Audit In Progress

SOC 2 Type IICompliance

BearPlex is undergoing a formal SOC 2 Type II audit to independently verify our security controls. This process evaluates our systems over a multi-month observation period to ensure consistent, enterprise-grade security practices.

Scope: Security (Common Criteria)
Auditor: Independent CPA Firm
Audit Timeline

Where we are in the process

Complete
Phase 1

Readiness & Policy Development

Security policies, access controls, and technical safeguards implemented across all systems.

In Progress
Phase 2

Control Observation Period

Active monitoring and evidence collection across AWS, GitHub, Google Workspace, and Cloudflare.

Upcoming
Phase 3

Independent Audit

Third-party CPA firm conducts formal audit, reviews evidence, and interviews key personnel.

Upcoming
Phase 4

Report Issuance

Final SOC 2 Type II report issued, available to clients and partners under NDA.

Security Controls

Controls under audit

These controls have been implemented and are being actively monitored throughout the observation period.

Access Control & MFA

Multi-factor authentication enforced across all platforms. Role-based access with least privilege principle.

Continuous Monitoring

Real-time logging and monitoring across all infrastructure. 12-month log retention with automated alerting.

Change Management

All production changes go through documented review and approval. Full audit trail on every deployment.

Infrastructure Security

Encryption at rest and in transit. Automated vulnerability scanning. Regular backup and recovery testing.

Vendor Risk Management

Third-party vendors assessed and monitored continuously. Only SOC 2 compliant vendors in our supply chain.

Incident Response

Documented incident response plan with defined escalation paths. Regular tabletop exercises and post-mortems.

Audit Scope

What's being evaluated

Infrastructure in Scope

Amazon Web Services (compute, storage, networking)
Google Workspace (identity, email, collaboration)
GitHub (source code, CI/CD, access controls)
Cloudflare (DNS, WAF, DDoS protection)
Internal platforms and tooling
Employee endpoint security

Trust Service Categories

Security (Common Criteria)
Included
Availability
Planned
Confidentiality
Planned
Processing Integrity
Planned
Privacy
Planned

Need our compliance documentation?

We're happy to share our security posture details, policies, and audit progress with prospective clients and partners under NDA.

Request Documentation