dotCMS Maintains Effective Security Controls According to SOC 2 Report

dotCMS announced that the company has, again, successfully undergone a System and Organization Controls 2 Type II examination (SOC 2 Type II) resulting in a CPA’s report stating that management of dotCMS maintained effective controls over the security, availability, and confidentiality of its dotCMS Cloud system.

dotCMS announced that the company has, again, successfully undergone a System and Organization Controls 2 Type II examination (SOC 2 Type II) resulting in a CPA’s report stating that management of dotCMS maintained effective controls over the security, availability, and confidentiality of its dotCMS Cloud system. This report comes with no exceptions, meaning dotCMS underwent a full year without making a single security error or breaking security policies. The engagement was performed by BARR Advisory, P.A.

A SOC 2 report is an internal control report on the services provided by a service organization to its customers and provides valuable information that existing and potential customers of the service organization need to assess and address the risks associated with the outsourced service. Unlike a SOC 2 Type I report, which only assesses a single point in time, a SOC 2 Type II report is more comprehensive, as it measures how effective security controls are over multiple months of standard operation.

Marketing Technology News: Konica Minolta Wins Two Marketing Awards

“This report reflects the hard work that our engineering and administrative team have put in each year to maintain the appropriate controls and effectively mitigate risk,” said Will Ezell, Chief Technology Officer of dotCMS. “We are proud to have passed this year’s evaluation with zero exceptions, and we plan to continue this level of success each year.”

The following principles and related criteria have been developed by the American Institute of CPAs (AICPA) for use by practitioners in the performance of trust services engagements:

Security: The system is protected against unauthorized access (both physical and logical).
Availability: The system is available for operation and use as committed or agreed.
Confidentiality: Information designated as confidential is protected as committed or agreed.

Marketing Technology News: MarTech Interview with Ivan Ostojic, Chief Business Officer at Infobip

Brought to you by
For Sales, write to: contact@martechseries.com
Copyright © 2024 MarTech Series. All Rights Reserved.Privacy Policy
To repurpose or use any of the content or material on this and our sister sites, explicit written permission needs to be sought.