1

Join Codacy Product Showcase on July 9th to learn about product updates

Group 370
2

Meet us at WeAreDevelopers World Congress in Berlin

Group 370
3

Spotlight Whitepaper by IDC on Importance of Automated Code Review Technologies

Group 370

It’s official: Codacy is now SOC2 Type I certified! 🎉

In this article:
Subscribe to our blog:

At Codacy, we’re committed to the security and privacy of your data. Our customers demand and deserve nothing less than the best security assurances that we can give them. That’s why we’re very excited to announce that Codacy is SOC 2 Type I certified!

This article explains what the SOC 2 certification is, why it is important, and what it means for our customers.

What is SOC 2 certification, and why is it important?

System and Organization Controls (SOC 2) is a well-known security compliance and certification created by the American Institute of Chartered Public Accountants (AICPA). It is considered the gold standard to ensure customers’ data security and operational maturity.

SOC 2 certification tackles the controls and processes of service organizations related to five trust services criteria: security, confidentiality, availability, process integrity, and privacy. All SOC 2 reports include the security category, while the others are optional.

The reports assure customers, partners, and prospects that an organization has security guidelines and follows them. For example, this might involve background checks on all employees, ensuring that laptops are password-protected, or configuring the organization’s AWS utilities safely.

Third-party certified auditors conduct the SOC 2 audit process and certification.

The two stages of SOC 2

There are two stages of achieving SOC 2 certification: SOC 2 Type I and SOC 2 Type II. 

  • SOC 2 Type I: reports on the current security rules (systems and controls) and reviews documents around these rules. It gives a snapshot of an organization’s practice on a particular date.
  • SOC 2 Type II: it’s very similar to Type I, but the evidence of rules effectiveness is described and evaluated over time, for a minimum of 6 months, to see if the systems and controls in place are functioning all the time.

Codacy is committed to your data security

At Codacy, we believe security is fundamental in our products’ design and implementation. Our customers trust us to store and process their data and expect that Codacy will maintain their data private, secure and confidential at all times. 

Therefore, we work hard to guarantee security in everything we do. We’ve implemented controls around our production systems, software, infrastructure, people, procedures, and all data supporting Codacy products.

We also want our customers to have independent assurance proving we meet our commitments. The SOC 2 certification represents our dedication to keeping customer information private and secure.

AICPA SOC Logo

Next steps: being SOC2 Type II certified

Maintaining and improving security practices requires constant work. Our mission to make your experience with Codacy as secure as possible does not stop here. 

With SOC 2 Type I achieved, our next natural step is to pursue SOC 2 Type II certification. See you on the other side!

RELATED
BLOG POSTS

It’s official: Codacy is now SOC2 Type II compliant!
At Codacy, we’re committed to the security and privacy of your data. Our customers demand and deserve nothing less than the best security assurances we...
April 2022 Product Update 🚀
Hi there 👋,
SSL Security In European Banking
Moved by recent security issues regarding SSL and certificates, I wanted to study the state of the SSL security in the European online banking system.

Automate code
reviews on your commits and pull request

Group 13