Practices
The Journal & Company
Enterprise Trust

SOC 2 Certification

ARK Platforms maintains SOC 2 Type II certification demonstrating security, availability, and data protection excellence.

Enterprise Security

SOC 2 Type II Compliance

ARK Platforms has achieved and maintains SOC 2 Type II certification, an independent audit confirming our adherence to strict security, availability, processing integrity, and confidentiality standards for managing customer data.

What is SOC 2?

Understanding SOC 2 certification

SOC 2 (Service Organization Control 2) is a certification developed by the American Institute of CPAs (AICPA) that evaluates a service organization's controls related to security, availability, processing integrity, confidentiality, and privacy of customer data.

Type II Certification

Covers a minimum of 6 months of operations, testing both design and effectiveness of controls over time.

Independent Audit

Third-party auditors conduct comprehensive assessment of our security controls and practices.

Ongoing Validation

Annual re-certification ensures continued compliance and control effectiveness.

Trust Service Criteria

Five pillars of SOC 2

CC - Security

Systems are protected from unauthorized access, alteration, and destruction. This includes logical and physical controls, access management, and threat prevention.

A - Availability

Systems are available for authorized use and operate at required levels of performance. Includes disaster recovery, business continuity, and monitoring.

PI - Processing Integrity

Information is consistently and accurately processed, authorized, and completely recorded. Systems prevent data errors and corruption.

C - Confidentiality

Information designated as confidential is protected from unauthorized transmission, access, or disclosure throughout system lifecycle.

P - Privacy

Personal information is collected, retained, disclosed, and destroyed in accordance with regulatory requirements and customer agreements.

Control Domains

Key areas of assessment

  • Entity & Governance: Organizational structure and oversight
  • Communication: Internal and external communication of responsibilities
  • Risk Assessment: Identification and management of risks
  • Control Activities: Implementation of control policies and procedures
  • Information & Monitoring: System monitoring and continuous improvement
  • Logical Access: System access controls and user authentication
  • Physical Security: Facility and equipment protection
  • Change Management: System changes are authorized, tested, and properly documented
Enterprise Customers

SOC 2 report available for qualified customers

We're happy to provide our SOC 2 Type II report to enterprise customers and partners. Contact our sales team to request our certification documentation.

Request SOC 2 Report