In Sleuth’s continuing efforts to help our customers to deliver faster and safer, we have always put security as a top-level business priority. Security and privacy of our customers’ data is always in the forefront of our design, development, and deployment concerns.
We understand the level of trust our customers put in us when they connect key systems together with Sleuth. To that end, Sleuth has continued to pursue key independent third-party validations of its security, processes, and services.
We are pleased to announce the availability of our SOC 2 Type II report as of April 9, 2021, as proof of our continued commitment to openness and protecting customer data at the highest levels.
In the process of gaining our SOC2 certification we needed to provide our SOC2 auditors evidence that we were following the dev processes we’ve committed to; all changes being code reviewed, with an associated issue, peer approvals before changes are deployed, automated test suites gating each deploy and deployment verification for each change we ship.
Sleuth provides that single, rolled up, view into all of these processes and tools. Sleuth search allowed us to quickly slice and dice our past deploys to find the date or event the auditors were interested in. Once we found the deploy it was a simple mater of doing a PDF print of the Sleuth deploy timeline to provide the evidence our Auditors were looking for.