Compliance Frameworks & Certifications
Transparent, audited, and continuously monitored. CyberVault adheres to globally recognized security standards to ensure your data remains protected, private, and accessible only to authorized personnel.
Supported Frameworks
SOC 2 Type II
Independent audit evaluating our controls against AICPA Trust Services Criteria. Covers security, availability, processing integrity, confidentiality, and privacy.
ISO/IEC 27001:2022
\nInternationally recognized standard for Information Security Management Systems. Validates our risk management framework, control implementation, and continuous improvement processes.
GDPR & Data Privacy
Full compliance with EU General Data Protection Regulation. Includes data mapping, DPIA templates, lawful processing basis documentation, and data subject request workflows.
HIPAA Compliance
Designed for healthcare organizations requiring secure handling of Protected Health Information. Includes BAA execution, access logging, encryption at rest/in-transit, and breach notification protocols.
Framework Deep Dive: SOC 2 & ISO 27001
π‘οΈ SOC 2 Trust Services Criteria
Our Type II audit evaluates operational effectiveness over a 12-month period. Below are the criteria assessed and their validation status:
- Security (CC6.x)Fully Validated
- Availability (A1.x)Fully Validated
- Processing Integrity (PI1.x)Fully Validated
- Confidentiality (C1.x)Fully Validated
- Privacy (PRIV)Partially In Scope
Audit Period: April 1, 2024 β March 31, 2025
Opinions: Unqualified (Clean)
Findings: 0 Exceptions, 2 Recommendations (Implemented)
π ISO 27001 ISMS Structure
Our Information Security Management System is built on risk-based planning, continuous monitoring, and management review cycles aligned with Annex A controls.
- Risk Assessment & TreatmentAutomated
- Asset ManagementCMDB Integrated
- Access Control (A.5)Enforced (Zero Trust)
- Operations Security (A.8)Automated Monitoring
- Incident Management (A.16)SOAR Integrated
Certification Body: BSI Group GmbH
Management Review: Quarterly
Internal Audit: Bi-Annual
Compliance Implementation Lifecycle
We don't just pass auditsβwe embed compliance into our engineering culture through continuous automation and governance.
Assessment & Gap Analysis
Baseline evaluation against target frameworks using automated policy scanning and manual expert review.
Control Implementation
Deploy technical, administrative, and physical controls. Integrate CI/CD guardrails and IaC compliance checks.
Third-Party Audit
Independent auditors test control design and operational effectiveness. Evidence is submitted via secure portal.
Continuous Monitoring
Automated drift detection, policy enforcement, and real-time dashboarding ensure post-certification compliance.
Audit Documentation & Access
Restricted compliance documents are available to verified customers and partners. Request access through your account portal or contact our compliance team.
| Document Name | Framework | Version | Last Updated | Access |
|---|---|---|---|---|
| SOC 2 Type II Summary Report | SOC 2 | v3.1 | Apr 15, 2025 | Request Access β |
| ISO 27001 Certificate of Registration | ISO 27001 | v2.0 | Nov 02, 2024 | Download Public β |
| Data Processing Addendum (DPA) | GDPR/CCPA | v4.2 | Feb 20, 2025 | View Template β |
| Business Associate Agreement (BAA) | HIPAA | v2.5 | Jan 10, 2025 | Request via Portal β |
| Vendor Security Questionnaire (VSQ) | Multi | v5.0 | Mar 01, 2025 | Public Download β |
Frequently Asked Questions
Need Compliance Documentation for Your Audit?
Our GRC team is ready to assist with vendor assessments, security reviews, and custom compliance reporting. Get direct access to our compliance portal or schedule a walkthrough.