Compliance
can be a hassle
but it shouldn’t be
Aikido helps you by automating code and cloud security controls for ISO 27001, SOC 2 Type 2, PCI, DORA, NIS2, HIPAA & more.
These cloud-native companies sleep better at night
Compliance
Get Your Compliance In Check
Aikido performs checks and generates evidence for technical controls for ISO 27001:2022, SOC 2 Type 2, PCI, HIPAA, and for DORA. Automating technical controls is a big step-up towards achieving compliance.
ISO 27001:2022
ISO 27001 is particularly relevant for FinTech companies. This globally recognized standard ensures that you have a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability. Aikido automates a variety of ISO 27001:2022 technical controls.
DORA
The Digital Operational Resilience Act (DORA) is an EU regulation that requires financial institutions to strengthen their defenses against IT-related risks. Aikido helps with DORA compliance by automating the detection, and remediation of security vulnerabilities, enabling continuous monitoring, incident reporting, and management of 3d-party risks as required by the DORA regulation.
PCI
The Payment Card Industry Data Security Standard (PCI DSS) require a set of security standards designed to protect cardholder data during and after financial transactions. Any organization that handles credit card information must comply with these standards to ensure the secure processing, storage, and transmission of cardholder data. Aikido automates many technical controls.
OWASP Top 10
OWASP Top 10 aligns web application security practices with the most critical security risks identified by the Open Web Application Security Project (OWASP). The OWASP Top 10 is a widely recognized list of common vulnerabilities like injection flaws, broken authentication, and cross-site scripting (XSS), and achieving compliance involves addressing these vulnerabilities to secure web applications from common threats.
SOC 2 Type 2
SOC 2 is a procedure that ensures your service providers securely manage your data to protect the interests of your organization and the privacy of its clients. Show your commitment to safeguarding data by complying with SOC2. Aikido automates all technical controls, making the compliance process much easier.
HIPAA
The Health Insurance Portability and Accountability Act sets national standards for protecting sensitive patient information in the healthcare industry. It mandates safeguards for the privacy and security of health data, ensuring that healthcare providers, insurers, and their business associates implement measures to protect patient information from unauthorized access and breaches.
NIS2
The Network and Information Security Directive (NIS2) is a European Union regulation aimed at improving the cybersecurity of critical infrastructure sectors. A wider range of industries must follow cybersecurity rules and it improves teamwork between EU countries to protect against cyber threats. Organizations in sectors like healthcare, energy, and transportation must meet these standards.
CIS
The Center for Internet Security (CIS) sets best practices and security benchmarks to help organizations improve their cybersecurity defenses by offering specific guidelines for securing systems, networks, and applications. Achieving CIS compliance helps reduce security risks and ensures a standardized level of protection against cyber threats. Aikido reports on CIS Controls v8 compliance progress, based on your connected clouds and code repositories.
Why Aikido?
Aikido performs checks and generates evidence for technical controls for ISO 27001:2022 & SOC 2 Type 2. Automating technical controls is a big step-up towards achieving ISO & SOC 2 compliance.
Generate evidence for technical controls
Option 1
Struggle through a patchwork of free tools
To comply with technical vulnerability management controls, you can set up a combination of free open source tools to scan for OS vulnerabilities, secrets, containers, etc... Each tool will require setup and maintenance.
Option 2
Buy expensive software packages
To comply with technical vulnerability management controls, there are many dedicated scanning platforms that work well in one area, but you'll end up with a sum of expensive licenses adding up to massive bills.
Option 3
Get Aikido
Get all-round security coverage, everything you need to check the boxes for technical vulnerability controls, at an affordable price. These checks are a great accelerator for evidence collection for SOC2 & ISO 27001.
Aikido covers all technical code and cloud security requirements for SOC2 Type 2, ISO 27001:2022, and more
SOC 2 Controls
CC3.3: Consider the potential for fraud
CC3.2: Estimate Significance of Risks Identified
CC5.2: The entity selects and develops general control activities over technology to support the achievement of objectives
CC6.1 • CC6.6 • CC6.7 • CC6.8
CC7.1: Monitor infrastructure and software
CC7.1: Implement change detection mechanism
CC7.1: Detect unknown or unauthorized components
CC7.1: Conduct vulnerability scans
CC7.1: Implement filters to analyze anomalies
CC7.1: Restores the affected environments
CC10.3: Tests integrity and completeness of backup data
CC8.1: Protect confidential information
CC8.1: Track system changes
ISO 27001 Controls
A.8.2 Privileged access rights • A.8.3 Information access restriction • A.8.5 Secure authentication • A.8.6 Capacity management • A.8.7 Protection against malware • A.8.8 Management of technical vulnerabilities • A.8.9 Configuration management • A.8.12 Data leakage prevention • A.8.13 Backups • A.8.15 Logging • A.8.16 Monitoring activities • A.8.18 Use of privileged utility programs • A.8.20 Network security • A.8.24 Use of cryptography • A.8.25 Secure development lifecycle • A.8.28 Secure coding • A.8.31 Separation of development, test and production environments • A.8.32 Change management
A.5.15: Access control
A.5.16: Identity management
A.5.28: Collection of evidence
A.5.33: Protection of records
Integrations
Integrate with your compliance suite
Are you using a compliance suite? Aikido integrates with the suite of your choice.
See our integrations
Vanta
The fastest path to compliance. It collects 90% of the evidence needed for your certification.
Drata
Automates your compliance journey from start to audit-ready and beyond.
Sprinto
Sprinto is a one-stop platform for all security compliances and certification audits.
Thoropass
Thoropass is an end-to-end compliance solution offering a seamless security audit experience.
Secureframe
Leading security compliance automation platform that makes getting any compliance fast & easy.
Aikido does much more to keep your software secure
Technical vulnerability management is just for starters.Aikido combines SCA, SAST, IaC, surface monitoring, container scanning and more - all in one platform.
See our features
Leverages open source scanners
Built on reliable open source security scanners, all combined in one platform. Enhanced with our own code to cover any scanning gaps.
Cloud
Detects cloud infrastructure risks across major cloud providers.
Code
Continuously monitors your code for known vulnerabilities, CVEs and other risks.
Code
Checks your code for leaked and exposed API keys, passwords, certificates, encryption keys, etc...
Code
Scans your source code for security risks before an issue can be merged.
Code
Scans Terraform, CloudFormation & Kubernetes infrastructure-as-code for misconfigurations.
Containers
Scans your container OS for packages with security issues
Domain
Dynamically tests your web app’s front-end to find vulnerabilities through simulated attacks. Built on ZAP.
Code
Monitors your licenses for risks such as dual licensing, restrictive terms, bad reputation, etc..
Code
Prevents malicious packages from infiltrating your software supply chain. Powered by Phylum.
Code
Checks if any frameworks & runtimes you are using are no longer maintained.
Custom
Imports and auto-triages findings from your current scanner stack.
SonarQube
Trusted by thousands of developers at world’s leading organizations
FAQ
Does Aikido require agents?
No! Unlike others, we're fully API based, no agents are needed to deploy Aikido! This way you're up & running in mere minutes & we're way less intrusive!
I don’t want to connect my repository. Can I try it with a test account?
Of course! When you sign up with your git, don’t give access to any repo & select the demo repo instead!
What happens to my data?
We clone the repositories inside of temporary environments (such as docker containers unique to you). Those containers are disposed of, after analysis. The duration of the test and scans themselves take about 1-5 mins. All the clones and containers are then auto-removed after that, always, every time, for every customer.