SOC 2 Compliance

Many of Threat Stack’s best customers use our intrusion detection platform to help fulfill their SOC 2 compliance needs.

Book Your Demo

What is SOC 2?

SOC 2 is an auditing procedure that defines criteria for managing customer data based on five Trust Principles. Unlike other compliance standards, SOC 2 reports are unique to each organization. It’s up to the organization to design its own controls to comply.

SOC 2 certification is issued by outside auditors, who assess the extent to which a vendor is able to comply with up to five of the principles based on the controls they’ve put in place.

New to SOC 2? 9 Common Questions About SOC 2   

The most compelling piece about Threat Stack is we were able to greatly simplify the SOC 2 Type 1 certification process by providing Threat Stack as evidence of our security policies in practice.

– Jameel Al-Aziz, 6Sense

SOC 2 Rulesets

Threat Stack’s out-of-the-box compliance rulesets include a SOC 2 ruleset.
  • File, user, and network activity as well as configuration checks
  • Ensure you’re set up for success for your audits
Each rule is named for the SOC 2 parameter it aligns with, so in the case of an alert you know exactly what resources are at risk.

Compliance Reports

Compliance Reports are emailed to you on a daily basis.
  • Ready to be handed over to an auditor or other external party
  • Provide up-to-date proof that you have measures in place to align with SOC 2
  • Easy to break down and customize for internal or external reporting