Our SOC 2 Report was generated by Moss Adams, a leading accounting and auditing firm, after conducting an in-depth review of our security, privacy, and confidentiality controls. A SOC 2 audit is a major undertaking that verifies that we meet strict security, confidentiality, and privacy standards in how we manage and protect customer data.
Assembled Inc. SOC 2 Type 2 Report 09-30-22.pdf
We regularly engage independent cybersecurity firms to perform professional penetration tests of our systems. These controlled pentests systematically uncover and allow us to promptly address any vulnerabilities prior to exploitation. For our latest Pentest, we used Doyensec which is a highly regarded security firm focused exclusively on information security.
Doyensec_Assembled_Retesting_Q42022.pdf
Our Network Diagram maps how data flows through our infrastructure under strict security controls. We leverage technologies from leading vendors to build and operate enterprise-grade, secure systems. This architecture is operated by engineers with experience running secure systems at scale.
The data flow diagram below shows how Customer Relationship Management (CRM) data flows through our systems for Assist-specific replies.
A comprehensive overview of all our security controls, procedures, and policies to give you complete transparency into how we operate securely.
1375ca13-4dad-4f92-9af0-22c9b7c19b9b_Assembled_Security_Exhibit.pdf