What is SOC 2?
SOC 2 (Service Organization Control 2) is a compliance framework developed by the American Institute of CPAs (AICPA). It evaluates how organizations manage customer data based on five Trust Services Criteria:- Security: Protection against unauthorized access
- Availability: System accessibility as agreed
- Processing Integrity: Accurate and authorized processing
- Confidentiality: Protection of confidential information
- Privacy: Personal information handling
Our Certification Program
SOC 2 Type II (In Progress)
- Scope: Security, Availability, Confidentiality
- Auditor: Independent third-party firm
- Expected completion: Early 2026
- Coverage: Entire Adapt platform
Trust Services Criteria
Security
Controls we’re implementing:| Control Area | Implementation |
|---|---|
| Access control | Role-based permissions, MFA |
| Network security | Firewalls, VPC isolation, DDoS protection |
| Encryption | TLS 1.3 in transit, AES-256 at rest |
| Monitoring | Continuous logging and alerting |
| Incident response | Documented procedures and team |
Availability
How we ensure uptime:- Infrastructure: Multi-zone deployment on Google Cloud
- Redundancy: No single points of failure
- Monitoring: 24/7 system monitoring
- Disaster recovery: Documented and tested DR plan
Confidentiality
How we protect your data:- Encryption: All data encrypted at rest and in transit
- Access control: Least privilege access principles
- Data isolation: Complete separation between organizations
- Retention: Clear data retention and deletion policies
- Third parties: Vendor security assessments
Continuous Compliance
We’re building a compliance program that includes:Ongoing Activities
- Continuous monitoring: Automated security controls
- Regular testing: Penetration tests, vulnerability scans
- Employee training: Security awareness program
- Policy reviews: Regular policy updates
- Vendor management: Third-party risk assessments
Security Questionnaires
We can help with your vendor security assessments:- CAIQ: Cloud Security Alliance questionnaire
- SIG: Standardized Information Gathering
- Custom: Your organization’s security questionnaire
Questions?
For compliance-related questions:- Email: security@adapt.com
- Enterprise: Contact your account manager