Open Nav
Sign Up

 Sharing the SOC2 Audit Journey at AI21 Labs

Sharing the SOC2 Audit Journey

Alex Feldberg

June 19, 2023

At OP Innovate, we offer a range of services to our customers, including Pen Testing as a service (PTaaS) and Incident response. Another service we provide is CISO as a Service. In this regard, I would like to share my recent involvement in a successful SOC 2 audit process with our valued customer, AI21 Labs.

I am proud to have been part of yet another successful SOC 2 audit process. reinforcing our commitment to data security and privacy. As a Chief Information Security Officer (CISO), I wanted to take a moment to share the main topics, experiences, and recommendations from this significant milestone.

SOC2 Audit Scope and Objectives

The SOC2 audit was designed to evaluate the effectiveness of internal controls and processes concerning security, availability, processing integrity, confidentiality, and privacy. The SOC2’s primary objective was to meet the organization’s business goals. The scope was defined early on to ensure that all relevant systems and services were included.

Documentation and Policies

Robust documentation and policies are essential for a smooth audit. We invested significant effort in developing comprehensive policies, procedures, and controls aligned with SOC2 requirements. This not only facilitated the audit process but also laid the foundation for a strong security culture. One of the greatest challenges of CISOs is making sure that policies and procedures align with the daily operations of the organization – Getting key stakeholders involved in the implementation of policies and procedures is an essential component of a successful audit.

Internal Readiness

Preparation is key to a successful SOC2 audit. We conducted thorough internal assessments, identifying gaps and taking corrective actions in advance. Regular internal audits helped us maintain a high level of compliance readiness throughout the journey.

Collaboration and Communication

Our audit process involved close collaboration between various teams, including IT, HR, Legal, and Operations. Effective communication channels and regular updates ensured everyone was aligned with the audit objectives, promoting a culture of accountability and teamwork. It is important to establish a point of contact between the company’s different teams, who will act as the de facto project manager.

Continuous Improvement

Completing the SOC2 audit is just the beginning. To uphold our commitment to data security, we must maintain an ongoing focus on continuous improvement. Moving forward, I recommend the following:

  • Regular Assessments: Conduct periodic assessments to evaluate the effectiveness of our controls and identify areas for enhancement.
  • Penetration Testing: Conducting regular penetration testing is an essential part of a comprehensive cybersecurity strategy. It involves simulating real-world attacks to identify vulnerabilities and weaknesses in an organization’s systems, networks, or applications. By proactively identifying and addressing these vulnerabilities, organizations can improve their overall security posture
  • Training and Awareness: Invest in comprehensive training programs to ensure all employees understand their roles and responsibilities in maintaining SOC2 compliance.
  • Risk Management: Enhance our risk management practices to proactively identify and mitigate potential security risks, aligning with industry best practices.
  • Third-Party Management: Strengthen our vendor management program, ensuring that our partners uphold the same high standards of security and compliance.

Completing the SOC2 audit reinforces AI21 Labs’ commitment to data security, providing our customers with the assurance that their information is handled with the utmost care. The AI21 Labs team worked tirelessly to achieve this milestone and I would especially like to thank NISSIM MAATUK, who was responsible for all operations within the company.

Let’s now move on to the most important thing: Start a plan for continuous management that aligns SOC2 compliance measures at the next renewal.

Resources highlights

N8MARE / Ni8mare: Critical n8n Flaw Enables Unauthenticated File Access: CVE-2026-21858

On January 7, 2026, n8n disclosed a critical vulnerability tracked as CVE-2026-21858 (CVSS 10.0), dubbed “Ni8mare” (often referenced as “N8MARE”). The issue can allow an…

Read more >

cve-2026-21858

New Year Threat Brief: 6 Key Attack Paths to Watch in 2026

As we kick off the new year, it’s crucial for technology and security leaders to understand the top cyber attack paths that threaten their organizations.…

Read more >

cyber threats in 2026

MongoDB Zlib Protocol Vulnerability (MongoBleed): CVE-2025-14847

MongoDB has issued an urgent security advisory warning administrators to patch a high-severity vulnerability affecting MongoDB Server deployments. The vulnerability, tracked as CVE-2025-14847, stems from…

Read more >

CVE-2025-14847

Critical n8n Workflow Automation RCE: CVE-2025-68613

A critical remote code execution vulnerability has been disclosed in the n8n workflow automation platform that could allow attackers to execute arbitrary code on affected…

Read more >

CVE-2025-68613

WatchGuard Firebox RCE Actively Exploited in the Wild: CVE-2025-14733

WatchGuard has disclosed a critical remote code execution (RCE) vulnerability affecting Firebox firewall appliances running the Fireware operating system. The vulnerability, tracked as CVE-2025-14733, is…

Read more >

CVE-2025-14733

SonicWall SMA 1000 Privilege Escalation: CVE-2025-40602

Threat actors are actively exploiting a privilege escalation vulnerability affecting SonicWall Secure Mobile Access (SMA) 1000 series appliances. The vulnerability, tracked as CVE-2025-40602, stems from…

Read more >

CVE-2025-40602
Under Cyber Attack?

Fill out the form and we will contact you immediately.