SOC 2 Compliance Progress

28%

SOC 2 Compliance Checklist

Target: January 2026 Last Updated: November 29, 2025 Status: In Progress

Section 1: Security (CC Series - Common Criteria)

1.1 Control Environment

Evidence Required:

1.2 Communication and Information

Evidence Required:

1.3 Risk Assessment

Evidence Required:

1.4 Monitoring Activities

Evidence Required:

1.5 Control Activities

Evidence Required:

Section 2: Logical and Physical Access Controls

2.1 Logical Access

Evidence Required:

2.2 Physical Access

Evidence Required:

Section 3: System Operations

3.1 Infrastructure Security

Evidence Required:

3.2 Vulnerability Management

Evidence Required:

3.3 Security Incident Response

Evidence Required:

Section 4: Change Management

4.1 Development Practices

Evidence Required:

4.2 Change Control

Evidence Required:

Section 5: Risk Mitigation

5.1 Business Continuity

Evidence Required:

5.2 Vendor Management

Evidence Required:

Section 6: Availability (A Series)

6.1 System Availability

Evidence Required:

6.2 Incident Management

Evidence Required:

Section 7: Processing Integrity (PI Series)

7.1 Data Processing

Evidence Required:

7.2 Quality Assurance

Evidence Required:

Section 8: Confidentiality (C Series)

8.1 Data Classification

Evidence Required:

8.2 Data Protection

Evidence Required:

8.3 Data Retention

Evidence Required:

Section 9: Privacy (P Series)

9.1 Privacy Notice

Evidence Required:

9.2 Data Subject Rights

Evidence Required:

9.3 Privacy by Design

Evidence Required:

Section 10: Policies & Procedures Status

10.1 Required Policies

10.2 Required Procedures

Section 11: Technical Controls

11.1 Application Security

11.2 Infrastructure Security

11.3 Monitoring & Logging

Section 12: Audit Preparation Timeline

Month 1 (December 2025)

Week 1-2:

Week 3-4:

Month 2 (January 2026)

Week 1-2:

Week 3-4:

Next Priority Items

  1. Implement MFA for user accounts
  2. Set up server-side logging (SIEM)
  3. Schedule penetration test
  4. Complete audit preparation timeline tasks
  5. Conduct backup recovery testing
  6. Implement container scanning

Information Security Policy

ID: ISP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This Information Security Policy establishes the framework for protecting Rial Labs' information assets, systems, and data. It defines the security principles, responsibilities, and requirements that govern how we manage and protect sensitive information.

2. Scope

This policy applies to:

  • All employees, contractors, and third parties with access to Rial Labs systems
  • All information systems, applications, and infrastructure
  • All data processed, stored, or transmitted by Rial Labs

3. Information Security Principles

3.1 Confidentiality

Information shall be accessible only to those authorized to have access.

3.2 Integrity

Information shall be accurate and complete, and processing methods shall be valid.

3.3 Availability

Information and associated systems shall be accessible when needed by authorized users.

4. Data Classification

ClassificationDescriptionExamples
RestrictedHighly sensitive dataCustomer PII, payment data, credentials
ConfidentialSensitive business infoSource code, business plans
InternalInternal use onlyPolicies, procedures
PublicPublic release approvedMarketing materials

5. Security Controls

  • Access granted based on least privilege principle
  • MFA required for sensitive systems
  • Data encrypted at rest (AES-256) and in transit (TLS 1.2+)
  • Backups performed daily and tested monthly
  • All endpoints have anti-malware protection

6. Compliance

This policy supports compliance with SOC 2 Type II, GDPR, and CCPA requirements.

Acceptable Use Policy

ID: AUP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This policy defines the acceptable use of Rial Labs' IT resources and protects employees and the company from risks associated with inappropriate use.

2. Acceptable Use

  • Conducting authorized business activities
  • Professional development and training
  • Limited personal use that doesn't interfere with work

3. Prohibited Use

  • Attempting to bypass security controls
  • Sharing credentials or access tokens
  • Installing unauthorized software
  • Accessing inappropriate content
  • Any activity that violates law

4. Password Requirements

  • Minimum 12 characters
  • Enable MFA where available
  • Never share credentials
  • Change passwords if compromise suspected

5. Monitoring

Rial Labs reserves the right to monitor all use of IT resources. Users should have no expectation of privacy when using company resources.

Access Control Policy

ID: ACP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This policy establishes requirements for controlling access to systems, applications, and data based on business need and least privilege.

2. Access Control Principles

  • Least Privilege: Users receive only minimum access necessary
  • Separation of Duties: Critical functions divided among multiple individuals
  • Need-to-Know: Access limited to those who require it

3. Authentication Requirements

RequirementStandard UsersPrivileged Users
Min Password Length12 characters16 characters
Max Password Age90 days60 days
Lockout Threshold5 attempts3 attempts

4. MFA Requirements

MFA is required for: privileged access, remote access, production systems, restricted data, cloud consoles, and code repositories.

5. Access Reviews

  • User access reviewed quarterly
  • Privileged access reviewed monthly
  • Third-party access reviewed quarterly

Incident Response Policy

ID: IRP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This policy establishes procedures for detecting, responding to, and recovering from security incidents.

2. Severity Levels

SeverityResponse TimeExamples
P1 - Critical15 minutesRansomware, data breach, production down
P2 - High1 hourCompromised credentials, phishing
P3 - Medium4 hoursMalware contained, failed intrusion
P4 - Low24 hoursPolicy violation, suspicious activity

3. Response Phases

  1. Detection: Identify and validate the incident
  2. Containment: Limit scope and preserve evidence
  3. Eradication: Remove the threat
  4. Recovery: Restore systems to normal
  5. Post-Incident: Document lessons learned

4. Contact

Report incidents to: security@riallabs.com

Data Retention Policy

ID: DRP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This policy defines how long different types of data are retained and when they must be securely disposed.

2. Retention Periods

Data TypeRetention Period
Customer account dataDuration of relationship + 7 years
Transaction records7 years
Security logs1 year
Employee recordsDuration + 7 years
ContractsDuration + 10 years

3. Data Disposal

  • Electronic data: Secure erasure or cryptographic destruction
  • Physical media: Shredding or certified destruction
  • Cloud data: Verified deletion from all backups

Privacy Policy

ID: PP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Public

1. Information We Collect

  • Account information (name, email, phone)
  • Photos and images uploaded to TrueShot
  • Usage data and analytics
  • Device and technical information

2. How We Use Information

  • Provide and improve our services
  • Process photo verification requests
  • Communicate about services
  • Ensure security and prevent fraud

3. Your Rights (GDPR/CCPA)

  • Access your personal data
  • Request correction or deletion
  • Data portability
  • Opt-out of certain processing

4. Contact

Privacy inquiries: privacy@riallabs.com

Business Continuity Policy

ID: BCP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This policy ensures Rial Labs can continue critical operations during and after a disruptive event.

2. Recovery Objectives

SystemRTORPO
TrueShot Platform4 hours1 hour
Customer Database4 hours1 hour
Corporate Systems24 hours24 hours

3. Backup Strategy

  • Daily automated backups
  • Geographic redundancy
  • Monthly restoration testing
  • Encrypted backup storage

4. Testing

BCP is tested annually with tabletop exercises and technical recovery drills.

Change Management Policy

ID: CMP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This policy establishes a structured approach for managing changes to systems and infrastructure.

2. Change Types

TypeApprovalLead Time
StandardPre-approvedNone
NormalChange Manager3 days
MajorCAB5 days
EmergencyEmergency approvalImmediate

3. Change Request Requirements

  • Description and justification
  • Risk assessment
  • Implementation and rollback plans
  • Testing plan

4. Code Review

All code changes require peer review, passing tests, and security scan before deployment.

Vendor Management Policy

ID: VMP-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This policy establishes requirements for selecting, assessing, and managing third-party vendors.

2. Vendor Classification

TierCriteriaAssessment
CriticalAccess to restricted dataFull assessment, annual review
HighAccess to confidential dataStandard assessment, annual review
MediumInternal data accessBasic assessment, biennial review
LowNo data accessMinimal assessment

3. Security Requirements

  • Data encryption in transit and at rest
  • Access controls and authentication
  • Incident response capabilities
  • SOC 2 certification (for critical vendors)

Vulnerability Management Procedure

ID: VMP-002 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Purpose

This procedure establishes the process for identifying, assessing, and remediating security vulnerabilities.

2. Severity & SLAs

SeverityCVSS ScoreRemediation SLA
Critical9.0 - 10.072 hours
High7.0 - 8.97 days
Medium4.0 - 6.930 days
Low0.1 - 3.990 days

3. Scanning Schedule

  • Infrastructure scan: Weekly
  • Dependency scan: Per commit
  • Container scan: Per build
  • Penetration test: Annually

Risk Assessment

ID: RA-001 Version: 1.0 Assessment Date: Nov 29, 2025 Classification: Confidential

Key Findings Summary

Risk LevelCountRequiring Action
Critical00
High33
Medium80
Low120

Top Risks Identified

  1. Lack of MFA on all accounts - High (Score: 16)
  2. Limited server-side logging - High (Score: 16)
  3. No formal penetration testing - High (Score: 12)

Immediate Actions (30 days)

  • Implement MFA for all accounts - Target: Jan 15, 2026
  • Deploy comprehensive logging - Target: Jan 31, 2026
  • Schedule penetration test - Target: Jan 15, 2026

Employee Security Handbook

ID: ESH-001 Version: 1.0 Effective: Dec 1, 2025 Classification: Internal

1. Password Security

  • Use strong, unique passwords (12+ characters)
  • Enable MFA on all accounts
  • Use a password manager
  • Never share or write down passwords

2. Phishing Awareness

  • Verify sender email addresses
  • Hover over links before clicking
  • Be suspicious of urgent requests
  • Report suspicious emails to security@riallabs.com

3. Device Security

  • Keep software updated
  • Enable full disk encryption
  • Lock screen when away
  • Report lost/stolen devices immediately

4. Data Handling

  • Classify data appropriately
  • Encrypt sensitive files
  • Use approved cloud services only
  • Securely delete when no longer needed

5. Incident Reporting

Report any security concerns immediately to security@riallabs.com or via Slack #security-incidents