SOC 2

SOC 2 Academy

Logical and Physical Access Controls

Learn about what methods are required to protect your assets against unauthorized access.

System Operations

Learn how to defend against malicious attacks by detecting and responding to system vulnerabilities.

Change Management

Learn about the best practices for authorizing, testing, approving, and implementing changes into your environment.

Risk Mitigation

Learn how risk management is the foundation of the control environment and provides boundaries for your audit.

Internal Control

Learn how to create a control environment that is based on ethics, consistency, and accountability.

Other Criteria

Learn what criteria from the availability, confidentiality, processing integrity, and privacy categories are applicable to your services.

Partner with us

Our information security auditors are ready to assist you with your compliance challenges. Schedule an appointment with our certified specialists to get the conversation started!