SOC 1 Type II
Readiness programControl mapping, evidence collection, and operating discipline are being built toward formal assessment.
Security at Ironclad
Protecting customer data should be built into the product, the infrastructure, and the way the company operates. Ironclad is building its trust program around the controls and evidence buyers expect from regulated retail software.
Public claims should track completed controls and real evidence. Formal reports and certifications are not yet published.
Control mapping, evidence collection, and operating discipline are being built toward formal assessment.
Security, availability, access, logging, and change-management controls are being designed for audit review.
Administrative and technical safeguards will be implemented where healthcare-adjacent workflows require them.
Payment architecture should keep sensitive cardholder scope narrow and provider-bound wherever possible.
Architecture, environment boundaries, access model, monitoring approach, and how trust controls are being built into the platform.
The control matrix and evidence plan guiding SOC 1, SOC 2, HIPAA, and PCI-conscious implementation work.
Access control, change management, incident response, backup and recovery, vendor review, and retention policies.
Application hosting, storage, and core infrastructure services.
Traffic filtering, delivery, and perimeter protection.
Infrastructure and application observability.