Security
Last modified: 9/12/2024
At Isabl Inc., the security of your data is our top priority. We are committed to implementing the highest standards of information security, ensuring the confidentiality, integrity, and availability of your data. To formalize this commitment, we are currently in the readiness stage for SOC 2 Type II compliance.
What is SOC 2?
SOC 2 (System and Organization Controls 2) is an auditing procedure that ensures service providers securely manage data to protect the privacy and interests of their clients. It covers five key trust service criteria:
- Security: The system is protected against unauthorized access.
- Availability: The system is operational and accessible as per agreed-upon commitments.
- Processing Integrity: Processing is accurate, complete, and timely.
- Confidentiality: Data classified as confidential is protected.
- Privacy: Personal data is handled with the appropriate care and protection.
SOC 2 Readiness at Isabl Inc.
At Isabl Inc., we are actively working towards achieving SOC 2 Type II compliance. This involves a thorough review and enhancement of our internal security policies and practices to ensure they align with the SOC 2 framework. We are partnering with experts to evaluate our controls, strengthen our security posture, and prepare for the third-party audit that will officially certify our compliance.
Our Security Framework
Data Encryption
We currently use industry-standard encryption (AES-256) to protect data at rest and in transit. This ensures that your data remains secure within our systems and across all communications.
Access Control
Our access control policies follow the principle of least privilege. We are implementing multi-factor authentication (MFA) and will continuously monitor and audit access to sensitive systems.
Continuous Monitoring and Incident Response
Isabl Inc. is putting systems in place to monitor for security threats 24/7. We are developing a real-time alerting system and incident response processes to quickly detect and address any potential vulnerabilities.
Secure Development Lifecycle (SDL)
Security is embedded at every step of our product development process. As part of our SOC 2 readiness, we are enhancing our secure coding practices and regularly conducting vulnerability assessments.
Vendor Management
As we move toward SOC 2 compliance, we are auditing our third-party vendors to ensure they meet the highest standards of security. We will continue to ensure that all vendors follow strict data protection measures, aligning with SOC 2 guidelines.
Ongoing Commitment to Security
Our readiness process is a reflection of our ongoing commitment to safeguarding your data. Achieving SOC 2 compliance is a key milestone in our journey to maintain the trust of our partners and clients. Throughout this process, we will continue to refine our controls, conduct regular audits, and keep you informed about our progress.
If you have any questions or would like more information about our SOC 2 readiness efforts, please contact us at security@isabl.io