Trust Center

SOC 2 readiness, with the receipts.

The full control map is in docs/SOC2-READINESS.md (shared under NDA on request). This is the customer-facing summary: every Trust Services Criterion, its current implementation, and where the gaps are.

Last updated 2026-05-10
§01 · Audit timeline

Type 1 by 2026-Q4. Type 2 fieldwork begins 2027-Q2.

SOC 2 Type 1 attestation — target 2026-Q4.

In progress

Auditor scoping call targeted for 2026-06-15. Type 1 audit asserts that every control is designed correctly at a point in time. Type 2 (12 months of operational evidence) follows after Type 1 has been live for ≥6 months.

Continuous monitoring tooling — Vanta or Drata adoption in 2026-Q3.

In progress

Continuous evidence collection means the auditor walks in to a year of clean records instead of a one-week scramble. Cost is line-itemed in the 2026 ops budget.

Annual penetration test commitment.

Planned

Standard SOC 2 expectation. First test commissioned in advance of the Type 2 window opening.

§02 · Trust Services Criteria — scope

What we're being audited on.

Common Criteria + Security + Availability + Confidentiality.

Live

The four criteria categories that map to a SaaS handling pre-RFP intelligence and marketplace transactions.

Processing Integrity (deferred).

Planned

Re-evaluated when customers begin using Bridger as the system of record for their proposal output. Not yet.

Privacy (deferred).

Planned

GDPR / CCPA posture is covered separately under /legal/privacy. Privacy as a SOC 2 criterion adds redundant overhead for v1.

§03 · Common Criteria

Where we are today.

CC1 — Control Environment.

Live

Org structure documented; advisory board with CISO-track advisor confirming 2026-Q3. Quarterly access review cadence formalized.

CC2 — Communication & Information.

Live

Sentry + Vercel + Postgres telemetry into operator inbox; customer-facing channels (info@, security@, legal@) live.

CC4 — Monitoring Activities.

Live

Continuous observability via Sentry, Vercel function logs, and the AuditLog table. Vanta/Drata adoption adds the continuous-evidence layer.

CC6 — Logical & Physical Access Controls.

Live

NextAuth + bcrypt(12), separate JWT subsystems for admin / provider / lobbyist, multi-tenant orgId scoping, TLS 1.3 + AES-256 at rest. Vercel + Neon physical security under their SOC 2 Type 2 attestations.

Full security posture

CC8 — Change Management.

Live

Every change flows through GitHub PR → CI must pass (build, lint, typecheck, CodeQL, Gitleaks) → squash-merge to main → Vercel auto-deploy. Branch protection enforces no direct pushes to main. Rollback is one Vercel-dashboard click.

CC7 — System Operations.

In progress

Detection (CC7.1), vulnerability monitoring (CC7.2), and recovery (CC7.5) live today. Formal incident response plan (CC7.3 + CC7.4) shipped in docs/INCIDENT-RESPONSE.md; quarterly drill cadence begins 2026-Q3.

§04 · Availability

RTO 1h. RPO 5min. 99.9% monthly target.

Backup & recovery — Neon PITR continuous WAL.

Live

7-day point-in-time recovery on the current plan; 30-day on Scale. We can restore the entire database to any moment in the retention window into a fresh project in under 1 hour.

Public 99.9% uptime SLA.

Live

Measured from the /api/health endpoint, excluding scheduled maintenance windows announced ≥48h in advance. No exclusions for cloud-vendor outages.

Quarterly DR drill cadence.

In progress

Restore-from-PITR drill into a fresh Vercel project, end-to-end. Time-to-recovery captured in docs/incident-drills/. First drill before SOC 2 audit.

Status page on its own subdomain.

Planned

status.bridger.levenhall.com via Better Stack or UptimeRobot. Independent of the platform, so customers can check status even during an outage. Targeted 2026-Q3.

§05 · Confidentiality

Customer data classification + encryption + scoping.

Three-tier data classification at the org level.

Live

fci (default, FAR 52.204-21), cui (NIST 800-171, blocks third-party LLM endpoints), itar_restricted (same LLM block + admin-side audit flagging). Tier set at onboarding, gates every LLM-backed endpoint.

TLS 1.3 in transit, AES-256 at rest.

Live

Postgres encrypted at rest by Neon; Vercel Blob encrypted at rest by Vercel. TLS 1.0 / 1.1 / 1.2 disabled at the edge.

Multi-tenant isolation enforced server-side.

Live

Every contractor query filters by session.user.orgId. There is no path through the contractor surface that reads or mutates another org’s data. Provider and lobbyist routes are similarly scoped to the row identified by their JWT.

Customer-driven deletion in 30 days.

Live

Soft-delete is immediate (account locked, listings hidden). Hard-delete via cron after a 30-day grace window so the customer can cancel by replying to the confirmation email. Backup data follows the same retention window.

Privacy policy

Anthropic Zero Data Retention agreement for the CUI tier.

In progress

Until the ZDR agreement is on file, customers on the cui / itar_restricted tier have all third-party LLM calls blocked server-side. The block is enforced on every gated endpoint regardless of caller.

§06 · What customers can do today

Don't wait for the attestation report.

Pre-answered security questionnaire.

Live

docs/SECURITY-QUESTIONNAIRE.md covers the standard CAIQ / SIG-Lite categories with explicit answers. Email security@levenhall.com to request a copy on company letterhead — we return signed responses within 1 business day.

Sub-processors list, public.

Live

Every third party that touches your data, with their compliance posture. Customers are notified by email 30 days before any new sub-processor is added.

Sub-processors

Custom DPA for Enterprise.

Live

Standard DPA available on request from legal@levenhall.com. Custom DPAs negotiable for Enterprise customers with their own paper.

Public incident log + postmortem cadence.

Live

Every SEV1 / SEV2 incident posted with a blameless postmortem within 7 days. Zero incidents to date.

Incident log