SOC 2 Certification
ARK Platforms maintains SOC 2 Type II certification demonstrating security, availability, and data protection excellence.
SOC 2 Type II Compliance
ARK Platforms has achieved and maintains SOC 2 Type II certification, an independent audit confirming our adherence to strict security, availability, processing integrity, and confidentiality standards for managing customer data.
Understanding SOC 2 certification
SOC 2 (Service Organization Control 2) is a certification developed by the American Institute of CPAs (AICPA) that evaluates a service organization's controls related to security, availability, processing integrity, confidentiality, and privacy of customer data.
Type II Certification
Covers a minimum of 6 months of operations, testing both design and effectiveness of controls over time.
Independent Audit
Third-party auditors conduct comprehensive assessment of our security controls and practices.
Ongoing Validation
Annual re-certification ensures continued compliance and control effectiveness.
Five pillars of SOC 2
CC - Security
Systems are protected from unauthorized access, alteration, and destruction. This includes logical and physical controls, access management, and threat prevention.
A - Availability
Systems are available for authorized use and operate at required levels of performance. Includes disaster recovery, business continuity, and monitoring.
PI - Processing Integrity
Information is consistently and accurately processed, authorized, and completely recorded. Systems prevent data errors and corruption.
C - Confidentiality
Information designated as confidential is protected from unauthorized transmission, access, or disclosure throughout system lifecycle.
P - Privacy
Personal information is collected, retained, disclosed, and destroyed in accordance with regulatory requirements and customer agreements.
Key areas of assessment
- Entity & Governance: Organizational structure and oversight
- Communication: Internal and external communication of responsibilities
- Risk Assessment: Identification and management of risks
- Control Activities: Implementation of control policies and procedures
- Information & Monitoring: System monitoring and continuous improvement
- Logical Access: System access controls and user authentication
- Physical Security: Facility and equipment protection
- Change Management: System changes are authorized, tested, and properly documented
SOC 2 report available for qualified customers
We're happy to provide our SOC 2 Type II report to enterprise customers and partners. Contact our sales team to request our certification documentation.
Request SOC 2 Report