SOC 2 Type II
Compliance Report
Independent auditor verification of CyberVault's controls over security, availability, processing integrity, confidentiality, and privacy.
Trust Services Criteria
Our SOC 2 Type II audit evaluates the design and operating effectiveness of controls across the five AICPA Trust Services Criteria. CyberVault achieved passing status across all in-scope principles.
Security
System is safeguarded against unauthorized access, threats, and breaches through encryption, MFA, network segmentation, and continuous monitoring.
Availability
System is available for operation and use as committed, backed by 99.99% SLA, geo-redundant infrastructure, and automated failover.
Processing Integrity
System processing is complete, accurate, timely, and authorized through automated validation and data integrity checks.
Confidentiality
Confidential information is protected as committed via role-based access, data classification, and strict NDA enforcement.
Privacy
Personal information is collected, used, retained, disclosed, and disposed of in conformity with privacy commitments and GDPR/CCPA.
Scope & Key Controls
The audit scope encompasses CyberVault's SaaS platform, SOC infrastructure, client data processing pipelines, and third-party integrations. Key controls tested include:
| Control Domain | Description | Audit Result |
|---|---|---|
| Access Management | Enforced MFA, least-privilege RBAC, and automated offboarding workflows | \u2713 Pass |
| Data Encryption | AES-256 at rest, TLS 1.3 in transit, customer-managed keys (KMS) | \u2713 Pass |
| Change Management | Peer-reviewed deployments, staging validation, and rollback procedures | \u2713 Pass |
| Incident Response | 24/7 SOC monitoring, documented playbooks, quarterly tabletop exercises | \u2713 Pass |
| Vendor Risk | Third-party security assessments, contractual SLAs, and continuous monitoring | \u2139\uFE0F Note |
| Disaster Recovery | Geo-redundant backups, RTO < 1hr, RPO < 5min, annual failover testing | \u2713 Pass |
Request Report Access
Secure Document Portal
SOC 2 reports contain sensitive audit details. Please complete the form below. Our compliance team will deliver the PDF within 24 hours, subject to NDA verification.
\u{1F512} All submissions are encrypted and processed in compliance with our privacy policy.