Open Nav
Sign Up

 Sharing the SOC2 Audit Journey at AI21 Labs

Sharing the SOC2 Audit Journey

Alex Feldberg

June 19, 2023

At OP Innovate, we offer a range of services to our customers, including Pen Testing as a service (PTaaS) and Incident response. Another service we provide is CISO as a Service. In this regard, I would like to share my recent involvement in a successful SOC 2 audit process with our valued customer, AI21 Labs.

I am proud to have been part of yet another successful SOC 2 audit process. reinforcing our commitment to data security and privacy. As a Chief Information Security Officer (CISO), I wanted to take a moment to share the main topics, experiences, and recommendations from this significant milestone.

SOC2 Audit Scope and Objectives

The SOC2 audit was designed to evaluate the effectiveness of internal controls and processes concerning security, availability, processing integrity, confidentiality, and privacy. The SOC2’s primary objective was to meet the organization’s business goals. The scope was defined early on to ensure that all relevant systems and services were included.

Documentation and Policies

Robust documentation and policies are essential for a smooth audit. We invested significant effort in developing comprehensive policies, procedures, and controls aligned with SOC2 requirements. This not only facilitated the audit process but also laid the foundation for a strong security culture. One of the greatest challenges of CISOs is making sure that policies and procedures align with the daily operations of the organization – Getting key stakeholders involved in the implementation of policies and procedures is an essential component of a successful audit.

Internal Readiness

Preparation is key to a successful SOC2 audit. We conducted thorough internal assessments, identifying gaps and taking corrective actions in advance. Regular internal audits helped us maintain a high level of compliance readiness throughout the journey.

Collaboration and Communication

Our audit process involved close collaboration between various teams, including IT, HR, Legal, and Operations. Effective communication channels and regular updates ensured everyone was aligned with the audit objectives, promoting a culture of accountability and teamwork. It is important to establish a point of contact between the company’s different teams, who will act as the de facto project manager.

Continuous Improvement

Completing the SOC2 audit is just the beginning. To uphold our commitment to data security, we must maintain an ongoing focus on continuous improvement. Moving forward, I recommend the following:

  • Regular Assessments: Conduct periodic assessments to evaluate the effectiveness of our controls and identify areas for enhancement.
  • Penetration Testing: Conducting regular penetration testing is an essential part of a comprehensive cybersecurity strategy. It involves simulating real-world attacks to identify vulnerabilities and weaknesses in an organization’s systems, networks, or applications. By proactively identifying and addressing these vulnerabilities, organizations can improve their overall security posture
  • Training and Awareness: Invest in comprehensive training programs to ensure all employees understand their roles and responsibilities in maintaining SOC2 compliance.
  • Risk Management: Enhance our risk management practices to proactively identify and mitigate potential security risks, aligning with industry best practices.
  • Third-Party Management: Strengthen our vendor management program, ensuring that our partners uphold the same high standards of security and compliance.

Completing the SOC2 audit reinforces AI21 Labs’ commitment to data security, providing our customers with the assurance that their information is handled with the utmost care. The AI21 Labs team worked tirelessly to achieve this milestone and I would especially like to thank NISSIM MAATUK, who was responsible for all operations within the company.

Let’s now move on to the most important thing: Start a plan for continuous management that aligns SOC2 compliance measures at the next renewal.

Resources highlights

Docker Issues Patch for Critical Exploit in Docker Desktop: CVE-2025-9074

On August 20, 2025, Docker released an urgent patch for CVE-2025-9074, a critical Server-Side Request Forgery (SSRF) vulnerability (CVSS 9.3) affecting Docker Desktop for Windows…

Read more >

CVE-2025-9074

CVE-2025-48384: Git Submodule Path Flaw Exploited in the Wild

CVE-2025-48384 is a client-side Git vulnerability that lets a malicious repository abuse a mismatch in how Git reads vs. writes configuration values containing a trailing…

Read more >

CVE-2025-48384

CVE-2025-43300: Apple ImageIO Zero-Day Exploited in Targeted Attacks

Apple patched CVE-2025-43300, a zero-day in the ImageIO framework used system-wide to read/write many image formats. Opening or previewing a malicious image can corrupt memory…

Read more >

CVE-2025-43300

CVE-2025-57790: Commvault Path Traversal Vulnerability Leads to RCE

On August 19th, Commvault published advisory CV_2025_08_2 for a newly-discovered path traversal flaw in the Web Server component that allows remote attackers to perform unauthorized…

Read more >

CVE-2025-57790

CVE-2025-20265: Cisco Secure Firewall Management Center (FMC) RADIUS Pre-Auth RCE

A critical (CVSS 10.0)  input-handling flaw in the RADIUS authentication subsystem of Cisco Secure Firewall Management Center (FMC), tracked as CVE-2025-20265 allows unauthenticated remote code…

Read more >

CVE-2025-20265

5 Signs You’ve Outgrown Your Current Pentest Provider

As a CISO, CTO, or security leader, you understand the value of regular penetration testing. However, as your company scales and your security program matures,…

Read more >

5 signs PT provider
Under Cyber Attack?

Fill out the form and we will contact you immediately.