Skip to main content

Security

1 author40 articles
Where are documents processed by AI?
Which AI models and providers does amaise use?
How is the AI pipeline isolated from the rest of the application?
What happens if the AI service is unavailable?
How is the traceability of AI results ensured?
How are AI hallucinations detected and prevented?
Is there human oversight of AI decisions?
Are customer data used to train AI models?
How does the document processing pipeline work?
How does amaise protect against prompt injection attacks?
What does the CI/CD security pipeline look like?
Can customers conduct their own penetration tests?
How are dependencies checked for vulnerabilities?
How is input validation ensured?
How does amaise protect against the OWASP Top 10?
What does the secure software development process look like?
Which security headers does amaise use?
Which static code analyses are performed?
How is supply chain security ensured?
How are vulnerabilities prioritized and resolved?
How are API keys secured at amaise?
How does amaise protect against brute force attacks?
Can customers connect their own identity providers?
How is employee access managed?
How does machine-to-machine authentication work?
How does multi-factor authentication work in amaise?
What roles and permissions are available in amaise?
Does amaise support Single Sign-On (SSO)?
How are access tokens managed and protected?
How are WebSocket connections secured?
How is compliance continuously monitored?
Can customers audit amaise’s security controls?
What is amaise’s position on the EU AI Act?
How does amaise meet international data protection requirements?
Which industry-specific frameworks does amaise comply with?
What certifications does amaise have?
How often are penetration tests conducted?
How does responsible vulnerability disclosure work?
What does amaise’s SOC 2 report cover?
How does amaise meet data protection requirements (GDPR, nDSG, US)?