Compliance Dashboard
Last updated: 3/9/2026
23%
SOC 2 Type II
80 controls
18
62
0
80
Total Controls
18
Passing
62
Failing
133
Tests
Recent Failing Tests
Personnel computer screenlock configured (MacOS)
Failing
Company has an approved Access Control Policy
Failing
Company has an approved Asset Management Policy
Failing
Company has an approved Business Continuity and Disaster Recovery Plan
Failing
Company has an approved Code of Conduct
Failing
Company has an approved Cryptography Policy
Failing
Company has an approved Data Management Policy
Failing
Company has an approved Human Resource Security Policy
Failing
Company has an approved Incident Response Plan
Failing
Company has an approved Information Security Policy (AUP)
Failing
Open Risks
Appropriate contacts are not maintained resulting in delays in breach response and reporting.
Pending
Appropriate contacts with interest groups are not maintained resulting in a lack of understanding of current threats.
Pending
Assets are not identified and protected according to company requirements.
Pending
Background verification checks are not carried out on all candidates or are not proportional to the business requirements or the classification of the information to be accessed by the role resulting in increased risk of malicious insider threats.
Pending
Bad actor poses as CEO and demands transfer of funds.
Pending
Company data is breached due to human error and/or misunderstanding of company requirements.
Pending
Company data is breached during a disaster due to control failures.
Pending
Company data is breached, corrupted or made unavailable due to a malware attack.
Pending
Company records are altered due to lack of proper access controls, segregation of duties, and/or supervision.
Pending
Company systems and data are breached by a company vendor.
Pending