Skip to content
Join the Censys Community Forum: Connect, Share, and Thrive! | Start Here
Blogs

We completed our SOC 2 evaluation!

Censys is proud to announce the successful completion of our SOC 2 Type I evaluation and certification for the Censys Search and Attack Surface Management products. This certification is the result of many hours spent across the company, defining and agreeing upon our security policies and operational procedures. From inception, the Censys team has dedicated ample resources to ensuring the secure design of our product and the diligent maintenance of our customers’ data.

SOC 2 is a certification developed by the American Institute of CPAs(AICPA) whichdefines criteria for managing customer data based on the five Trust Service Principles: security, availability, processing integrity, confidentiality, and privacy. Type I defines an organization’s systems and determines whether their operational processes will meet the relevant service principles.

“Everyone at Censys understands that our security practices correlate directly to the security of our clients’ data,” says Alex Smith, IT & Security Manager. “It shows that we are all fully devoted to our mission of helping our clients secure their attack surfaces.”

Achieving our SOC 2 Type I certification is a significant step in our commitment to securing our customers’ data. As Censys continues to grow, we will continue to go through rigorous processes to prove our data and our clients’ data is securely stored and managed. In 2022, Censys is set on achieving our SOC 2 Type 2 certification and full GDPR compliance.

Our SOC 2 Type I report is available to customers and prospects under NDA upon request. To request a copy of the report, reach out to sales@censys.io.

Interested in helping us secure the internet? Check out our career postings!

 

About the Author

Kirsten Gibson
Content Marketing Manager
Kirsten Gibson was the content marketing manager for Censys. She specializes in the unique intersection of writing, marketing, & cybersecurity.
Attack Surface Management Solutions
Learn more