SOC 2 Status
VectorGap documents its security posture publicly and shares current certification progress separately.
Use the latest security documentation or contact the team for the current status and review materials.
Trust Principles
Our security program addresses all SOC 2 criteria:
**Security**
Protection against unauthorized access.
**Availability**
System uptime and performance expectations.
**Processing Integrity**
Accurate and complete data processing.
**Confidentiality**
Protection of confidential information.
**Privacy**
Personal data handling per privacy commitments.
Security Controls
Key controls in place:
- Multi-factor authentication
- Role-based access control
- Encryption (transit and at rest)
- Regular security assessments
- Incident response procedures
- Employee background checks
- Security awareness training
Compliance Documentation
Available on request:
- Security whitepaper
- Data processing agreement (DPA)
- Penetration test summary
- Infrastructure overview
- Incident response plan
Contact security@vectorgap.ai for documentation.
Enterprise Security
Enterprise plans include:
- Dedicated security review
- Custom DPA terms
- SSO/SAML integration where included
- IP allowlisting
- Audit log exports
- Dedicated compliance support
Contact sales for enterprise security requirements.