Aiden is designed to accommodate the most security-focused infrastructures.
Here are some of the ways Aiden protects your content delivery supply chain.
SOC 2 Type 2 Examination
Aiden has been independently audited against SOC 2 Security, Availability, and Confidentiality Trust Services Criteria (TSC) by Schneider Downs. This examination affirms Aiden’s commitment to maintaining the highest levels of information security, availability, and confidentiality of our internal infrastructure, controls, and care for customer data.
SOC 2 is an industry-standard examination developed and maintained by the American Institute of Certified Public Accountants (AICPA).
Aiden’s customers can submit a request for SOC 2 report through our support or your assigned technical account manager.
Aiden enforces mandatory source code peer reviews internally and third-party code scanning to protect our software integrity and packaging repository.
Monitoring & Testing
Our systems all go through periodic third-party penetration tests & are under continuous monitoring.
Industry Best Practices
Aiden follows industry best practices, including least privileged access, MFA/2FA, data encryption, multi-layered backups, and DLP monitoring and alerts.
Our Tech Stack
All tools in our tech stack utilize enterprise-grade security and are highly vetted and respected for their security controls.
Not An Agent
Aiden is not an agent and is not creating a persistent connection
to our clients’ endpoints. Our service and software are designed to ensure our clients are the only ones who can schedule and execute Aiden to run.
Industry Best Practices
We perform installations with the original, unmodified, digitally signed installation files from the software developer. Aiden installation files and software packages are always visible for inspection by our
clients’ engineers and security tools for all versions of Windows OS, drivers, firmware, and third-party applications we deploy.
Encryption & Package Repository Syncing
Aiden’s content is encrypted using TLS and is transferred directly from our cloud repository to the customer, without opportunity for any intermediary involvement. Every file in each client’s software and package repository is continuously monitored for unauthorized changes. Each software and package repository requires a one-time sync authentication approval via encrypted key, authorized by a human on each end, and neither the client nor Aiden hold the key once created.
Aiden’s solution does not require any direct access to our clients’ networks. No VPN or other type of network access is required to use Aiden to deploy or update software.