Aimable Trust Center

At Aimable, security isn't just a feature — it's foundational to everything we build. Our security-first mindset drives our development processes, infrastructure decisions, and organisational policies. We treat the data entrusted to us with the utmost care and responsibility.

ciso@aimable.ai

Compliance

Compliant

GDPR

Ready

EU AI Act

In Progress

SOC 2 Type II

In Progress

ISO 27001

Resources

Records of Processing Activities (ROPA) PolicyRequest
Change Management PolicyRequest
Personnel Security PolicyRequest
Information Security Management System Communication Plan PolicyRequest
Automated individual decision-making, including profilingRequest

81 security controls across 22 categories

Our security programme covers 81 controls across 22 categories, independently verified and continuously monitored.

01

Asset management

2 controls

02

Business continuity and disaster recovery

2 controls

03

Compliance

1 control

04

Configuration management

1 control

05

Continuous monitoring

1 control

06

Cryptographic protections

3 controls

07

Cybersecurity and data privacy governance

4 controls

08

Data classification and handling

2 controls

09

Data privacy

30 controls

10

Endpoint security

2 controls

11

Human resources security

5 controls

12

Identification and authentication

6 controls

13

Incident response

3 controls

14

Mobile device management

1 control

15

Network security

2 controls

16

Risk management

2 controls

17

Secure engineering and architecture

5 controls

18

Security awareness and training

1 control

19

Security operations

1 control

20

Third-party management

4 controls

21

Vulnerability and patch management

2 controls

22

Web security

1 control

Subprocessors

Third-party services that process data on our behalf.

DigitalOceanCloud Infrastructure & Platform Services
Google WorkspaceBusiness Apps & Productivity
SlackBusiness Apps & Productivity
AttioCRM
LinearBusiness Apps & Productivity

Questions about security?

Our team can walk you through our security practices, compliance certifications, and deployment options.