Closing enterprise customers?
It鈥檚 time for SOC 2.

漏聽Indent Inc聽路聽Terms聽路聽Privacy

Why Indent?

Avoid Wasted Time 鈫
Instead of combing through CSVs manually, connect services to Indent and let us take it from here.
Reliable & Secure 鈫
Built to be the easiest way to figure out who accessed what, with enterprise security behind the scenes.
Pay-as-you-go Pricing 鈫
We designed our pricing to scale with the complexity of your business and value you get out of Indent.

What is SOC 2?

SOC 2 defines criteria for managing customer data based on five 鈥渢rust service principles鈥濃攕ecurity, availability, processing integrity, confidentiality and privacy.
It was developed by the American Institute of CPAs also known as the AICPA.

Read the PDF

What do I need to know to be compliant?

CC 6.2 路 Auto-Revoke Credentials
Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity. For those users whose access is administered by the entity, user system credentials are removed when user access is no longer authorized.
CC 6.3 路 Provide Least Privilege
CC 7.2 路 Monitor for anomalous activity
What鈥檚 SOC 2 Type 1 vs Type 2?

Try Indent for free.

漏聽Indent Inc聽路聽Terms聽路聽Privacy