Runwork
All Features

SOC 2 Type II (Coming Soon)

Enterprise compliance built in

Built with enterprise security requirements in mind. Comprehensive audit logs, access controls, data encryption, and security practices designed to meet SOC 2 Type II standards.

Capabilities

Audit Logging

Comprehensive activity tracking for compliance requirements. Every action logged.

Access Controls

Role-based access, permission overrides, and app-level restrictions.

Data Encryption

Data encrypted at rest and in transit. Industry-standard protection.

Secure Infrastructure

Enterprise-grade security by default.

Incident Response

Documented procedures for security incidents. Ready for audits.

Use Cases

Enterprise sales Regulated industries Security-conscious customers Vendor assessments

Why It Matters

How It Works

Compliance in Runwork is built into the architecture, not bolted on afterward. From immutable audit logs to role-based access control, from data encryption to incident response procedures, every aspect of the platform is designed with enterprise security requirements in mind.

Comprehensive audit logging tracks every important action in your workspace. Who accessed what data, when permissions changed, what modifications were made. This audit trail is essential for SOC 2 Type II compliance, which requires demonstrable evidence of security controls over time. The logs are immutable and queryable, ready for auditor review.

Access controls provide the principle of least privilege. Team management includes role-based access (Owner, Admin, Editor, Viewer), user groups for bulk permissions, and fine-grained overrides for specific users or apps. You control exactly who can access what, and every access change is logged.

Data encryption protects information at rest and in transit. All data stored in Runwork is encrypted using industry-standard algorithms. All network traffic uses TLS encryption. The enterprise infrastructure includes DDoS protection, network isolation, and continuous monitoring.

Incident response procedures are documented and tested. Security incidents follow defined playbooks with clear escalation paths. Combined with automatic backups and point-in-time recovery, you can respond to and recover from security events efficiently. Regular security assessments and penetration testing maintain the platform's security posture.

Frequently Asked Questions

Is Runwork SOC 2 Type II compliant?
SOC 2 Type II compliance is coming soon. Runwork is built with SOC 2 requirements in mind from the ground up: comprehensive audit logging, role-based access controls, data encryption, and documented security procedures. The formal certification process is underway.
What security controls does Runwork provide?
Runwork includes multiple security layers: role-based access control with fine-grained permissions, immutable audit logs tracking all actions, data encryption at rest and in transit, enterprise-grade infrastructure with DDoS protection, and documented incident response procedures. These controls are built in and active by default.
How does Runwork handle data encryption?
All data stored in Runwork is encrypted at rest using industry-standard algorithms. All network traffic uses TLS encryption in transit. Encryption is automatic and always-on—no configuration required. This ensures your data is protected regardless of where it's stored or transmitted.
Can I use Runwork in regulated industries?
Runwork is designed for enterprise use in security-conscious environments. The comprehensive audit logging, access controls, and encryption meet requirements for many regulated industries. For specific compliance certifications beyond SOC 2, contact us to discuss your requirements.

Related Features

See How Teams Use SOC 2 Type II (Coming Soon)

Ready to try SOC 2 Type II (Coming Soon)?

Start vibe-coding with Runwork today.