Data security
AiDash encrypts data at rest and in transit for all our customers. We use tools such as Amazon Web Services’s Key Management Service (KMS) to manage encryption keys using hardware security modules for maximum security according to industry best practices. AiDash has successfully completed a SOC 2 Type II Service Organization Control (SOC 2) audit for our system and services, demonstrating the effectiveness of controls involving operations and compliance.


Application Security
AiDash regularly engages some of the industry’s best application security experts for 3rd-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment. AiDash also uses high-quality static analysis tooling such as CodeQL, TruffleHog, and SonarQube to secure our product at every step of the development process.
Infrastructure security
AiDash uses Amazon Web Services (AWS) to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector. In addition, we deploy our application using containers run on AWS managed services, which means we typically do not manage servers or EC2 instances in production.
