undo
Go Beyond the Code
arrow_forward_ios

Journey to SOC2 Certification: A Comprehensive Approach

July 22, 2024
To learn more about this topic, click here.

In our continuous effort to ensure that our clients meet high standards in terms of security, last year we took the lead on the tech end to achieve SOC2 certification for one of our customers. This certification was not merely a checkbox for compliance but a rigorous set of tasks, procedures, policies and assessments that have been done during the course of months. In this article, we are going to summarize the key tasks involved in this process that took place during months but ended with a successful SOC2 certification.

The process in a nutshell

Achieving SOC2 certification required a series of meticulous tasks aimed at bolstering our security and operational protocols. Each task was designed to align our practices with the stringent requirements of SOC2, ensuring comprehensive protection and reliability for our systems and data. Below, we outline the critical steps we undertook, detailing their purpose and implementation to illustrate our commitment to security and excellence.

Configuring Workstations

To kickstart our SOC2 certification process, we focused on securing our workstations with stringent measures:

Writing and Approving Guidelines

A comprehensive set of guidelines needed to be developed, reviewed, and approved to standardize our processes:

Adjusting Infrastructure for Productive Applications

We made significant adjustments to our infrastructure to align with SOC2 requirements:

Implementing Version Control Rules

We established strict version control rules to maintain code integrity and security:

Trunk Branch Restrictions: Restrictions on merging and pushing directly to trunk branches helped maintain code stability and integrity. This prevented unauthorized or unreviewed changes from being integrated into the main codebase.

Enabling Two-Factor Authentication

Two-factor authentication (2FA) was enabled across all platforms, including GSuite, AWS IAM, BitBucket, and Slack. This added layer of security significantly reduced the risk of unauthorized access. By requiring an additional authentication step, 2FA ensured that even if credentials were compromised, unauthorized users could not access our systems.

Phishing and Cybersecurity Training

To bolster our defense against social engineering attacks, the entire team completed phishing and cybersecurity courses using the Curricula platform. This training increased awareness and provided practical skills to identify and respond to potential threats effectively. By educating our team, we created a human firewall that complemented our technical defenses.


Conclusion

Achieving SOC2 certification was a rigorous and comprehensive process that required a holistic approach to security and operational excellence. By configuring secure workstations, establishing robust guidelines, adjusting our infrastructure, implementing strict version control rules, enabling two-factor authentication, and educating our team, we not only met the SOC2 requirements but also strengthened our overall security posture. This journey has not only prepared us for certification but also instilled a culture of continuous improvement and vigilance, ensuring we remain a trusted partner for our customers.

Manuel Rivero
Engineering Manager & Solver

Start Your Digital Journey Now!

Which capabilities are you interested in?
You may select more than one.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.