Resources

What You Need to Know About SOC 2 for Cloud Security

Going through a SOC 2 audit for cloud security is a great way of evaluating your organization’s security efforts for cloud workloads.

Read more

Security Best Practices for AWS Lambda

Best Practices for AWS Lambda Security. See how Lambda functions should be secured to meet the AWS shared responsibility model and build secure serverless applications.

Read more

How Startups Can Achieve HIPAA Compliance

Learn how startups can become HIPAA compliant. Determine whether your company needs to comply and read how your teams can meet all security requirements.

Read more

How To Read A SOC 2 Report

Learn how to read a SOC 2 report, interpret findings, and how to explain reports to your clients, employees, and investors.

Read more

Getting Started with AWS Security Hub

AWS Security Hub is a AWS managed cloud service used to gather and analyze cloud security findings. Learn about best practices for getting started with AWS Security Hub.

Read more

SOC 1 vs SOC 2: What’s The Difference

Differences between SOC 1 and SOC 2 security certifications. Learn about the requirements and overall benefits of SOC 1 and SOC 2 reports. See what report is best for your organization.

Read more

SOC 2 vs ISO 27001, Which One Do You Need?

Differences between SOC 2 and ISO 27001 security certifications. Learn about the requirements and overall benefits of SOC 2 Type 1, Type 2, and ISO 27001. See which attestation is best for your organization.

Read more

Introducing Dash ComplyOps Integration With AWS Config

Dash ComplyOps has integrated AWS Config. Teams can connect AWS Config rules to Dash to build HIPAA, SOC 2, and HITRUST security controls, and manage your compliance programs in AWS.

Read more

How Startups Can Achieve SOC 2 Compliance

A SOC 2 report is an effective way to demonstrate the security posture of your startup organization to potential clients. Learn about SOC 2 certification benefits and learn about achieving compliance in 3 steps.

Read more

The HIPAA Security Rule

The HIPAA Security Rule outlines technical requirements needed in order to meet HIPAA compliance. Learn about your organization’s responsibilities and see the HIPAA Security Rule checklist.

Read more