The Kandji team is proud to announce that we have completed our SOC 2 Type 2 compliance audit. As a device management solution that helps our customers secure their Apple devices and meet compliance regulations, we have always understood that data security is paramount, and have held ourselves to a high standard. This third-party audit is a public declaration that we are committed to following best practices for keeping our customers’ data secure.
What is SOC 2 Type 2?
A Service Organization Control (SOC) 2 Type 2 is recognized as a universal standard for data security. The audit process for SOC 2 Type 2 includes third-party penetration testing and other controls to determine that Kandji’s procedures meet regulations set by the American Institute of CPAs (AICPA). The Type 2 audit ensures these controls were in place and followed for the entire audit period.
What does this mean for our customers?
Security and compliance frameworks exist because the global online ecosystem is evolving rapidly and we need consistent standards for data privacy governance and protection against cybersecurity risks. We are dedicated to following security best practices, through methods including:
- Encryption of Kandji traffic and data at rest
- Conducting third-party penetration tests
- Continuous monitoring of security threats on servers and endpoints
- Performing risk assessments and disaster recovery tests
- Strict change management processes
- Monitored and restricted employee access to production environments
What’s next?
Achieving SOC 2 Type 2 compliance is not a one-time event – we will continue to be audited for SOC 2 Type 2 annually. We look forward to continuing to demonstrate our commitment to your safety by ensuring that our procedures are held to the highest standard.