Closing enterprise customers?
It’s time for SOC 2.

© Indent Inc · Terms · Privacy

Why Indent?

updated
Avoid Wasted Time →
Instead of combing through CSVs manually, connect services to Indent and let us take it from here.
lock
Reliable & Secure →
Built to be the easiest way to figure out who accessed what, with enterprise security behind the scenes.
credit-card
Pay-as-you-go Pricing →
We designed our pricing to scale with the complexity of your business and value you get out of Indent.

What is SOC 2?

SOC 2 defines criteria for managing customer data based on five “trust service principles”—security, availability, processing integrity, confidentiality and privacy.
It was developed by the American Institute of CPAs also known as the AICPA.

Read the PDF

What do I need to know to be compliant?

CC 6.2 · Auto-Revoke Credentials
Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity. For those users whose access is administered by the entity, user system credentials are removed when user access is no longer authorized.
CC 6.3 · Provide Least Privilege
CC 7.2 · Monitor for anomalous activity
What’s SOC 2 Type 1 vs Type 2?

Try Indent for free.