{"id":8277,"date":"2023-10-02T14:38:11","date_gmt":"2023-10-02T14:38:11","guid":{"rendered":"https:\/\/durolabs.co\/?p=8277"},"modified":"2024-09-20T17:29:57","modified_gmt":"2024-09-20T17:29:57","slug":"soc-2-compliance","status":"publish","type":"post","link":"https:\/\/durolabs.co\/blog\/soc-2-compliance\/","title":{"rendered":"Duro\u2019s Journey to SOC 2 Compliance (Type 1 &#038; 2)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8277\" class=\"elementor elementor-8277\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7674d1be posts-inner-container e-flex e-con-boxed e-con e-child\" data-id=\"7674d1be\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-423b9d13 post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"423b9d13\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Duro, we take security and compliance seriously. In the digital age,&nbsp;<a href=\"https:\/\/www.congruity360.com\/blog\/ways-to-protect-your-sensitive-data\/\" target=\"_blank\" rel=\"noopener\">protecting sensitive data<\/a>&nbsp;is of utmost importance. That\u2019s where SOC 2 compliance comes in. SOC 2 is a framework that focuses on how organizations manage and process customer data.&nbsp;<\/p>\n<p>In addition to being&nbsp;ITAR and&nbsp;NIST compliant, Duro achieved its <b>SOC 2 Type 1<\/b> certification in September 2023 and quickly followed it up with <b>SOC 2 Type 2<\/b> in December 2023. This blog explains this compliance measure and why it\u2019s so important. We\u2019ll also outline some of the steps we\u2019ve taken to protect our customers&#8217; data. This article was updated in 2024.&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6060dd0f post-anchored-tag elementor-widget elementor-widget-heading\" data-id=\"6060dd0f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is SOC 2 Compliance?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ce7328a post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"1ce7328a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/drata.com\/blog\/beginners-guide-to-soc-2-compliance#heading-what-is-soc-2\" target=\"_blank\" rel=\"noopener\">SOC 2 is a security framework<\/a>\u00a0that companies rely on to manage, process, and store customer data. It stands for Service Organization Control 2, and under the framework, companies must comply with various security, availability, confidentiality, and privacy rules. Companies that adhere to SOC 2 standards are committed to protecting customer information.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-111508d elementor-widget elementor-widget-heading\" data-id=\"111508d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The five SOC 2 Trust Services Criteria:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e687db1 post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"7e687db1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li aria-level=\"1\"><b>Security<\/b>: The organization\u2019s systems and data must be protected against unauthorized access, disclosure, and damage. It requires data encryption, authentication, access, monitoring, and incident response.<\/li><li aria-level=\"1\"><b>Availability<\/b>: Systems and services must be available for operation and use as agreed upon with customers. Adequate measures must be taken for system reliability, backup processes, and disaster recovery planning.<\/li><li aria-level=\"1\"><b>Processing<\/b>\u00a0<b>Integrity<\/b>: Systems and processes must operate accurately, efficiently, and securely.\u00a0<\/li><li aria-level=\"1\"><b>Confidentiality<\/b>:\u00a0Data is protected\u00a0from unauthorized access or disclosure.<\/li><li aria-level=\"1\"><b>Privacy<\/b>: The organization must handle personal information carefully and ensure compliance with relevant privacy regulations.\u00a0<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c5e9095 elementor-widget elementor-widget-heading\" data-id=\"1c5e9095\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Audits and certification <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3db6cdad post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"3db6cdad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>SOC 2 requires third-party attestation to assess one or more of the Trust Services Categories. Licensed audit firms generate these reports. There are two types of SOC 2 reports:<\/p><ul><li aria-level=\"1\"><strong>SOC 2 Type 1<\/strong>\u00a0focuses on a specific point in time to determine if the company was compliant at that moment.\u00a0<\/li><li aria-level=\"1\"><strong>SOC 2 Type 2<\/strong>\u00a0reviews a company\u2019s compliance over a period of time, typically the last continuous year.\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dd30a8e post-anchored-tag elementor-widget elementor-widget-heading\" data-id=\"3dd30a8e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why does SOC 2 Compliance matter?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2deb3c37 post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"2deb3c37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Having a SOC 2 certification gives you peace of mind that the software vendors you choose will protect your data. SOC 2 offers assurance that your Product Lifecycle Management partner has implemented adequate security controls to protect your sensitive data.\u00a0<\/p><p>In order to become compliant, independent auditing firms typically conduct SOC 2 reporting. This validation adds credibility and trust to the service organization\u2019s claims about its security measures. Ensuring that your sensitive data is protected reduces the risk of data breaches and privacy violations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c788e7b elementor-widget elementor-widget-heading\" data-id=\"c788e7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The role of compliance and regulation in hardware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bf738bf post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"1bf738bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Duro works with distributed and highly collaborative hardware teams. Much of the content required to design and manufacture these products comes from a global ecosystem. As a result, various\u00a0security and compliance requirements\u00a0exist across different divisions within this ecosystem.<\/p><ul><li aria-level=\"1\"><b>Engineers<\/b>\u00a0must protect their work from being overwritten. They need to preserve different versions and revisions for traceability and legal purposes.\u00a0<\/li><li aria-level=\"1\"><b>Subcontractors<\/b>\u00a0need to isolate their own systems from internally designed content. They also need to carefully manage their relationships with each client and keep documents separate.<\/li><li aria-level=\"1\"><b>Organizations<\/b>\u00a0require strict security standards such as SOC2, FedRAMP, or\u00a0<a href=\"https:\/\/www.durolabs.co\/blog\/itar-compliance-checklist\/\">ITAR<\/a>\u00a0to ensure compliance with regulatory bodies. They also need protection against rogue actors and cyber espionage.<\/li><li aria-level=\"1\"><b>Ecosystem vendors<\/b>\u00a0must protect product data as it is transferred between systems. They require secure portals to ensure only authorized users can access product records.\u00a0<\/li><li aria-level=\"1\"><a href=\"https:\/\/www.supplychainbrain.com\/blogs\/1-think-tank\/post\/37615-what-critical-manufacturing-organizations-need-to-do-now-to-reduce-the-chance-of-a-security-breach\"><b>Manufacturers<\/b><\/a>\u00a0require a way to track their parts to ensure integrity from the design to manufacture.\u00a0<\/li><\/ul><p>\u00a0<\/p><p>Hardware engineering firms need to be able to trust the software vendors they choose with their data. And SOC 2 is just one part of that; it provides bolstered data security measures, increased credibility, a competitive advantage, adherence to regulations, and better risk management practices. It also results in more efficient internal processes, stronger customer relationships, enhanced supply chain security, and opportunities for continuous improvement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d938e09 elementor-widget elementor-widget-image\" data-id=\"d938e09\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/durolabs.co\/request-demo\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"124\" src=\"https:\/\/durolabs.co\/wp-content\/uploads\/2024\/06\/ITAR-banner-1-1.png\" class=\"attachment-full size-full wp-image-13450\" alt=\"ITAR Compliance\" srcset=\"https:\/\/durolabs.co\/wp-content\/uploads\/2024\/06\/ITAR-banner-1-1.png 1000w, https:\/\/durolabs.co\/wp-content\/uploads\/2024\/06\/ITAR-banner-1-1-300x37.png 300w, https:\/\/durolabs.co\/wp-content\/uploads\/2024\/06\/ITAR-banner-1-1-768x95.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-309e8c7b post-anchored-tag elementor-widget elementor-widget-heading\" data-id=\"309e8c7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Duro\u2019s journey to SOC 2 Compliance (Type 1 &amp; 2)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40b742c elementor-widget elementor-widget-heading\" data-id=\"40b742c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">SOC 2 Type 1<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b380a30 post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"4b380a30\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Over the past few years, Duro has been enhancing its security measures. We\u2019ve adopted\u00a0best practices and technologies to safeguard sensitive customer data. Additionally, we\u2019ve incorporated automated scanning and penetration tools, higher SLA standards, and increased access requirement restrictions. Through careful planning and execution, we streamlined various processes within our organization, making them more efficient and robust.\u00a0<\/p><p>Achieving SOC 2 Type 1 compliance was a testament to our dedication to building a reliable and secure platform. Here\u2019s how this milestone positively impacts our customers:<\/p><ul><li aria-level=\"1\"><b>Building Trust<\/b>: Customers and partners can rely on us to handle their data with the utmost security and integrity.<\/li><li aria-level=\"1\"><b>Operational Efficiency:<\/b>\u00a0The improvements we\u2019ve implemented not only meet compliance standards but also contribute to increased operational efficiency. By making these upgrades, we\u2019re paving the way for a smoother, more streamlined workflow, enabling us to meet the security needs of our customers faster in the future.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48d58acc elementor-widget elementor-widget-heading\" data-id=\"48d58acc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">SOC 2 Type 2<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d00c54 post-text-block elementor-widget elementor-widget-text-editor\" data-id=\"41d00c54\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In December 2023, Duro achieved SOC 2 Type 2 certification after a year of dedicated effort towards SOC compliance. This milestone underscores our commitment to safeguarding customer data with stringent security, availability, processing integrity, confidentiality, and privacy controls.\u00a0<\/p><p>Achieving SOC 2 Type 1 and Type 2 certifications reaffirms Duro as the ideal choice for <a href=\"https:\/\/techcrunch.com\/2021\/11\/18\/duro-fundraise\/\" target=\"_blank\" rel=\"noopener\">agile hardware teams<\/a> seeking secure BOM and product-related data management. Our engineering team is committed to continuously improving our PLM platform by adopting best practices and advanced technologies to uphold the highest standards of security and reliability.&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bca3dd e-flex e-con-boxed e-con e-parent\" data-id=\"1bca3dd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-796481e elementor-widget elementor-widget-image\" data-id=\"796481e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/durolabs.co\/request-demo\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"124\" src=\"https:\/\/durolabs.co\/wp-content\/uploads\/2023\/07\/Banner-compliance.png\" class=\"attachment-full size-full wp-image-14765\" alt=\"\" srcset=\"https:\/\/durolabs.co\/wp-content\/uploads\/2023\/07\/Banner-compliance.png 1000w, https:\/\/durolabs.co\/wp-content\/uploads\/2023\/07\/Banner-compliance-300x37.png 300w, https:\/\/durolabs.co\/wp-content\/uploads\/2023\/07\/Banner-compliance-768x95.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>At Duro, we take security and compliance seriously. In the digital age,\u00a0protecting sensitive data\u00a0is of utmost importance. That\u2019s where SOC 2 compliance comes in. SOC 2 is a framework that focuses on how organizations manage and process customer data. In addition to being\u00a0ITAR and\u00a0NIST compliant, Duro achieved its SOC 2 Type 1 certification in September [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Duro\u2019s Journey to SOC 2 Compliance","_seopress_titles_desc":"Discover Duro's journey to SOC 2 certification for data security and compliance and learn how SOC compliance helps protect product data.","_seopress_robots_index":"","footnotes":""},"categories":[93],"tags":[],"resource-tag":[78],"class_list":["post-8277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","resource-tag-compliance"],"acf":[],"_links":{"self":[{"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/posts\/8277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/comments?post=8277"}],"version-history":[{"count":92,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/posts\/8277\/revisions"}],"predecessor-version":[{"id":16503,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/posts\/8277\/revisions\/16503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/media\/8278"}],"wp:attachment":[{"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/media?parent=8277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/categories?post=8277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/tags?post=8277"},{"taxonomy":"resource-tag","embeddable":true,"href":"https:\/\/durolabs.co\/wp-json\/wp\/v2\/resource-tag?post=8277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}