Saturday, December 9, 2023
HomeBig DataRockset Is Now SOC 2 Sort II Compliant

Rockset Is Now SOC 2 Sort II Compliant

The Rockset crew is proud to announce that we’ve been accredited as SOC 2 Sort II compliant. Our clients entrust Rockset with their information, and now they’ve rigorous, impartial assurance that we defend it by following safety finest practices.

What’s SOC 2 Sort II?

SOC is certainly one of a number of System and Group Controls audits developed by the American Institute of CPAs (AICPA), the world’s largest member affiliation of accountants. Every SOC check evaluates the validity of a enterprise or service supplier’s safety controls and the operational effectiveness of their methods.

SOC assessments differ considerably, nevertheless. Based on Forbes journal, SOC 2 “is essentially the most thorough and broadly valued of the three SOC stories,” and the Sort II accreditation requires “a much more in-depth assessment” of our information safety protocols than the Sort I. And MPA (Mortgage Skilled America) journal calls SOC 2 Sort II “among the many most coveted and exhausting to acquire information-security certifications.”

By reaching SOC 2 Sort II compliance, Rockset was capable of exhibit that our data safety and information insurance policies, procedures, and practices will defend our buyer’s information. It exhibits that we’ve taken the correct steps to make sure that information is safe.


What was included within the audit? At a excessive degree, Rockset was assessed on the themes of Safety, Confidentiality and Availability for the technical infrastructure and firm processes required to provide and assist our SaaS service.

  • Change administration:
    Updates to the infrastructure, utility, UI and API are linked to documented necessities, and merging of recent code requires peer assessment.
  • Secrets and techniques administration:
    Encryption keys, passwords and different secrets and techniques are saved securely in access-controlled vaults with permission granted solely on a necessity foundation.
  • Metrics-based alerting:
    Operational efficiency information feeds into real-time dashboards and alerting methods.
  • Safety monitoring:
    Alerts are despatched to the safety crew on a spread of occasions, together with uncommon outbound connections, anomalous authentication occasions, and suspicious server processes.
  • Hiring, onboarding and off-boarding processes:
    The Individuals Workforce ensures the abilities and skills of recent hires match the necessities of every open place, conducts screenings through the hiring course of, requests acceptable accesses based mostly on function, and ensure these accesses are eliminated when personnel depart the corporate.
  • Entry controls:
    Entry is granted to firm sources based mostly on function, and are reviewed on an ongoing foundation.
  • Vulnerability administration:
    Rockset conducts common Third-party penetration assessments and receives vulnerability stories from impartial safety researchers on an ongoing foundation. Safety bugs are remediated by precedence and tracked to decision.

What Does This Imply for You?

For enterprises seeking to deliver on third-party service suppliers, Rockset’s SOC 2 Sort II compliance signifies a degree of course of maturity that minimizes danger and focuses on the safety of buyer information.

Rockset’s SOC 2 Sort II compliance implies that our danger mitigation contains the event of deliberate insurance policies, procedures, communications and different processing options to reply to and get well from any enterprise disruption. With this dedication, Rockset is ready to make sure the affect of any doable danger to our clients is minimized.

If you wish to be taught extra about what SOC 2 Sort II accreditation means for you, try this complete checklist from InfoSecurity Journal.

Our Dedication to Your Knowledge’s Safety and Privateness

Earlier than we even based Rockset, we knew that safety and compliance could be entrance and heart when it got here to constructing our information observability platform structure. Actually, safety runs in our DNA. A number of of us hail from cybersecurity suppliers like Palo Alto Networks and/or have cybersecurity certifications.

What’s Subsequent?

With SOC 2 Sort II, there isn’t any “resting in your laurels.” It’s an ongoing dedication. We’re continually striving to exceed the requirements, and frequently enhance our safety posture.

In case you have questions on Rockset’s SOC 2 Sort II compliance, attain out to our crew at To be taught extra about Rockset’s Safety Design, please go to:

About Martin Englund

Martin Englund is the Data Safety Officer at Rockset and member of the Website Reliability Engineering crew. He holds a CISSP certification and lives by the motto “The query is not if you happen to’re paranoid, it’s in case you are paranoid sufficient”.

Martin has over twenty 5 years of expertise in safety and automation, and has contributed to quite a few open supply DevOps instruments. Previous to his present function, he has labored as Website Reliability Engineer at Palo Alto Networks and Manufacturing Engineer at Fb.

Earlier than switching fields to Website Reliability Engineering, he was a Principal Safety Engineer at Solar Microsystems, the place he spent over fifteen years in varied safety roles all through the corporate, co-authored the Solaris Safety Necessities guide, and authored a safety patent.



Please enter your comment!
Please enter your name here

Most Popular

Recent Comments