メインコンテンツまでスキップ

Security Measures

At Anakin AI, security is our top priority. We understand the critical importance of protecting our users’ data and ensuring the confidentiality, integrity, and availability of our platform. Through robust encryption, strict access controls, regular security audits, and a dedicated security team, we are committed to maintaining the highest standards of security to safeguard our users’ information.

Infrastructure Security

At Anakin AI, we fully leverage Amazon Web Services (AWS) cloud infrastructure to host our platform in the United States. By building entirely on AWS instead of maintaining our own data centers, we can rely on their industry-leading physical and network security controls. Our defense-in-depth approach on top of AWS infrastructure includes multi-factor authentication, encryption, access controls, vulnerability management, and other security best practices. We use a multi-layered approach to protect our infrastructure, including:

Web Application Firewall

We use the AWS Network Firewall to protect our infrastructure from common web exploits. Our WAF is configured to block malicious traffic, including SQL injection and cross-site scripting (XSS) attacks.

DDoS Protection

Anakin AI utilizes load balancing and other solutions to mitigate potential DDoS attacks. By distributing traffic across multiple servers, our systems are resilient against surges in requests or malicious efforts to overwhelm our infrastructure. We employ intelligent monitoring that tracks traffic patterns and automatically alerts our response team about anomalies. Our on-call engineers can rapidly analyze threats and take appropriate actions, such as filtering specific IP addresses. Our multilayered defenses and vigilant monitoring ensure our systems stay online and accessible to legitimate users.

IP Whitelisting

At Anakin AI, we implement strict IP whitelisting with WAF to restrict infrastructure access to authorized developers only. Regular auditing and reviews of our allow lists ensure they remain up-to-date to block unauthorized access attempts. Our systems also automatically flag anomalous activity from unknown IPs for investigation. By limiting exposure to trusted IPs, we harden our environment against intrusion threats and malicious requests. Our layered defenses and proactive monitoring enable a quick response to potential attacks targeting our infrastructure.

Data Security

At Anakin, end-to-end data security is our top priority. We take a multi-layered defense approach, securing data through encryption, stringent application security controls, and strict organizational policies. Our databases are hosted in AWS data centers in the US East region to enable secure and sovereign storage. Our commitment to security and compliance spans our product development lifecycle and corporate culture.

Data Isolation

At Anakin AI, we leverage logical isolation and strict access controls to separate production data from development environments. Access is restricted via AWS Identity and Access Management (IAM) to prevent unauthorized access. Our defense-in-depth approach also relies on comprehensive CloudTrail logging to capture all API activity, while our security team regularly reviews logs to rapidly detect and respond to anomalies.

Data Encryption

At Anakin AI, we use a layered data encryption strategy relying on hash functions with salt to irreversibly scramble sensitive data at rest. For data in transit, TLS 1.2 encryption with perfect forward secrecy ensures secure transmission over the public internet. We store hashed password credentials to prevent decryption. Hashed one-way encryption protects sensitive information like passwords. Stringent key management and access control policies prevent unauthorized decryption.

Data Protection Regulations

At Anakin AI, we have implemented mechanisms to support customers in meeting their data protection compliance obligations. Our data processing agreements are committed to upholding rigorous standards for security, privacy, and ethical data usage.

Data Transmission Security

At Anakin AI, all data transmission is protected by SSL/TLS encryption protocols, including TLS 1.2 to prevent the interception of customer data. We utilize optimal cipher suites, ephemeral keys, and other modern security parameters to ensure robust encryption. Network security mechanisms like firewalls provide additional layers of defense.

Data Response Strategies

Data Backup

Anakin AI implements robust backup policies to protect against data loss. Customer data is backed up daily to multiple geographically dispersed AWS regions for resilience. Backup integrity is verified via checksums and test restores. Long-term retention policies preserve prior versions. Anakin AI implements regular backups stored securely in AWS S3 for disaster recovery. We recommend customers periodically test failover to backups. Anakin AI's resilient infrastructure minimizes downtime and data loss.

Data Recovery

Rapid data recovery capabilities minimize disruption. Automated failover restores primary databases from recent backups in minutes. Asynchronous replication to hot standby instances also enables fast RPOs. Selective restoration accommodates granular recovery needs. Detailed logs aid in forensic investigation and root cause analysis.

Data Deletion

For requested data deletion, Anakin AI can purge records across primary databases, caches, and backups in a timely manner. Cryptographic erasure techniques fully erase data from block storage. Deleted data is retained for 15 days before being permanently purged from all systems and becoming unrecoverable.

Threat Protection and Response

At Anakin AI, comprehensive monitoring allows rapid threat detection across our infrastructure and services. Load testing minimizes performance impacts from surges. Regular threat simulation testing and updates based on the latest intelligence improve our protections. Multi-layered defenses supported by vigilant monitoring and response enable Anakin AI to withstand and recover from attacks.

Service Monitoring

Anakin AI implements continuous automated monitoring across infrastructure and applications to maintain vigilance. Sensors throughout our environment track metrics and activity patterns. When potential threats are surfaced, alerts are pushed to our trained security and reliability engineering teams for rapid investigation and response.

System Performance

Anakin AI leverages auto-scaling cloud infrastructure to rapidly provision additional resources in response to surges in customer demand. Load balancing evenly distributes the increased traffic to ensure consistent performance and availability for existing users. Proactive load testing allows us to identify and resolve bottlenecks before they impact customers. Cloud elasticity enables Anakin AI to smoothly absorb large spikes in usage without degradation of the user experience.

Rigorous Pre-deployment Verification

Anakin AI subjects all platform updates to extensive validation of stability and security prior to release. Load testing under simulated production conditions identifies performance bottlenecks. A/B testing compares new versions to baseline builds. Automated and manual penetration exercises uncover potential vulnerabilities. Test automation allows accelerated regression testing across the entire platform. This rigorous verification process for each release ensures that newly deployed capabilities are thoroughly hardened for the live environment.

Payment Information Security

In order to ensure the security of payment information, Anakin AI has chosen Stripe as the sole method of payment. As a globally recognized secure payment platform, Stripe is trusted by major corporations and customers across the world.

The effectiveness and reliability of Stripe can be mainly attributed to its full compliance with the Payment Card Industry Data Security Standard (PCI DSS), This is an established global security standard that guarantees the secure handling of cardholder information at every step of the payment process. Compliance with this standard signifies that Anakin AI is committed to the protection of your payment information against unauthorized access, ensuring absolute security and peace of mind when transacting.

Shared Security Responsibilities

Security is a shared responsibility between Anakin AI and its users. While Anakin AI ensures the stability and safety of its platform, users also play a crucial role in safeguarding their data. In order to maintain high data security standards, it is advised not to store any sensitive information outside the Anakin AI environment. An effective and practical method to protect sensitive data, such as API keys and access tokens, is to utilize encrypted environmental variables.

Social Engineering Security Policies

Anakin AI administers multi-leveled physical and personnel security measures to protect our business premises and infrastructure.

Multi-Level Security Measures

Rigid access control policies, enforced by security mechanisms such as badge access systems, guarantee that only authorized personnel have access to our facilities. Clean desk policies, secured workstations, and shielded device storage help maintain information security after working hours.

Comprehensive Security Policies for Employees

Anakin AI implements rigorous security protocols to protect sensitive information and intellectual property. Access to work areas is restricted through the use of electronic keycards, ensuring that only authorized personnel can enter.

Employees are required to lock their computers when leaving their workstations, adding a layer of protection against unauthorized access. External visitors must be escorted at all times, and their access is limited to designated meeting rooms and lobbies.

At the end of each day, employees dutifully shut down their systems and secure any physical documents before leaving the premises. Through these and other precautionary policies, Anakin AI strives to safeguard its data, systems, and facilities against potential security threats. The company recognizes that vigilance and proactive measures are essential to maintaining the integrity and confidentiality of its operations.

Compliance

Anakin AI maintains a comprehensive security and privacy program to provide advanced security feature that are designed to protect your data in accordance with various regulatory and industry standards. Anakin AI is in the process of undergoing SOC 2 certification review. Please note that the certification is currently pending. If the certification is successfully obtained, we will promptly update our users. Thank you for your patience and stay tuned for further updates.

SOC 2 Type 2

The SOC 2 Type 2 is an audit report performed by an independent third-party certified by the American Institute of Certified Public Accountants (AICPA) to evaluate a service organization's controls related to the Trust Services Criteria (TSC). The SOC 2 Type 2 report assesses the effectiveness of these controls over a period of time and is intended to provide assurance to customers and stakeholders that the organization has implemented adequate controls to protect their data.

Artificial Intelligence (AI) Governance

Safe & Secure

Anakin AI takes a safety-first approach to artificial intelligence. Our AI features and partners undergo security and legal reviews prior to Anakin AI utilizing their services. These security practices apply to our AI features and AI development process.

Additional information can be found in the knowledge base linked here:

Transparency

At Anakin AI, we want to be transparent with our customers about our AI products. In order to achieve this Anakin AI maintains a Help Center and Terms and Privacy page to outline how our AI products’ functionality and privacy practices.

Additional information can be found in the knowledge base linked here:

Empowering

We aim to create an One-Stop AI App Platform that aren’t just interesting — but rather, genuinely useful in your day-to-day work. To achieve this, the development of our AI-powered features is grounded in extensive research to understand the needs of our users.

Data Governance

Your data is yours. Our AI Subprocessors are prohibited from using Customer Data to train models. The controls and permissions with respect to access and use of customer data will be respected.

We Don't Train on Your Data

Your prompts and ideas fuel your success, not our AI models. We value your trust, ensuring our models are trained without utilizing your individual data.

We Don't Share Your Prompts

Your team's creativity is unique. We respect this individuality, and ensure that your prompts, and creative inputs are never shared with other customers.

We Don't Sell Your Data

Anakin AI is a subscription-based service; we don't trade in your data. We do not have, nor will we ever have, a revenue model that exploits user data.