
Below are the key security policies and documents that form part of Sophus’s compliance program.
Policies (22)
Acceptable Usage Policy
Defines the appropriate use of Sophus systems, tools, equipment, and data to safeguard critical information.
Got questions?
infosec@sophus.ai
Access Control Policy
Ensures that access to Sophus assets is managed based on business and security requirements.
Got questions?
infosec@sophus.ai
Business Continuity Policy
Provides a framework to maintain operational continuity and facilitate recovery in case of disruptions.
Got questions?
infosec@sophus.ai
Change Management Policy
Establishes guidelines for implementing IT operational changes securely, efficiently, and with minimal risk.
Got questions?
infosec@sophus.ai
Code of Conduct Policy
Defines expected professional conduct to promote a respectful and collaborative workplace.
Got questions?
infosec@sophus.ai
Data Backup and Recovery Policy
Defines the procedures for securely backing up critical data and implementing recovery strategies to ensure data availability and integrity.
Got questions?
infosec@sophus.ai
Data Classification and Retention Policy
Outlines a structured approach for classifying data based on sensitivity and defining retention periods to comply with legal, regulatory, and business requirements.
Got questions?
infosec@sophus.ai
Encryption Policy
Establishes encryption requirements for data at rest and in transit to enhance security and compliance.
Got questions?
infosec@sophus.ai
Incident Management Policy
Defines processes for promptly detecting, reporting, assessing, and resolving security incidents to minimize impact and ensure timely remediation.
Got questions?
infosec@sophus.ai
Information Security Policy
Establishes guidelines for protecting Sophus information assets, ensuring confidentiality, integrity, and availability of data.
Got questions?
infosec@sophus.ai
Media Disposal Policy
Ensures secure disposal of electronic and physical media to prevent unauthorized data exposure and potential breaches.
Got questions?
infosec@sophus.ai
Password Policy
Establishes standards for password creation, management, and protection to enhance security and prevent unauthorized access.
Got questions?
infosec@sophus.ai
Physical Security Policy
Outlines measures to safeguard physical infrastructure, facilities, and workspace security to prevent unauthorized access.
Got questions?
infosec@sophus.ai
Risk Management Policy
Defines a structured approach for identifying, assessing, and managing risks that could impact Sophus business objectives and security posture.
Got questions?
infosec@sophus.ai
Vendor Management Policy
Establishes guidelines for evaluating, onboarding, and managing vendor relationships to ensure data security and compliance with regulatory requirements.
Got questions?
infosec@sophus.ai
Vulnerability and Patch Management Policy
Defines protocols for identifying, assessing, and mitigating security vulnerabilities through a structured patch management process.
Got questions?
infosec@sophus.ai
HR Security Policy
Defines security measures applicable throughout the employment lifecycle, from hiring to termination, to mitigate insider threats and ensure compliance.
Got questions?
infosec@sophus.ai
Data Breach Policy
Specifies protocols for timely identification, containment, reporting, and notification of data breaches to minimize risk and ensure compliance with regulatory requirements.
Got questions?
infosec@sophus.ai
Business Continuity Plan
Establishes procedures for maintaining organizational resilience and ensuring continued operations during prolonged service disruptions.
Got questions?
infosec@sophus.ai
Asset Management Policy
Outlines protocols for classifying, tracking, protecting, and managing Sophus assets throughout their lifecycle to prevent unauthorized access or loss.
Got questions?
infosec@sophus.ai
Compliance Policy
Ensures adherence to statutory, regulatory, and contractual compliance requirements, including security and privacy obligations.
Got questions?
infosec@sophus.ai
Software Development Lifecycle Policy
Defines security requirements and best practices for secure software development, acquisition, and maintenance to integrate security throughout the software lifecycle.
Got questions?
infosec@sophus.ai
Certifications & Reports (4)
ISO 27001 Certificate
ISO 27001 certification issued by an independent third-party auditor to demonstrate compliance with information security best practices.
Got questions?
infosec@sophus.ai
SOC 2 Reports
In Progress
Got questions?
infosec@sophus.ai
Vulnerability Assessment Report
Provides insights into security vulnerabilities identified during periodic assessments and recommended remediation steps.
Got questions?
infosec@sophus.ai
Pentest Report
Documents the findings of penetration testing exercises and recommended mitigation measures.
Got questions?
infosec@sophus.ai
Technical Documentation (2)
Network Diagram
Refer to the attached network architecture document for an overview of network design, security controls, and segmentation.
Got questions?
infosec@sophus.ai
Product Architecture
Documents the high-level system design, data flow, and security measures incorporated into Sophus products to ensure security and compliance.
Got questions?
infosec@sophus.ai
Privacy Policy
Refer to the Privacy Policy available online for details on how Sophus manages and protects user data.

Request a demo