SOC 2 Compliance

Many of Threat Stack’s best customers use our intrusion detection platform to help fulfill their SOC 2 compliance needs.

What is SOC 2?

SOC 2 is an auditing procedure that defines criteria for managing customer data based on five Trust Principles. Unlike other compliance standards, SOC 2 reports are unique to each organization. It’s up to the organization to design its own controls to comply.

SOC 2 certification is issued by outside auditors who assess the extent to which a vendor is able to comply with up to five of the principles based on the controls they’ve put in place.

New to SOC 2? Take a look at “9 Common Questions About SOC 2.”

SOC 2 Rulesets

Threat Stack’s out-of-the-box compliance rulesets include a SOC 2 ruleset.

  • File, user, and network activity as well as configuration checks
  • Ensure you’re set up for success for your audits
Each rule is named for the SOC 2 parameter it aligns with, so in the case of an alert you know exactly what resources are at risk.

Compliance Reports

Compliance Reports are emailed to you on a daily basis.

  • Ready to be handed over to an auditor or other external party
  • Provide up-to-date proof that you have measures in place to align with SOC 2
  • Easy to break down and customize for internal or external reporting

Ready to achieve compliance?

Meet with us today.

Threat Stack is here to support you in achieving your goals for achieving compliance and streamlining audits. Schedule time with us today to explore how Threat Stack’s full stack telemetry collection and rule set come ready to help you pass audits like SOC 2, HIPAA, PCI, and more.

Compliance call-to-action