SOC 2 Type 2 - An assessment addressing a service provider's internal controls and systems related to security, availability, processing integrity, confidentiality, and privacy

Summary

SOC 2 Type 2 compliance is a widely recognized framework for managing and securing customer data, especially for service providers and technology companies. This compliance focuses on assuring that an organization's controls meet rigorous standards across five key areas known as the Trust Service Criteria: Security (protection against unauthorized access), Availability (ensuring system reliability), Processing Integrity (accuracy and completeness of processing), Confidentiality (protection of sensitive information), and Privacy (proper handling of personal data). SOC 2 Type 2 provides assurance that these controls are not only well-designed but also consistently effective over time.

Products in Scope

  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Service on AWS
  • Red Hat OpenShift API Management
  • Red Hat OpenShift Data Foundation
  • Red Hat OpenShift AI
  • Red Hat Quay
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Single Sign-On
  • Red Hat Customer Portal

Additional Resources

For information about Microsoft Azure Red Hat OpenShift (ARO), please see the Azure compliance documentation

Meta Data

Products

Red Hat OpenShift Dedicated
Red Hat OpenShift Service on AWS
Red Hat OpenShift API Management
Red Hat OpenShift Data Foundation
Red Hat OpenShift AI
Red Hat Quay
Red Hat Advanced Cluster Security for Kubernetes
Red Hat Single Sign-On
Red Hat Customer Portal

Regions

Global

Industries

Automotive
Energy
FSI
Healthcare
Public Sector
Telco

Hardware Platforms

AWS Commercial