Tuesday, October 15, 2024
HomeBig DataRockset Is Now SOC 2 Sort II Compliant

Rockset Is Now SOC 2 Sort II Compliant


The Rockset group is proud to announce that we’ve been accredited as SOC 2 Sort II compliant. Our prospects entrust Rockset with their information, and now they’ve rigorous, unbiased assurance that we defend it by following safety finest practices.

What’s SOC 2 Sort II?

SOC is one in all a number of System and Group Controls audits developed by the American Institute of CPAs (AICPA), the world’s largest member affiliation of accountants. Every SOC take a look at evaluates the validity of a enterprise or service supplier’s safety controls and the operational effectiveness of their programs.

SOC checks differ considerably, nevertheless. In accordance with Forbes journal, SOC 2 “is probably the most thorough and extensively valued of the three SOC experiences,” and the Sort II accreditation requires “a much more in-depth assessment” of our information safety protocols than the Sort I. And MPA (Mortgage Skilled America) journal calls SOC 2 Sort II “among the many most coveted and exhausting to acquire information-security certifications.”

By reaching SOC 2 Sort II compliance, Rockset was in a position to exhibit that our info safety and information insurance policies, procedures, and practices will defend our buyer’s information. It exhibits that we’ve taken the correct steps to make sure that information is safe.

Scope

What was included within the audit? At a excessive degree, Rockset was assessed on the themes of Safety, Confidentiality and Availability for the technical infrastructure and firm processes required to provide and help our SaaS service.

  • Change administration:
    Updates to the infrastructure, utility, UI and API are linked to documented necessities, and merging of latest code requires peer assessment.
  • Secrets and techniques administration:
    Encryption keys, passwords and different secrets and techniques are saved securely in access-controlled vaults with permission granted solely on a necessity foundation.
  • Metrics-based alerting:
    Operational efficiency information feeds into real-time dashboards and alerting programs.
  • Safety monitoring:
    Alerts are despatched to the safety group on a variety of occasions, together with uncommon outbound connections, anomalous authentication occasions, and suspicious server processes.
  • Hiring, onboarding and off-boarding processes:
    The Folks Staff ensures the abilities and abilities of latest hires match the necessities of every open place, conducts screenings in the course of the hiring course of, requests acceptable accesses based mostly on function, and ensure these accesses are eliminated when personnel depart the corporate.
  • Entry controls:
    Entry is granted to firm sources based mostly on function, and are reviewed on an ongoing foundation.
  • Vulnerability administration:
    Rockset conducts common Third-party penetration checks and receives vulnerability experiences from unbiased safety researchers on an ongoing foundation. Safety bugs are remediated by precedence and tracked to decision.

What Does This Imply for You?

For enterprises trying to deliver on third-party service suppliers, Rockset’s SOC 2 Sort II compliance signifies a degree of course of maturity that minimizes danger and focuses on the safety of buyer information.

Rockset’s SOC 2 Sort II compliance implies that our danger mitigation contains the event of deliberate insurance policies, procedures, communications and different processing options to reply to and get well from any enterprise disruption. With this dedication, Rockset is ready to make sure the affect of any attainable danger to our prospects is minimized.

If you wish to study extra about what SOC 2 Sort II accreditation means for you, try this complete record from InfoSecurity Journal.

Our Dedication to Your Information’s Safety and Privateness

Earlier than we even based Rockset, we knew that safety and compliance can be entrance and middle when it got here to constructing our information observability platform structure. The truth is, safety runs in our DNA. A number of of us hail from cybersecurity suppliers like Palo Alto Networks and/or have cybersecurity certifications.

What’s Subsequent?

With SOC 2 Sort II, there is no such thing as a “resting in your laurels.” It’s an ongoing dedication. We’re continuously striving to exceed the requirements, and regularly enhance our safety posture.

If in case you have questions on Rockset’s SOC 2 Sort II compliance, attain out to our group at safety@rockset.com. To study extra about Rockset’s Safety Design, please go to: https://rockset.com/whitepapers/rockset-security-design


About Martin Englund

Martin Englund is the Data Safety Officer at Rockset and member of the Web site Reliability Engineering group. He holds a CISSP certification and lives by the motto “The query is not in the event you’re paranoid, it’s if you’re paranoid sufficient”.

Martin has over twenty 5 years of expertise in safety and automation, and has contributed to quite a few open supply DevOps instruments. Previous to his present function, he has labored as Web site Reliability Engineer at Palo Alto Networks and Manufacturing Engineer at Fb.

Earlier than switching fields to Web site Reliability Engineering, he was a Principal Safety Engineer at Solar Microsystems, the place he spent over fifteen years in varied safety roles all through the corporate, co-authored the Solaris Safety Necessities guide, and authored a safety patent.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments