COMPANY · TRUST & COMPLIANCE
SOC 2
Independent assurance for security controls, operational governance, and tenant isolation integrity.
SOC 2 snapshot
SOC 2 is an independent attestation report — not a certification. Full scope and control details are contained within the report.
Control coverage at TraceFlux
Access Control
- • Role-based access control (RBAC)
- • Least-privilege enforcement
- • Approval gates for sensitive automation
- • Identity attribution in audit ledger
Change Management
- • Replay validation before promotion
- • Policy eligibility checks
- • Execution scope enforcement
- • Regression detection workflows
Logging & Monitoring
- • Immutable audit ledger
- • Execution trace logging
- • Operational monitoring & alerting
Data Protection & Isolation
- • Tenant-level data partitioning
- • Encryption in transit
- • Logical processing boundaries
- • No cross-tenant inference mixing
In-scope services
- • TraceFlux web control plane
- • API authentication & authorization layer
- • Telemetry ingestion & processing pipeline
- • Governance enforcement engine
- • Immutable audit logging services
Detailed scoping boundaries are documented within the official SOC 2 report.
Shared responsibility
TraceFlux maintains controls for platform infrastructure, governance enforcement, tenant segregation, and audit logging. Customers remain responsible for identity configuration, endpoint security, and operational policies within their environments.
Report access
The SOC 2 report is available to customers and prospective customers upon request. Access may require a signed NDA and verification of business identity.
Operational assurance by design
Governance enforcement, tenant isolation, and replay validation ensure security controls are continuously evaluated and auditable.
