The Compass:
More posts

Article
Penetration Testing: Why It’s Important + Common Types
Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.
READ MORE


Blog Post
8 min read
How do I communicate my new SOC 2® Report? SOC 2 Certified?
We highly recommend you do not use the phrase “SOC 2 Certified." Yes, you see it everywhere, and your competitors are celebrating their certificate - but don’t do it because such a thing does not exist.
READ MORE


Blog Post
6 min read
Is the auditor’s role in a SOC 2® audit just to find gaps in our system?
During the audit process, we might identify gaps or control exceptions, but our role encompasses much more than that.
READ MORE
