Resources

SOC 1 vs SOC 2: What’s The Difference

Differences between SOC 1 and SOC 2 security certifications. Learn about the requirements and overall benefits of SOC 1 and SOC 2 reports. See what report is best for your organization.

Read more

SOC 2 vs ISO 27001, Which One Do You Need?

Differences between SOC 2 and ISO 27001 security certifications. Learn about the requirements and overall benefits of SOC 2 Type 1, Type 2, and ISO 27001. See which attestation is best for your organization.

Read more

Introducing Dash ComplyOps Integration With AWS Config

Dash ComplyOps has integrated AWS Config. Teams can connect AWS Config rules to Dash to build HIPAA, SOC 2, and HITRUST security controls, and manage your compliance programs in AWS.

Read more

How Startups Can Achieve SOC 2 Compliance

A SOC 2 report is an effective way to demonstrate the security posture of your startup organization to potential clients. Learn about SOC 2 certification benefits and learn about achieving compliance in 3 steps.

Read more

The HIPAA Security Rule

The HIPAA Security Rule outlines technical requirements needed in order to meet HIPAA compliance. Learn about your organization’s responsibilities and see the HIPAA Security Rule checklist.

Read more

HIPAA Compliance Checklist

HIPAA compliance checklist for building compliant applications and cloud solutions. Learn about HIPAA compliance standards and see steps and safeguards required to become compliant.

Read more

Top 5 Options for HIPAA Compliant Cloud Storage 2020

Organizations can use cloud storage solutions for file storage, sharing, and collaboration. Learn about which cloud storage solutions can be configured in a HIPAA compliant manner

Read more

10 Common Questions Around SOC 2 Compliance

SOC 2 can be a complicated security standard to understand. Learn more about the basics of SOC 2 compliance and how teams become SOC 2 compliant. Read a general overview of SOC 2 assessment framework and frequently asked questions.

Read more

How To Select a SOC 2 Auditor

SOC 2 audits can only performed by an AICPA affiliated firm. Learn about requirements and best practices for selecting a SOC 2 Auditor, performing assessment, and receiving SOC 2 reports.

Read more

SOC 2 and The Trust Services Criteria (TSC)

SOC 2 evaluates teams based on set of controls defined in the Trust Services Criteria (TSC). Learn about the 5 categories of security controls and requirements for SOC 2 compliance.

Read more