Compliance
Keva's SOC 2 Type II compliance program and security certifications
Keva maintains SOC 2 Type II compliance to ensure enterprise-grade security for your support operations. Our compliance program covers security, availability, and confidentiality.
SOC 2 Type II Overview
What is SOC 2?
SOC 2 (Service Organization Control 2) is a security framework developed by the AICPA. It evaluates:
- Security - Protection against unauthorized access
- Availability - System operational availability
- Confidentiality - Protection of confidential information
- Processing Integrity - System processing is complete and accurate
- Privacy - Personal information handling
Type I vs Type II
| Type | Coverage | Duration |
|---|---|---|
| Type I | Controls designed | Point in time |
| Type II | Controls operating effectively | 6+ months |
Keva pursues Type II certification for ongoing operational evidence.
Current Compliance Status
Readiness: ~85%
Keva has implemented comprehensive security controls and is collecting evidence for formal SOC 2 Type II certification.
Completed Phases
| Phase | Status | Description |
|---|---|---|
| Phase 1: Documentation | Complete | Security policies and procedures |
| Phase 2: Technical Controls | Complete | Infrastructure implementation |
| Phase 3: Evidence Collection | In Progress | Automated evidence gathering |
| Phase 4: Formal Audit | Planned | Third-party certification |
Trust Services Criteria
CC1: Control Environment
| Control | Implementation |
|---|---|
| Organizational structure | Defined roles and responsibilities |
| Security policies | 7 documented security policies |
| Risk assessment | Annual security reviews |
CC2: Communication & Information
| Control | Implementation |
|---|---|
| Security awareness | Onboarding and training |
| Incident communication | Slack alerts, email notifications |
| Change communication | Release notes, status page |
CC3: Risk Assessment
| Control | Implementation |
|---|---|
| Risk identification | Quarterly risk assessments |
| Vulnerability management | Weekly dependency updates |
| Penetration testing | Annual third-party tests |
CC5: Control Activities
| Control | Implementation |
|---|---|
| Access provisioning | RBAC with 40+ permissions |
| Change management | Git-based with code review |
| Logical access | Clerk authentication with MFA |
CC6: Logical and Physical Access
| Control | Implementation |
|---|---|
| Authentication | MFA-enabled, session management |
| Authorization | Role-based access control |
| Encryption | AES-256-GCM for data at rest |
| Key management | Rotation support, secure storage |
| Credential management | Encrypted, access-logged |
CC7: System Operations
| Control | Implementation |
|---|---|
| Monitoring | 5-minute health checks |
| Incident detection | Real-time alerting |
| Audit logging | Comprehensive event tracking |
| Backup and recovery | Automated daily backups |
CC8: Change Management
| Control | Implementation |
|---|---|
| Change approval | PR review requirements |
| Testing | Automated CI/CD pipeline |
| Deployment | Zero-downtime deployments |
CC9: Risk Mitigation
| Control | Implementation |
|---|---|
| Business continuity | Multi-region infrastructure |
| Vendor management | Third-party security reviews |
| Insurance | Cyber liability coverage |
Evidence Collection
Automated Evidence
Keva automatically collects:
- Audit log archives (daily)
- System health metrics (5-minute intervals)
- Access review reports (quarterly)
- Security alert logs (continuous)
Evidence Types
| Evidence | Frequency | Retention |
|---|---|---|
| Audit logs | Daily archive | 7 years |
| Health checks | Every 5 minutes | 90 days |
| Access reviews | Quarterly | 7 years |
| Incident reports | As needed | 7 years |
Evidence Dashboard
Access compliance evidence at Settings > Security > Compliance:
- Compliance readiness score
- Control status breakdown
- Evidence generation
- Audit report downloads
Security Policies
Documented Policies
Keva maintains these security policies:
- Information Security Policy - Overall security framework
- Access Control Policy - User provisioning and access
- Data Classification Policy - Data handling procedures
- Incident Response Policy - Security incident procedures
- Business Continuity Policy - Disaster recovery plans
- Vendor Management Policy - Third-party security
- Acceptable Use Policy - System usage guidelines
Policy Access
Request policy documents from your account manager or contact compliance@keva.support.
Quarterly Access Reviews
Review Process
Every quarter (January, April, July, October):
- System generates access report
- Lists all users and permissions
- Flags dormant accounts
- Requires manager review
- Documented for compliance
Review Actions
During access review:
- Remove inactive users
- Verify role assignments
- Update permissions as needed
- Document justifications
Security Questionnaires
Standard Responses
Keva provides pre-completed questionnaires:
- CAIQ (Consensus Assessment Initiative)
- SIG (Standardized Information Gathering)
- VSA (Vendor Security Alliance)
Custom Questionnaires
For custom security questionnaires:
- Contact your account manager
- Submit questionnaire
- Response within 5 business days
Certifications and Reports
Available Documents
| Document | Availability |
|---|---|
| SOC 2 Type II Report | Upon request (under NDA) |
| Penetration Test Summary | Upon request |
| Security Whitepaper | Public |
| Insurance Certificate | Upon request |
Requesting Documents
Contact compliance@keva.support with:
- Company name
- Document requested
- NDA status (if applicable)
Infrastructure Security
Cloud Security
- Provider: Google Cloud Platform
- Certifications: SOC 2, ISO 27001, FedRAMP
- Data residency: US regions
- Encryption: At rest and in transit
Network Security
- DDoS protection
- WAF (Web Application Firewall)
- Rate limiting
- SSRF protection
Application Security
- Regular security updates
- Dependency vulnerability scanning
- Secure coding practices
- Code review requirements
Contact
For compliance inquiries:
- Email: compliance@keva.support
- Security issues: security@keva.support