{"id":1150,"date":"2021-11-09T17:56:09","date_gmt":"2021-11-09T17:56:09","guid":{"rendered":"http:\/\/box5442.temp.domains\/~arpioio\/?p=1074"},"modified":"2021-12-07T16:59:42","modified_gmt":"2021-12-07T16:59:42","slug":"soc-2-for-saas-the-information-security-policy","status":"publish","type":"post","link":"https:\/\/arpio.io\/staging\/8013\/soc-2-for-saas-the-information-security-policy\/","title":{"rendered":"SOC 2 for SaaS- The Information Security Policy"},"content":{"rendered":"<body>\n<p>If you haven\u2019t read <a href=\"https:\/\/arpio.io\/staging\/8013\/soc-compliance-for-saas-in-10-policies\/\">post 1<\/a> in this series, the tl;dr is that we\u2019re sharing the details of our SOC 2 compliance journey so you\u2019ll better understand what the process entails.\u00a0 We\u2019re looking at this policy-by-policy, explaining what our policy says and how we\u2019re complying with it.<\/p>\n\n\n\n<p>Let\u2019s start with the information security policy. This is the policy that our customers are most interested in when we\u2019re talking about Arpio and how we are being good stewards of their data.\u00a0<\/p>\n\n\n\n<p>Our draft policy came from Laika, but it had to be right-sized for a small SaaS business. Coming in, we felt that we were in pretty good shape and have been directionally aligned with where we should be.\u00a0 As an organization, we\u2019re lucky to have technical leadership that has dealt with compliance before.\u00a0<\/p>\n\n\n\n<p>The security policy mandates a set of security practices across our organization, both within the production environment, where our SaaS product runs, and our IT environment, consisting of our laptops and other devices.\u00a0 It\u2019s mostly about following current best practices.<\/p>\n\n\n\n<p>The\u00a0 information security policy covers things like:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use of firewalls<\/li><li>Use of\u00a0 antivirus software<\/li><li>Encryption at rest and encryption in transit for when customer data is being stored or moved<\/li><li>Minimizing access to sensitive data so that people who don\u2019t need it don\u2019t have access to that data<\/li><li>Patching systems and security update<\/li><li>Using multi factor authentication where possible<\/li><li>Process for onboarding and even more importantly, offboarding employees<\/li><li>Physical security<\/li><li>Monitoring and logging of security access related events<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>We already had most of these practices in place, and for that reason this wasn\u2019t a huge amount of work for us to implement. Companies that haven\u2019t thought through this from the beginning might find that there\u2019s a heavier lift here.<\/p>\n\n\n\n<p>We\u2019ve had encryption at rest and in transit from the very beginning.\u00a0 From a patching perspective, our production environment runs serverless so AWS handles most of it for us. We only have two people in our entire organization that have access to the production environment, so that\u2019s already as locked down as it could be. We\u2019ve used multi factor authentication everywhere from day 1. From a physical security perspective, our stuff runs in AWS so they handle physical security of the data center.\u00a0 Beyond that, we are a fully remote team and don\u2019t have an office building that we have to deal with for physical security and access to.<\/p>\n\n\n\n<p>We did need to adopt an enterprise endpoint protection solution in order to be compliant with the policy. This is similar to antivirus software, but it goes beyond monitoring for malware on your systems and makes sure that all our machines are appropriately configured. We opted for Bitdefender because we needed support for Linux, Mac, and Windows.<\/p>\n\n\n\n<p>Lastly we needed to formalize our employee onboarding and offboarding practices and checklists, which was super easy to do.<\/p>\n\n\n\n<p>So to summarize: for this part of SOC 2 we took the information security policy template and tweaked it as necessary to be what we wanted and then implemented Bitdefender as an endpoint protection solution and formalized best practices for onboarding and offboarding employees.<\/p>\n<\/body>","protected":false},"excerpt":{"rendered":"<p>If you haven\u2019t read post 1 in this series, the tl;dr is that we\u2019re sharing the details of our SOC 2 compliance journey so you\u2019ll better understand what the process&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1171,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","content-type":"","inline_featured_image":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1150","post","type-post","status-publish","format-standard","has-post-thumbnail","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SOC 2 for SaaS- The Information Security Policy - Arpio Disaster Recovery Made Easy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOC 2 for SaaS- The Information Security Policy - Arpio Disaster Recovery Made Easy\" \/>\n<meta property=\"og:description\" content=\"If you haven\u2019t read post 1 in this series, the tl;dr is that we\u2019re sharing the details of our SOC 2 compliance journey so you\u2019ll better understand what the process...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Arpio Disaster Recovery Made Easy\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-09T17:56:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-07T16:59:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arpio.io\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2520\" \/>\n\t<meta property=\"og:image:height\" content=\"1520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"6805pwpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"6805pwpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/\"},\"author\":{\"name\":\"6805pwpadmin\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095\"},\"headline\":\"SOC 2 for SaaS- The Information Security Policy\",\"datePublished\":\"2021-11-09T17:56:09+00:00\",\"dateModified\":\"2021-12-07T16:59:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/\"},\"wordCount\":552,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/\",\"url\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/\",\"name\":\"SOC 2 for SaaS- The Information Security Policy - Arpio Disaster Recovery Made Easy\",\"isPartOf\":{\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg\",\"datePublished\":\"2021-11-09T17:56:09+00:00\",\"dateModified\":\"2021-12-07T16:59:42+00:00\",\"author\":{\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095\"},\"breadcrumb\":{\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage\",\"url\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg\",\"contentUrl\":\"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg\",\"width\":960,\"height\":579},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/arpio.io\/staging\/8013\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOC 2 for SaaS- The Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#website\",\"url\":\"https:\/\/arpio.io\/staging\/8013\/\",\"name\":\"Arpio Disaster Recovery Made Easy\",\"description\":\"AWS Disaster Recovery\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/arpio.io\/staging\/8013\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095\",\"name\":\"6805pwpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g\",\"caption\":\"6805pwpadmin\"},\"sameAs\":[\"http:\/\/support.pagely.com\"],\"url\":\"https:\/\/arpio.io\/staging\/8013\/author\/6805pwpadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SOC 2 for SaaS- The Information Security Policy - Arpio Disaster Recovery Made Easy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"SOC 2 for SaaS- The Information Security Policy - Arpio Disaster Recovery Made Easy","og_description":"If you haven\u2019t read post 1 in this series, the tl;dr is that we\u2019re sharing the details of our SOC 2 compliance journey so you\u2019ll better understand what the process...","og_url":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/","og_site_name":"Arpio Disaster Recovery Made Easy","article_published_time":"2021-11-09T17:56:09+00:00","article_modified_time":"2021-12-07T16:59:42+00:00","og_image":[{"width":2520,"height":1520,"url":"https:\/\/arpio.io\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG.jpeg","type":"image\/jpeg"}],"author":"6805pwpadmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"6805pwpadmin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#article","isPartOf":{"@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/"},"author":{"name":"6805pwpadmin","@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095"},"headline":"SOC 2 for SaaS- The Information Security Policy","datePublished":"2021-11-09T17:56:09+00:00","dateModified":"2021-12-07T16:59:42+00:00","mainEntityOfPage":{"@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/"},"wordCount":552,"commentCount":0,"image":{"@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/","url":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/","name":"SOC 2 for SaaS- The Information Security Policy - Arpio Disaster Recovery Made Easy","isPartOf":{"@id":"https:\/\/arpio.io\/staging\/8013\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg","datePublished":"2021-11-09T17:56:09+00:00","dateModified":"2021-12-07T16:59:42+00:00","author":{"@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095"},"breadcrumb":{"@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#primaryimage","url":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg","contentUrl":"https:\/\/arpio.io\/staging\/8013\/wp-content\/uploads\/2021\/11\/SOC-2-FOR-SAAS-THE-INFORMATION-SECURITY-POLICY-PNG-e1659733461981.jpeg","width":960,"height":579},{"@type":"BreadcrumbList","@id":"https:\/\/arpio.io\/soc-2-for-saas-the-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arpio.io\/staging\/8013\/"},{"@type":"ListItem","position":2,"name":"SOC 2 for SaaS- The Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/arpio.io\/staging\/8013\/#website","url":"https:\/\/arpio.io\/staging\/8013\/","name":"Arpio Disaster Recovery Made Easy","description":"AWS Disaster Recovery","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arpio.io\/staging\/8013\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/0a2437a37056190db7e46201a6a65095","name":"6805pwpadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/arpio.io\/staging\/8013\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bbce7316dd4979a6199ddcdaed836e357939826f60c7be919373136535d247b6?s=96&d=mm&r=g","caption":"6805pwpadmin"},"sameAs":["http:\/\/support.pagely.com"],"url":"https:\/\/arpio.io\/staging\/8013\/author\/6805pwpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts\/1150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/comments?post=1150"}],"version-history":[{"count":1,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts\/1150\/revisions"}],"predecessor-version":[{"id":1159,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/posts\/1150\/revisions\/1159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/media\/1171"}],"wp:attachment":[{"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/media?parent=1150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/categories?post=1150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arpio.io\/staging\/8013\/wp-json\/wp\/v2\/tags?post=1150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}