response Plan.
- Availability & Reliability
- Organizational Security
- Employee Background Checks
Aikido requires background checks for all employees.
- Employee Security Training
All new hires are required to complete information security awareness training as part of their new employee onboarding process and annually thereafter. New hire onboarding will be completed within 30 days after the date the employee or contractor is hired. Ongoing training will include security and privacy requirements as well as training in the correct use of information assets and facilities.
The organization will properly document that the training has been provided to all employees. 2 more topics
- Business Continuity
- Data Backups
null
- Threat Management
- Vulnerability Scanning
null
- Subprocessors
Sign up to view Aikido's Subprocessors
Sign up to see the rest of Aikido's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.