Compliance
SOC 2 Type II
HIPAA
Resources
Controls
Unique production database authentication enforced
Encryption key access restricted
Unique account authentication enforced
Asset disposal procedures utilized
Production inventory maintained
Anti-malware technology utilized
Data encryption utilized
Control self-assessments conducted
Penetration testing performed
Continuity and Disaster Recovery plans established
Continuity and disaster recovery plans tested
Cybersecurity insurance maintained
Data retention procedures established
Customer data deleted upon leaving
Data classification policy established