Sedai's security architecture provides application & data security protections to meet your privacy & compliance needs
We’re committed to maintaining best practices for ensuring security, availability, and confidentiality.
As part of this effort, Sedai annually completes an independent audit for our SOC 2 Type II report, which verifies our consistent application of the Trust Services Principles and Criteria over time. By periodically holding ourselves accountable to a third party, we hope to provide transparency to our customers and support our ongoing efforts to provide a secure and reliable environment for customer data.
For AWS resources, Sedai programmatically connects to your cloud resources via Identity and Access Management (IAM) authentication. IAM provides granular control of your cloud environments so that you can specify user permissions to access certain resources (learn more here). For Kubernetes, Sedai recommends using a Smart Agent within your cluster which allows Sedai's core components to securely communicate instruction sets to your cluster, while also allows you to seamlessly connect your resources to Sedai (learn more here).
We regularly undergo penetration testing by an independent security firm as part of our SOC 2 process and can furnish findings to customers as required.
Our security architecture has options specifically designed for customers dealing with sensitive data like PHI. We can sign a Business Associate Agreement (BAA) with customers who have compliance requirements under HIPAA/HITECH.
We will gladly explore custom DPAs with our customers when required.
Get a copy of Sedai's Security Architecture to learn more about what makes Sedai a safe & secure technology to run in production with privacy and compliance sensitive workloads