SOC 2 Compliance

Many of Threat Stack’s best customers use our intrusion detection platform to help fulfill their SOC 2 compliance needs.

What is SOC 2?

SOC 2 is an auditing procedure that defines criteria for managing customer data based on five Trust Principles. Unlike other compliance standards, SOC 2 reports are unique to each organization. It’s up to the organization to design its own controls to comply.

SOC 2 certification is issued by outside auditors who assess the extent to which a vendor is able to comply with up to five of the principles based on the controls they’ve put in place.

New to SOC 2? Take a look at “9 Common Questions About SOC 2.”

SOC 2 Rulesets

Threat Stack’s out-of-the-box compliance rulesets include a SOC 2 ruleset.

  • File, user, and network activity as well as configuration checks
  • Ensure you’re set up for success for your audits
Each rule is named for the SOC 2 parameter it aligns with, so in the case of an alert you know exactly what resources are at risk.

Compliance Reports

Compliance Reports are emailed to you on a daily basis. Ready to be handed over to an auditor or other external party

  • Provide up-to-date proof that you have measures in place to align with SOC 2
  • Easy to break down and customize for internal or external reporting