Shinobi Security logoShinobi Security

Shinobi Security Trust Center

Shinobi Security is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance

Resources

SOC 2 Type I Report
Information Security Policy
Chief Information Security Officer (CISO) Policy
Incident Response Policy
Access Control and Termination Policy

Controls

Access restricted to modify infrastructure
Remote access tool
VPN access
User list with assigned roles and privileges
Access review of infrastructure
Encryption of data
Backup and recovery policy
Outsourced Development Management
Code repositories
Tracking of code changes
Sample code changes
Code branch protection rules
SSL/TLS certificates for infrastructure
Monitoring tool
Network diagram
Infrastructure firewall
Infrastructure baseline hardening policy
Alerts and remediation
Breach notification communication
Security incident list
Whistleblower policy
Log management tool
Vendor onboarding
Vendor management program
Vendor list
Vendor termination
Employee handbook
New employee and contractor agreements
List of terminated employees & contractors
List of active employees & contractors as on date
Existing employee and contractor agreements
Multi-availability zones
Asset register maintaining
Risk and Governance Executive Committee meeting minutes
Risk management program
Information security policies and procedures
Key management services used
Termination checklist
Internal communication for changes in roles
Intellectual property rights

Subprocessors

OpenAI
OpenAIAI & ML Services
Slack
SlackBusiness Apps & Productivity
Outlook
OutlookUnknown Category
AWS
AWSCloud Infrastructure & Platform Services