Founded in 2025

|
|

Controls (43)

Here are the controls implemented at Amanah Agent AI to ensure compliance, as a part of our security program.

Product security (11)

Role Based Access Controls

Audit Logging

Data Security

Integrations

Team Management

JWT Authentication

Multi-Factor Authentication (MFA)

Account Lockout Protection

Device Trust & Fingerprinting

Secure Session Management

Password Security

Data security (11)

Access Monitoring

Backups Enabled

Encryption at Rest

Encryption in Transit

Physical Security

AES-256 Encryption at Rest

TLS 1.3 Encryption in Transit

AWS KMS Key Management

Multi-Version Encryption Keys

Field-Level Encryption

Secure Data Deletion

Network security (7)

Data Loss Prevention

Firewall

IDS/IPS

Spoofing Protection

Rate Limiting

DDoS Protection

Origin Validation (CORS)

App security (4)

Code Analysis

Credential Management

Software Development Life Cycle

Vulnerability & Patch Management

Endpoint security (2)

Threat Detection

Disk Encryption

Corporate security (8)

Incident Response

Employee Training

Internal Assessments

Security Alerts

Audit Logging

Security Event Monitoring

Change Management

Access Control Policy