SOC 2 Type II Compliance Centre
Pravakta.ai is independently audited and certified to the AICPA SOC 2 Type II standard across Security, Availability, and Confidentiality. This page provides an overview of our SOC 2 programme and audit results.
What Is SOC 2 Type II?
SOC 2 (Service Organisation Control 2) is a framework developed by the AICPA for evaluating a service organisation's controls relevant to Security, Availability, Processing Integrity, Confidentiality, and Privacy — known as the Trust Service Criteria (TSC).
It provides enterprise customers with independent assurance that Pravakta's security controls are not just implemented — they are proven to operate continuously.
Audit Scope & Trust Services
| Trust Service Criteria | In Scope? | Summary |
|---|---|---|
| Security (CC) | ✓ Yes | System protected against unauthorised access/damage |
| Availability (A) | ✓ Yes | System available for operation as committed |
| Confidentiality (C) | ✓ Yes | Confidential information is protected as committed |
Current audit period: 1 April 2024 – 31 March 2025. Audits are conducted annually by an AICPA-accredited CPA firm.
Our Control Environment
Built on the COSO framework, our environment includes:
- Control Environment — commitment to security as a core value.
- Risk Assessment — annual formal process with threat monitoring.
- Control Activities — specific policies and technical safeguards.
- Information & Communication — security training and incident procedures.
- Monitoring — continuous technical monitoring and annual audit.
Architecture & SOC 2 Advantage
Pravakta's SOC 2 scope is focused on its corporate systems and the Platform software supply chain — where we genuinely have control.
Security Trust Service Criteria (CC)
| Control Area | Key Controls Implemented |
|---|---|
| Access Control | MFA; RBAC; Hardware keys for privileged access; Quarterly reviews |
| Operations | IDS/IPS; SIEM monitoring; Patch management SLAs |
| Change Management | Peer code review; Automated test gates; Staging approvals |
Availability Trust Service Criteria (A)
- Capacity Management: Monthly reviews and tested autoscaling.
- Environmental Protections: Redundant corporate infra; multi-AZ deployments.
- Recovery: Documented and tested RTO/RPO; backup integrity verification.
Confidentiality Trust Service Criteria (C)
- Identification: Data classification (Public/Internal/Confidential/Restricted).
- Protection: AES-256 at rest; TLS 1.3 in transit; DLP monitoring.
- Disposal: Secure deletion (NIST 800-88 compliant).
Subservice Organisations
Uses certain providers whose controls are relevant to our scope (e.g., AWS). We monitor their compliance status annually.
Obtaining the SOC 2 Report
Continuous Compliance
We use a GRC platform for year-round compliance, automated monitoring, and annual penetration testing.
Contact & Questions
For report requests or security walkthroughs, contact security@pravakta.ai.