|Trust Center

Modelbit

Modelbit is a modern MLOps platform that helps team quickly deploy ML models to production environments behind REST APIs for experimentation and easy integration into products.

fa-envelope alpaca-fa-regular
security@modelbit.com
fa-link alpaca-fa-regular
Privacy Policy

Controls

fa-magnifying-glass alpaca-fa-regular
Infrastructure security
ControlStatus
Unique production database authentication enforced

The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.

fa-circle-check alpaca-fa-solid
Unique account authentication enforced

The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.

fa-circle-check alpaca-fa-solid
Production application access restricted

System access restricted to authorized access only

fa-circle-check alpaca-fa-solid
Production database access restricted

The company restricts privileged access to databases to authorized users with a business need.

fa-circle-check alpaca-fa-solid
Production network access restricted

The company restricts privileged access to the production network to authorized users with a business need.

fa-circle-check alpaca-fa-solid
Unique network system authentication enforced

The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.

fa-circle-check alpaca-fa-solid
Remote access MFA enforced

The company's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.

fa-circle-check alpaca-fa-solid
Remote access encrypted enforced

The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.

fa-circle-check alpaca-fa-solid
Network firewalls utilized

The company uses firewalls and configures them to prevent unauthorized access.

fa-circle-check alpaca-fa-solid
Organizational security
ControlStatus
Password policy enforced

The company requires passwords for in-scope system components to be configured according to the company's policy.

fa-circle-check alpaca-fa-solid
MDM system utilized

The company has a mobile device management (MDM) system in place to centrally manage mobile devices supporting the service.

fa-circle-check alpaca-fa-solid
Visitor procedures enforced

The company requires visitors to sign-in, wear a visitor badge, and be escorted by an authorized employee when accessing the data center or secure areas.

fa-circle-check alpaca-fa-solid
Product security
ControlStatus
Data encryption utilized

The company's datastores housing sensitive customer data are encrypted at rest.

fa-circle-check alpaca-fa-solid
Control self-assessments conducted

The company performs control self-assessments at least annually to gain assurance that controls are in place and operating effectively. Corrective actions are taken based on relevant findings. If the company has committed to an SLA for a finding, the corrective action is completed within that SLA.

fa-circle-check alpaca-fa-solid
Internal security procedures
ControlStatus
Board charter documented

The company's board of directors has a documented charter that outlines its oversight responsibilities for internal control.

fa-circle-check alpaca-fa-solid
Physical access processes established

The company has processes in place for granting, changing, and terminating physical access to company data centers based on an authorization from control owners.

fa-circle-check alpaca-fa-solid
Data center access reviewed

The company reviews access to the data centers at least annually.

fa-circle-check alpaca-fa-solid

Top