The importance of Information Security
Information security is a reason for concern for all organizations, including those that outsource key business operations to third-party vendors (e.g., SaaS, cloud-computing providers). Rightfully so, since mishandled data—especially by application and network security providers—can leave enterprises vulnerable to attacks, such as data theft, extortion, and malware installation.
What is SOC2?
SOC2 is an auditing procedure that ensures your service providers securely manage your data to protect the interests of your organization. For security-conscious businesses, SOC 2 compliance is a minimal requirement when considering a SaaS provider.
Developed by the American Institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data based on “trust service principles like security, availability, processing integrity, confidentiality, and privacy.
The importance of SOC 2 Compliance
While SOC 2 compliance is not strictly a requirement for SaaS and cloud computing vendors, however in enterprise computing, its role in governing and securing how technologies interface with your systems cannot be overstated.
OneCloud and SOC 2
Our user administration provides granular access (read, execute, edit, create, admin). This allows users to have provisioned access to the necessary Process Chains.
For security purposes, users are automatically logged out of all sessions after a predefined time limit of inactivity.
OneCloud leverages native application security layers with support for basic, certificate and OAuth authentication.
OneCloud supports all major SSO providers with full SAML integration to allow your users to access OneCloud through your corporate Identity Management system.