At Devramp, information security isn’t an afterthought or a checkbox It’s built into every aspect of how we design, implement, and operate our software, and how we run our company day-to-day. Protecting customer data is at the heart of everything we do.
Security touches every layer of operations: from how we handle email and devices, to how we respond to support requests, to the way we write and deploy code. As a small team with limited resources, we’ve had to be smart and resourceful in how we work. But one thing we never compromise on is security.
The SOC2 framework was created to help companies demonstrate their commitment to security and trust. A Type 1 report shows that the right controls are in place. A Type 2 report goes further: it proves that those controls have been operating effectively over time.
For us, the journey to Type 2 wasn’t about reinventing how we work, but about formalizing it: putting structure, documentation, and accountability around practices we already valued. Roughly 80% of the work was documenting and formalizing what we already did, and 20% was adding new controls. One example: the process pushed us to formally review vendor reports to ensure we’d be comfortable with what they contained. That’s the kind of rigor SOC2 forces, and we’re better for it.
This milestone was possible thanks to the expertise of three partners:
We’re grateful for their guidance and would recommend them without hesitation.
Devramp works with large and complex customer codebases. That means security isn’t optional, it’s fundamental. Our approach is to treat security as a core requirement in every piece of code, automation, and process we create.
Some of that is table stakes: defensive programming techniques, staying current with security bulletins, patching vulnerabilities quickly. But we go further in two key ways:
This philosophy keeps our attack surface low and our resilience high.
Achieving SOC2 Type 2 is an important milestone, but it’s not the finish line. Security is a continuous process, and we’ll keep strengthening our practices as we grow.
If you’d like a copy of our SOC2 report under NDA, please reach out. And if you want to follow how we think about engineering and security please subscribe to our blog.