At Actinode, we're a team of tech enthusiasts dedicated to transforming ideas into innovative solutions. With a strong foundation in technology and creativity, we bring together expertise from various domains to deliver exceptional results. Our mission is to turn your visions into reality through cutting-edge technology and a collaborative approach. Meet the passionate professionals behind Actinode – committed to driving innovation and creating impactful solutions for your business.
Transformed a scale-up marketplace's SOC 2 Type II preparation from a 10-week annual scramble into a continuous, automated evidence collection system. Cut audit preparation time by 78% and achieved a clean SOC 2 Type II report with no exceptions on the first attempt.
Transformed a scale-up marketplace's SOC 2 Type II preparation from a 10-week annual scramble into a continuous, automated evidence collection system. Cut audit preparation time by 78% and achieved a clean SOC 2 Type II report with no exceptions on the first attempt.
Compliance / Marketplace
Compliance Engineering and Audit Automation
A B2B marketplace connecting procurement teams with verified suppliers had made SOC 2 Type II a strategic priority after losing two enterprise deals where the information security questionnaire process stalled. The platform processed sensitive commercial data and handled supplier due diligence on behalf of enterprise buyers — SOC 2 was a commercial prerequisite, not just a compliance aspiration.
The Starting Point:
The platform needed a compliance posture that would:
The technical challenge was that evidence for SOC 2 controls exists across many systems — CI/CD platforms, cloud providers, identity providers, ticketing systems, SIEM — and each system stores it in different formats, retains it for different periods, and requires different access for an auditor to retrieve it.
Evidence Fragmentation:
Process Gaps:
Audit Timeline Pressure:
The client had committed to enterprise prospects that a current SOC 2 Type II report would be available by a fixed date, creating a hard deadline that constrained the build timeline.
We designed a continuous controls monitoring system in three phases:
Phase 1: Evidence Collection Infrastructure (Weeks 1-4)
- GitHub: PR merge records, branch protection configuration snapshots, required reviewer settings
- Okta: user provisioning events, MFA configuration, authentication logs, offboarding timestamps
- AWS: CloudTrail management events, Config compliance rule results, IAM policy snapshots, Security Hub findings
- Snyk: vulnerability scan results, open findings by severity, SLA breach alerts
- PagerDuty: incident records, response timelines, post-mortem links
Phase 2: Access Review Automation (Weeks 3-7)
- Automated job generates a review package per system (AWS IAM, GitHub teams, Okta groups) listing current access holders and their role/justification
- Review package sent to designated reviewer via email with a structured review form
- Reviewer attests or flags each access record — responses stored in the evidence store with reviewer identity and timestamp
- Non-response after 5 days triggers escalation; unresolved flags trigger access removal after a further 48-hour grace period
Phase 3: Continuous Compliance Monitoring and Alerting (Weeks 6-12)
Built Lambda-based collectors for GitHub, Okta, AWS (CloudTrail, Config, Security Hub), Snyk, and PagerDuty. Each collector runs on a defined schedule, pulls the relevant evidence payload, maps it to the corresponding SOC 2 control reference, and writes a structured JSON record to the immutable evidence store. Collector health monitored via CloudWatch alarms — missed collection triggers an alert before it becomes an audit gap.
Replaced informal quarterly access reviews with an automated workflow that generates review packages, routes them to designated reviewers, captures attestations, and archives the completed review record. The workflow covers 6 systems: AWS IAM, GitHub, Okta, Terraform Cloud, PagerDuty, and the application's own admin panel. Review completion rate improved from approximately 60% (estimated, informal) to 100% with documented evidence from Q3 2025 onwards.
Defined 40 AWS Config managed rules matching the platform's security baseline. Config compliance history is queryable by date — enabling point-in-time compliance posture retrieval for any date in the audit period. Terraform drift detection runs daily, ensuring that configuration departures are caught and documented rather than silently accumulating.
Connected Snyk and AWS Inspector finding webhooks to a triage workflow that auto-creates Jira issues with severity-based SLA due dates (critical: 48 hours, high: 7 days, medium: 30 days). Overdue issues escalate to PagerDuty. Monthly SLA compliance reports — percentage of findings resolved within SLA by severity — are auto-generated and stored as evidence artefacts.
Built a read-only evidence query interface allowing the external auditor to retrieve evidence for any control by date range, without requiring direct system access. Auditor could download evidence packages for sampled controls in structured format. This reduced auditor back-and-forth requests by approximately 70% compared to the prior year's manual evidence delivery process.
Provided on-call engineering support during the 4-week auditor fieldwork period. All evidence requests resolved through the portal or automated exports. No control gaps were identified for the 12-month audit period. Final report issued with no exceptions noted across all Security trust service criteria.
Continuous controls monitoring changes the economics of SOC 2 compliance. The cost of building the evidence collection infrastructure is paid back within one audit cycle through reduced preparation time and reduced auditor fees. More importantly, it shifts compliance from a periodic scramble to an always-on operational posture — one that enterprise buyers increasingly ask to verify in real time, not just annually.
Roadmap includes extending evidence collection to cover ISO 27001 controls for European market expansion, building a customer-facing trust portal with real-time security posture indicators, and implementing automated penetration test scheduling with finding-to-remediation tracking.
Let's discuss how we can help you achieve similar results for your business.