This is the second blog in our series on SOC compliance. In the first one, we answered some general questions about the process. Now it is time to discuss some of the details about making changes to Access Controls to comply with SOC. We’ll discuss policy making, implementation, monitoring, and...
Category: SOC Compliance Blogs
Anyone who has used websites that require user information has seen the sign in with Facebook or sign in with Google buttons. These are called single sign-on buttons and the provider is an Identity Provider (IDP). We’re going to give you an introduction into identity providers by answering some of...

https://youtu.be/RH9wjTRp1DY I’m Mathew Grace, managing partner at Flying Donkey IT. A client came to me recently and requested assistance with meeting SOC 2 Compliance. In case you aren’t aware of SOC 2, it stands for Service Organization Controls. Today I’m going to discuss some of the most important questions regarding...