{"id":3712,"date":"2022-01-06T20:55:33","date_gmt":"2022-01-06T20:55:33","guid":{"rendered":"https:\/\/announcekit.app\/blog\/?p=3712"},"modified":"2022-04-13T09:26:27","modified_gmt":"2022-04-13T09:26:27","slug":"soc-2-compliance-at-announcekit","status":"publish","type":"post","link":"https:\/\/announcekit.app\/blog\/soc-2-compliance-at-announcekit\/","title":{"rendered":"SOC 2 Compliance at AnnounceKit"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">AnnounceKit is now a SOC 2 Type I Compliant.<\/p>\n\n\n\n<p>The first rule of AnnounceKit Club is you do talk about security.<br><br>Security has been of primary importance for AnnounceKit from day one. With our commitment to delivering high standards of security to our customers, we&#8217;ve started a journey several months ago.<br><br>After a hundred requirements, documents, practices, and tasks, we have successfully gone halfway down. We managed to demonstrate our commitment to protecting our customers.<br><br>Today, therefore, we are really proud to announce that we passed SOC 2 audit and are now officially <a href=\"https:\/\/changelog.announcekit.app\/soc-2-compliance-at-announcekit-1aiun6\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type I Compliant<\/a>!<br><br>Passing the audit means we operate our services pursuant to the SOC 2 standard, and serve in accordance with the principles of security, availability, processing integrity, and confidentiality. <br><br>This is not the end, we still have halfway ahead. Now it&#8217;s time to complete the SOC 2 Type 2 audit, which will ensure that we are sustainable with our security standards and data protection.<br><br>Before all that, you might be wondering about the details of SOC 2, trust service principles, and our journey. Then, let me invite you to accompany us!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is SOC 2?<\/strong><\/h2>\n\n\n\n<p>First things first, let&#8217;s start with the definition. <br><br><strong>SOC 2 (System and Organization Controls)<\/strong> is a compliance standard for service organizations, developed by the <strong>American Institute of CPAs (AICPA)<\/strong>, which attests that the related organization is designed and operated securely pursuant to Trust Service Principles and <meta charset=\"utf-8\">AICPA standards.<br><br><meta charset=\"utf-8\">SOC 2 reports are issued for the organizations that offer software services to other organizations. These reports provide assurance to the users that this organization delivers<meta charset=\"utf-8\"> the highest standards of security.<br><br>Many people still think SOC 2 report is a certification. However, it is not just like that. A SOC 2 is an attestation report that is issued to show whether or not the AICPA agrees with the organization&#8217;s assertion of privacy and security of their service. So, it is an attestation rather than a certification.<br><br>According to the AICPA\u00a0auditing standards, there are two levels of SOC reporting, Type I and Type II.\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Type I<\/strong> describes the system of the organization and whether the system is secure and designed pursuant to the trust service principles of SOC 2.<br><\/li><li>Type II\u00a0describes if the system specified in Type I is maintained efficiently and securely over a period of 9 to 12 months.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Trust Service Principles<\/strong><\/h2>\n\n\n\n<p>SOC 2 consists of 5 principles and includes a number of criteria related to them. These five principles were formed according to the AICPA Trust Services Principles and Criteria.<meta charset=\"utf-8\"><\/p>\n\n\n\n<p><strong>Availability<\/strong> means that the system is available for <meta charset=\"utf-8\">operational activities, the user can have access to the system, and understand what they are getting by using your service, whether it meets their objectives. This principle is regulated by performance monitoring, disaster recovery, and incident handling.<\/p>\n\n\n\n<p><strong>Security<\/strong> refers to considering both front and back-end controls to protect customer data. An organization needs effective policies and procedures to protect itself in case of a security breach resulting in unauthorized access to data. Firewalls, <meta charset=\"utf-8\">Intrusion Detection, and Multi-factor Authentication can be used for that purpose.<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><meta charset=\"utf-8\"><strong>Confidentiality<\/strong> means that the service must be protected with Encryption, Access Controls, and Firewalls to prevent unauthorized access.<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><strong>Processing<\/strong> <meta charset=\"utf-8\"><strong>Integrity<\/strong> refers to that the system processing should be valid, accurate, timely, complete, and authorized to meet organizational objectives. Quality assurance and process monitoring can be important to fulfill these objectives.<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><strong>Privacy<\/strong> means that user data must be gathered, used, and disclosed in a trustworthy manner. The <meta charset=\"utf-8\">operating procedures of a company must be consistent with the data privacy policy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why is SOC 2 Compliance Important?<\/strong><\/h2>\n\n\n\n<p>The new technology world requires data security more than ever. Companies need to be sure if their data will be protected effectively prior to deciding to buy a software service. <br><br>Having SOC 2 reports, in that sense, <strong>provides a competitive advantage<\/strong>, as people want to work with services that have invulnerable information security standards.<br><br>It also provides improved <strong>information security practices and guidelines<\/strong> in case of cyber attacks and breaches, which makes you maintain your operational activities in a secure way.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Completing Our SOC Journey<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/announcekit.app\/blog\/wp-content\/uploads\/2022\/01\/soc-badges-1024x536.png\" alt=\"soc 2 compliance\" class=\"wp-image-3778\" width=\"570\" height=\"299\" srcset=\"https:\/\/announcekit.app\/blog\/wp-content\/uploads\/2022\/01\/soc-badges-1024x536.png 1024w, https:\/\/announcekit.app\/blog\/wp-content\/uploads\/2022\/01\/soc-badges-300x157.png 300w, https:\/\/announcekit.app\/blog\/wp-content\/uploads\/2022\/01\/soc-badges-768x402.png 768w, https:\/\/announcekit.app\/blog\/wp-content\/uploads\/2022\/01\/soc-badges.png 1200w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\" \/><\/figure><\/div>\n\n\n\n<p>It has been worth every moment of our hard work to demonstrate our commitment to delivering high standards of security to our customers. <br><br>Badges? Yes, proud to have but they are only a showcase. Our commitment comes from the \u2764\ufe0f<br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first rule of AnnounceKit Club is you do talk about security. Therefore, we are really proud to announce that we passed SOC 2 audit!<\/p>\n","protected":false},"author":4,"featured_media":3786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/posts\/3712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/comments?post=3712"}],"version-history":[{"count":30,"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/posts\/3712\/revisions"}],"predecessor-version":[{"id":3888,"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/posts\/3712\/revisions\/3888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/media\/3786"}],"wp:attachment":[{"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/media?parent=3712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/categories?post=3712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/announcekit.app\/blog\/wp-json\/wp\/v2\/tags?post=3712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}