SOC 2

SOC 2

SOC 2

Enterprise-Grade Security Validation and Compliance

What is SOC 2?

What is SOC 2?

SOC 2 (System and Organization Controls 2) is a rigorous auditing standard developed by the American Institute of CPAs (AICPA) specifically for technology service providers storing customer data in the cloud. The framework evaluates an organization's information systems and controls across five trust service criteria:

  • Security

  • Availability

  • Processing integrity

  • Confidentiality

  • Privacy

There are two types of SOC 2 reports:

  • Type 1: Evaluates the design of security controls at a specific point in time

  • Type 2: Assesses both the design and operating effectiveness of controls over an extended observation period (typically 6 months)

Our SOC 2 Type II Compliance

Our SOC 2 Type II Compliance

We have achieved SOC 2 Type 2 compliance, demonstrating our ongoing commitment to maintaining the highest standards of security and operational excellence. Our systems and processes have undergone comprehensive independent examination, verifying that our controls are properly designed and operating effectively over time.

Why SOC 2 matters for your organization

Why SOC 2 matters for your organization

While SOC 2 compliance isn't legally mandated, it represents a foundational investment in the security and reliability of the hoop.dev platform. For our customers, our compliance:

  • Validates our implementation of robust security practices

  • Provides third-party verification of our data protection measures

  • Helps simplify your own compliance requirements when using our services

  • Demonstrates our commitment to protecting your sensitive information

  • Supports your risk management and vendor assessment processes

How our compliance supports your security requirements

How our compliance supports your security requirements

Our SOC 2 Type II compliance aligns with the security and compliance needs of enterprise organizations. By choosing hoop.dev, you're partnering with a service provider that:

  • Maintains rigorous security practices validated by independent auditors

  • Implements comprehensive controls for protecting sensitive data

  • Follows documented procedures for managing system operations

  • Monitors systems continuously for security and availability

  • Demonstrates accountability through regular third-party assessments


This commitment to security and compliance helps streamline your vendor risk assessment process and supports your organization's overall security posture.

Audit Timeline and Coverage

Audit Timeline and Coverage

Our most recent SOC 2 Type II audit covers the reporting period from February 28th, 2024 to June 6th, 2024. Our compliance program includes continuous monitoring and regular reassessments to maintain the effectiveness of our security controls.

Accessing Our SOC 2 Report

Accessing Our SOC 2 Report

You can request access to our full SOC 2 Type II report by visiting trust.hoop.dev. After a brief verification process, we'll provide you with the comprehensive audit report.

You will be in good company

You will be in good company

You will be in good company

FAQ

How long to get a pilot with a few connections?

How hard is it to self-host?

How long are pilots?

Is hoop.dev SOC2 compliant?

FAQ

How long to get a pilot with a few connections?

How hard is it to self-host?

How long are pilots?

Is hoop.dev SOC2 compliant?

FAQ

How long to get a pilot with a few connections?

How hard is it to self-host?

How long are pilots?

Is hoop.dev SOC2 compliant?