SOC 2 Academy
Logical and Physical Access Controls
Learn about what methods are required to protect your assets against unauthorized access.
System Operations
Learn how to defend against malicious attacks by detecting and responding to system vulnerabilities.
Change Management
Learn about the best practices for authorizing, testing, approving, and implementing changes into your environment.
Risk Mitigation
Learn how risk management is the foundation of the control environment and provides boundaries for your audit.
Internal Control
Learn how to create a control environment that is based on ethics, consistency, and accountability.
Other Criteria
Learn what criteria from the availability, confidentiality, processing integrity, and privacy categories are applicable to your services.
Partner with us
Our information security auditors are ready to assist you with your compliance challenges. Schedule an appointment with our certified specialists to get the conversation started!