← Home

SOC 2 readiness

This page is our good-faith self-attestation of controls against the SOC 2 Trust Services Criteria (TSC). We publish it not as a substitute for a formal report, but so prospective partners can see the work and call out gaps.

Status (2026-04-20): Readiness audit window opens Q3 2026. We target a SOC 2 Type II report in Q2 2027. For a signed evidentiary packet today, email security@grailguard.io — we send an NDA-gated PDF with control-by-control evidence IDs.

Legend

Live — implemented and exercised in production    Partial — implemented; operational metric or evidence not yet captured    Planned — design accepted, execution scheduled

Security (Common Criteria)

RefCriterionOur controlStatus
CC1.1Commitment to integrity & ethicsCode of conduct, acceptable-use policy, annual attestation by all staffLive
CC2.1Communicates security responsibilitiesOnboarding deck, quarterly all-hands security review, documented RACI for incident responseLive
CC3.1Risk management programRisk register reviewed quarterly with exec team; top-5 mitigations tracked against deadlinesLive
CC4.1Monitoring of controlsCentralized logging (structured JSON), Sentry for errors, cron-based SLO & webhook-lag monitorsLive
CC5.1Control activities for risk mitigationAdmin re-auth on high-risk actions, mutation-allowlist on admin APIs, audited payment mutationsLive
CC6.1Logical access — least privilegeRole-based auth (customer, courier, partner, admin), reviewed on-role-change; MFA on adminLive
CC6.2User authenticationArgon2id password hashing, HTTPS-only cookies, HttpOnly JWT, Sess-timeout & re-auth enforcementLive
CC6.3Access provisioning & removalNew-hire and off-boarding playbook; 24h deprovisioning SLA with audit trailPartial
CC6.6Protection from external threatsWAF at edge, SSL-only (HSTS preload), security headers audit, rate limits on all sensitive endpointsLive
CC6.7Transmission & disposal of sensitive dataTLS 1.3 in transit, at-rest AES-256 (Postgres + S3), card data tokenised (never touched)Live
CC6.8Malicious code protectionDependabot + weekly npm audit, Sentry alerts on new stack frames, CSP nonces on HTMLLive
CC7.1Detect & respond to threatsWebhook signature verification (timing-safe), per-route SLO alerts, webhook-lag monitor (5 min)Live
CC7.2Incident monitoringPagerDuty rotation (planned Q3 2026), structured kind:slo_alert / kind:webhook_lag linesPartial
CC7.3Incident responseDocumented runbooks for payment, partner-webhook, PII exposure incidents; post-mortem templateLive
CC7.4Learning from incidentsBlameless post-mortems within 5 business days; root-cause tracked to closed remediation ticketLive
CC7.5Vulnerability managementSecurity researcher disclosure program at /security; internal "red-team sweep" cadenceLive
CC8.1Change managementFeature-flag gated deploys, code review mandatory, automated test suite runs on every PRLive
CC9.1Business continuityPostgres PITR + daily logical backup; runbook-driven restore drill (quarterly target)Partial

Availability

RefCriterionOur controlStatus
A1.1Performance monitoringNightly SLO alert cron, Lighthouse nightly, request_log sampling for per-endpoint p95Live
A1.2Environmental protectionsRailway multi-region host; Cloudinary + S3 replicated storage; DNS failoverLive

Confidentiality

RefCriterionOur controlStatus
C1.1Identify & protect confidential informationData classification policy (public / internal / confidential / restricted); PII retention sweeperLive
C1.2Disposal of confidential informationPII retention sweeper scrubs resolved tickets & cancelled draft bookings after policy TTLLive

Privacy

RefCriterionOur controlStatus
P1.1Notice to data subjectsPublic privacy policy with DSAR & erasure instructions; cookie banner with granular consentLive
P2.1Choice & consentMarketing opt-in default off; marketing vs analytics split; DNT respectedLive
P3.1Data subject rights (GDPR Art. 15 & 17)In-app DSAR export (JSON) + erasure flow gated by re-authLive

This page reflects GrailGuard's control posture as of 2026-04-20. Certain controls are subject to change as we grow. For the signed, versioned evidentiary packet and auditor correspondence, contact security@grailguard.io.