{"id":9398,"date":"2022-08-03T04:00:00","date_gmt":"2022-08-03T10:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/soc-2-type-2-compliance\/"},"modified":"2025-03-24T13:33:02","modified_gmt":"2025-03-24T19:33:02","slug":"soc-2-typ-2-konformitat","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/","title":{"rendered":"Was ist SOC 2? Leitfaden zur SOC-2-Typ-II-Konformit\u00e4t"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"SOC team analysts monitoring code and dashboards in enterprise Security Operations Center\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/SOCII-300x182.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/SOCII-1024x621.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/SOCII-768x466.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-08-03T04:00:00-06:00\">Aug. 3, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">What is SOC 2? Guide to SOC 2 Type II Compliance<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('What%20is%20SOC%202%3F%20Guide%20to%20SOC%202%20Type%20II%20Compliance').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-2-type-2-compliance%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=What%20is%20SOC%202%3F%20Guide%20to%20SOC%202%20Type%20II%20Compliance&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-2-type-2-compliance%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-2-type-2-compliance%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsoc-2-type-2-compliance%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>This set of standards highlights security vendors that are committed to providing secure data environments.<\/p>\n\n\n\n<p>At the core of every great relationship is one thing: trust.<\/p>\n\n\n\n<p>The same goes for your security vendors.<\/p>\n\n\n\n<p>The hunt for a trustworthy vendor is easier said than done, though. There are client testimonials, peer referrals, and online reviews \u2013 but none of these highlights how trustworthy a vendor\u2019s own security is. Except for one: the SOC 2 Type II audit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is SOC 2? Guide to SOC 2 Type II Compliance&nbsp;<\/h2>\n\n\n\n<p>What\u2019s so important about SOC 2 compliance? When your organization\u2019s (and customers\u2019) data is on the line, it\u2019s important to know which vendors you can trust.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/AICPA-Logo.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is SOC 2 Type II Compliance?&nbsp;<\/h2>\n\n\n\n<p>Service Organization Control (SOC) is a set of standards to create, maintain, prove and even enhance the way a vendor manages data \u2013 both on-premises and in cloud environments.<\/p>\n\n\n\n<p>Originally established by the American Institute of Certified Public Accountants (AICPA), SOC 2 defines how organizations handle sensitive data, such as financial information and medical records. The SOC 2 Type II certification requires the vendor to undergo an independent audit by a qualified third-party auditor. The auditor then certifies that the vendor meets all applicable requirements in one or more of the following trust principles:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security<\/li>\n\n\n\n<li>Availability<\/li>\n\n\n\n<li>Processing Integrity<\/li>\n\n\n\n<li>Confidentiality<\/li>\n\n\n\n<li>Privacy<\/li>\n<\/ul>\n\n\n\n<p>It&#8217;s a costly certification for vendors to achieve but has real significance for any organization that values security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What it Takes to Become SOC 2 Compliant<\/h3>\n\n\n\n<p>To become SOC 2 Type II compliant, it takes more than just having the right technology in place \u2014 a company needs to have strict processes as well. It\u2019s an assurance that a vendor has implemented the proper controls to protect the confidentiality, availability and integrity of your data.<\/p>\n\n\n\n<p>The SOC 2 audit evaluates all aspects of service delivery. It also evaluates whether data is collected under consent and whether data is properly secured from unauthorized access and modification. This means that your data is safe with your security vendor and that they will not share it with anyone else without your consent first.<\/p>\n\n\n\n<p>A SOC 2 Type II audit is a very thorough process, one that Swimlane has completed. Here is a glimpse of what the process looks like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p dir=\"ltr\">First, a team of auditors will thoroughly review the system documentation, including policies and procedures, as well as all aspects of the service delivery model.<span style=\"font-family: -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, &quot;Helvetica Neue&quot;, Arial, &quot;Noto Sans&quot;, sans-serif, &quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, &quot;Segoe UI Symbol&quot;, &quot;Noto Color Emoji&quot;; font-size: 1rem;\"><\/span><\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Then they will conduct interviews with key personnel in the organization to verify that the processes and procedures are being followed properly.<\/p><\/li>\n\n\n\n<li><p dir=\"ltr\">Finally, they will conduct a physical on-site inspection of the facilities, examining hardware and software configuration along with all related network infrastructure<\/p><\/li>\n<\/ul>\n\n\n\n<p>The end result? A report that verifies that the vendor has implemented appropriate security measures in accordance with industry best practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Should You Care?<\/h3>\n\n\n\n<p>The reason for SOC 2 Type II compliance is simple: data breaches are becoming more common every day, costing businesses billions of dollars each year. According to IBM, the average cost of a data breach was $4.24 million in 2021 and growing. And this doesn&#8217;t&nbsp;include companies that never report their breaches.<\/p>\n\n\n\n<p>The importance of SOC 2 Type II compliance cannot be overstated. It helps you make informed decisions during vendor selection, which minimizes your risk of a third-party breach down the road. In effect, this also proves your security commitment to your customers, business partners, suppliers, investors and more.<\/p>\n\n\n\n<p>When you&#8217;re looking for a security solution (like security automation), you need one that has gone through the SOC 2 process because it shows that they&#8217;ve put measures in place to protect your data from being accessed by unauthorized individuals. This can be especially important if you&#8217;re storing any sensitive information in the cloud.<\/p>\n\n\n\n<p>Swimlane is proud to be SOC 2 Type II compliant. As Michael Lyborg, Senior Vice President of Global Security and Enterprise IT at Swimlane, explains:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cwith the ever-changing threat landscape and increase in cyberattacks on organizations, this independent audit provides our customers with third-party validation that Swimlane is an exceptional choice for businesses that require certified providers, especially following our announcement of Swimlane Turbine.\u201d<\/p>\n<\/blockquote>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d020c9c5249 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/ciso-guide-to-sec-compliance\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Juni 6, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The &#8220;Materiality&#8221; Mystery: A CISO&#8217;s Guide to SEC Compliance<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d020c9c6de0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/what-is-a-security-operations-center-soc\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Dez. 14, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What is a Security Operations Center (SOC)? SOC Guide<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d020c9c808f bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/compliance-automation\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jan. 28, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How Compliance Automation Enhances Data Security<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Diese Normenreihe hebt Sicherheitsanbieter hervor, die sich der Bereitstellung sicherer Datenumgebungen verschrieben haben.<\/p>","protected":false},"author":5,"featured_media":9399,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9398","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is SOC 2? Guide to SOC 2 Type II Compliance<\/title>\n<meta name=\"description\" content=\"Trust is essential, even with security vendors. Learn how SOC 2 Type II compliance upholds high industry standards to build that trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/soc-2-typ-2-konformitat\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is SOC 2? Guide to SOC 2 Type II Compliance\" \/>\n<meta property=\"og:description\" content=\"Trust is essential, even with security vendors. Learn how SOC 2 Type II compliance upholds high industry standards to build that trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/soc-2-typ-2-konformitat\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T19:33:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Trust is essential, even with security vendors. Learn how SOC 2 Type II compliance upholds high industry standards to build that trust.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/\",\"url\":\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/\",\"name\":\"What is SOC 2? Guide to SOC 2 Type II Compliance\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png\",\"datePublished\":\"2022-08-03T10:00:00+00:00\",\"dateModified\":\"2025-03-24T19:33:02+00:00\",\"description\":\"Trust is essential, even with security vendors. Learn how SOC 2 Type II compliance upholds high industry standards to build that trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png\",\"width\":1120,\"height\":679,\"caption\":\"SOC team analysts monitoring code and dashboards in enterprise Security Operations Center\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is SOC 2? Guide to SOC 2 Type II Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Was ist SOC 2? Leitfaden zur SOC-2-Typ-II-Konformit\u00e4t","description":"Vertrauen ist unerl\u00e4sslich, auch gegen\u00fcber Sicherheitsanbietern. Erfahren Sie, wie die SOC-2-Typ-II-Konformit\u00e4t hohe Branchenstandards gew\u00e4hrleistet und so dieses Vertrauen schafft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/soc-2-typ-2-konformitat\/","og_locale":"de_DE","og_type":"article","og_title":"What is SOC 2? Guide to SOC 2 Type II Compliance","og_description":"Trust is essential, even with security vendors. Learn how SOC 2 Type II compliance upholds high industry standards to build that trust.","og_url":"https:\/\/swimlane.com\/de\/blog\/soc-2-typ-2-konformitat\/","og_site_name":"AI Security Automation","article_modified_time":"2025-03-24T19:33:02+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Trust is essential, even with security vendors. Learn how SOC 2 Type II compliance upholds high industry standards to build that trust.","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/","url":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/","name":"Was ist SOC 2? Leitfaden zur SOC-2-Typ-II-Konformit\u00e4t","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png","datePublished":"2022-08-03T10:00:00+00:00","dateModified":"2025-03-24T19:33:02+00:00","description":"Vertrauen ist unerl\u00e4sslich, auch gegen\u00fcber Sicherheitsanbietern. Erfahren Sie, wie die SOC-2-Typ-II-Konformit\u00e4t hohe Branchenstandards gew\u00e4hrleistet und so dieses Vertrauen schafft.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SOCII.png","width":1120,"height":679,"caption":"SOC team analysts monitoring code and dashboards in enterprise Security Operations Center"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/soc-2-type-2-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"What is SOC 2? Guide to SOC 2 Type II Compliance"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9398\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/9399"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=9398"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=9398"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=9398"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=9398"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=9398"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=9398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}