Skip to main content

SOC2 compliance

Overview

To get SOC2 certified and maintain your compliance, you must ensure that any system you integrate with, including feature flagging solutions, adhere to the same compliance standards. Using a homegrown or third-party feature flagging system without SOC2 compliance can compromise your certification and introduce unnecessary risks.

This guide provides an overview of how Unleash Enterprise features align with SOC2 Type II controls, helping your organization meet its compliance requirements.

How Unleash features map to SOC2 Type II controls

SOC2 Type II ControlControl DescriptionUnleash Feature
CC 2.1, CC 7.2 Log management utilizedThe company utilizes a log management tool to identify events that may have a potential impact on the company's ability to achieve its security objectives.Event log and login history provide access to all configuration change and access logs.
CC 2.2, CC 5.3 Roles and responsibilities specifiedRoles and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of information security controls are formally assigned in job descriptions and/or the Roles and Responsibilities policy.Unleash provides role-based access control.
CC 2.2 System changes communicatedThe company communicates system changes to authorized internal users.Admins in Unleash can configure banners that can display message for all users in the Unleash Admin UI.
CC 3.2, CC 7.5, CC 9.1 Continuity and disaster recovery plans testedThe company has a documented business continuity/disaster recovery (BC/DR) plan and tests it at least annually.Unleash provides a business continuity disaster recovery (BCDR) policy available to customers in the Trust Center, and annual test results upon request.
CC 3.4, CC 7.1 Configuration management system establishedThe company has a configuration management procedure in place to ensure that system configurations are deployed consistently throughout the environment.Change Requests supports 4-eyes approval workflows for changes.
CC 3.4, CC 4.1, CC 7.2, CC 8.1 Penetration testing performedThe company's penetration testing is performed at least annually. A remediation plan is developed and changes are implemented to remediate vulnerabilities in accordance with SLAs.Unleash provides annual penetration test results to customers in the Trust Center, performed by an external auditor.
CC 5.3, CC 7.1, CC 8.1 Change management procedures enforcedChange management procedures are enforced.Unleash supports defining custom roles with configurable permissions in each environment. Change Requests supports a 4-eyes approval workflow for changes.
CC 6.1, CC 8.1 Production deployment and application access restrictedThe company restricts access to migrate changes to production to authorized personnel.Unleash supports defining custom roles with configurable permissions in each environment. Change Requests supports a 4-eyes approval workflow for changes.
CC 6.1 Unique account authentication enforcedThe company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.Unleash supports both username/password authentication, as well as single sign-on. In addition, the SCIM integration facilitates user account provisioning.
CC 6.1 Password policy enforcedThe company requires passwords for in-scope system components to be configured according to the company's policy.Unleash has password strength requirements for all users using username/password authentication.
CC 6.1, CC 6.6 Remote access MFA enforcedThe company's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.You can enable MFA through your identity provider, such as Okta or Microsoft Entra ID, after implementing single sign-on.
CC 6.1, CC 6.6 Remote access encrypted and enforcedThe company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.Unleash is secured by enforcing TLS 1.2.
CC 6.7 Data transmission encryptedThe company uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.Unleash is secured by enforcing TLS 1.2.
SD SOC 2 System DescriptionThe company has completed a description of its systems for Section III of the audit report.This documentation is available in the SOC 2 report in the Trust Center. The report is performed by an external auditor and renewed annually.