Organization Logo

PT Mayar Kernel Supernova

PT Mayar Kernel Supernova recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.

As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within PT Mayar Kernel Supernova so that our customers can feel confident in choosing us as a trusted provider.

This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.

PT Mayar Kernel Supernova products:

  • Mayar.ID (Checkout and Commerce Platform for Creators and Small Business)
  • MAIA.ID (AI Platform For Team and Community)

Compliances (4)

View details

ISO 27001 v2022

ISO 27001 v2022

Compliant

SOC 2

SOC 2

Compliant

GDPR

GDPR

Compliant

HIPAA

HIPAA

Compliant

Trusted by (6)

Pacmann

Pacmann

Stockwise

Stockwise

Algoritma

Algoritma

Belajarlagi

Belajarlagi

Greenpeace Indonesia

Greenpeace Indonesia

HOPE Indonesia

HOPE Indonesia

Controls

Continuously monitored

Product security (3)

Situational Awareness For Incidents

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security (4)

Identity Validation

Termination of Employment

Testing for Reliability and Integrity

View 1 more control

Network security (2)

Transmission Confidentiality

Anomalous Behavior

App security (2)

Conspicuous Link To Privacy Notice

Secure system modification

Endpoint security (3)

Malicious Code Protection (Anti-Malware)

Endpoint Security Validation

Session Lock

Corporate security (35)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

View 32 more controls

Resources (43)

View details

Communications & Network Security Policy

Communications & Network Security Policy aims to ensure the secure management and control of networks, protecting systems and applications from threats.

Asset Management Procedure

Asset Management Procedure outlines a systematic approach for maintaining, handling, and protecting all information assets in line with internal and external security requirements related to the business

Code of Business Conduct Policy

Code of Business Conduct Policy outlines the expected behavior of all staff members, promoting a respectful and collaborative work environment.

ISMS Information Security Roles & Responsibilities

ISMS Manual

System Description

View 36 more items

View 1 more item