Headset, Inc. SOC2 Type 1 Attestation Details

Safeguarding your data is our priority. With SOC 2 compliance deeply ingrained into our products, team, infrastructure, and processes, we leave no room for compromise when it comes to protecting your valuable information.

Risk Posture & Security Controls

Last updated Friday June 30, 2023
Subheading Right Here

To mitigate cyber security and information security risks, Headset has established the following security posture which is composed of security controls unique to Headset’s environment. This posture is aligned to common risk categories for ease of use.

Access

Last updated Friday June 30, 2023
Subheading Right Here
Firewall Rules

Firewall rulesets are configured and in place to help prevent unauthorized access threats from outside the application and infrastructure environment.

Covered Security Criteria: SOC2.CC.6.6.1,
Firewall Cloud Service

Rules are configured to apply network controls within cloud service to restrict access to sensitive data to the appropriate locations and parties.

Covered Security Criteria: SOC2.CC.6.6.1,
Multi Factor Authentication

Production systems are configured to authenticate users through multi factor authentication methods, where available.

Covered Security Criteria: SOC2.CC.6.6.3,
Logical Access

Logical Access Policy and Procedures are in place which define the authorization, modification, removal of access, role-based access, and the principle of least privilege. The policy is reviewed annually.

Covered Security Criteria: SOC2.CC.5.2.3, SOC2.CC.5.3.1, SOC2.CC.6.1.2, SOC2.CC.6.1.3, SOC2.CC.6.1.5, SOC2.CC.6.3.1,
Workstation Lockout

Internal users' screensavers are configured to lock after a specified period of time of inactivity and to require a password to unlock.

Covered Security Criteria: SOC2.CC.6.1.2,
Workstation Lockout

Internal users' screensavers are configured to lock after a specified period of time of inactivity and to require a password to unlock.

Covered Security Criteria: SOC2.CC.6.1.2,
API Access

Access to API's is authenticated and encrypted by the transport layer security (TLS) protocol over hypertext transfer protocol secure (HTTPS).

Covered Security Criteria: SOC2.CC.6.1.8, SOC2.CC.6.1.9, SOC2.CC.6.7.2,
Encrypted Server Access

Production system access is encrypted to ensure communications with servers are secured.

Covered Security Criteria: SOC2.CC.6.6.1, SOC2.CC.6.7.2,
Encryption at Rest

All data at rest is encrypted using industry standard algorithms.

Covered Security Criteria: SOC2.CC.6.1.9, SOC2.PI.2.5.1,
Separation of Duties: Developers

Access to the source code repository is restricted to authorized employees.

Covered Security Criteria: SOC2.CC.5.1.6, SOC2.CC.6.3.3,
MFA for Sensitive Access

Access to cloud administration or other critical systems is restricted to authorized users through multi factor authentication.

Covered Security Criteria: SOC2.CC.6.1.3, SOC2.CC.6.1.6,
Administrator Access

Administrator access to the application, database, network, VPN, and operating system is restricted to authorized users.

Covered Security Criteria: SOC2.CC.6.2.1, SOC2.CC.6.3.1,
System Logging Access

Access to system logs are restricted to appropriate IT personnel.

Fraud

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to fraud, specifically as it relates to the legal concept of inappropriate action that leads to financial or personal gain.

Legal

The following controls mitigate risks related to the application (or lack of application) of laws, regulations, and contractual requirements applicable to Headset. Mitigated and monitored by 2 control(s)

Production Data Restrictions

Procedures are in place to ensure that no PII (or confidential data) is used in non-production environments.

Covered Security Criteria: SOC2.CC.8.1.14, SOC2.CC.8.1.15,
Tech Competence

The new hire screening process includes a consideration of skills and competencies of the candidate. Each job candidate is interviewed by personnel within the employing department to determine if education, experience, and technical competency are appropriate for the job function. Background/reference checks are also performed prior to hire.

Covered Security Criteria: SOC2.CC.1.4.1, SOC2.CC.1.4.5, SOC2.CC.1.4.6, SOC2.CC.4.1.4,
Last updated Friday June 30, 2023
Subheading Right Here

People

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to Headset’s employees and other staff. Examples include dissatisfaction, attrition, and HR related events. Mitigated and monitored by 13 control(s)

Software Install Scan

Users are allowed to install authorized software on issued devices. Devices are scanned for malicious and suspicious applications.

Covered Security Criteria: SOC2.CC.7.1.2,
Employee Handbook

The employee handbook is in place for employees to follow and sanction procedures are to be enforced and acknowledged by all employees upon hire, and is reviewed at least annually. The employee handbook is available to employees via the human resources site.

Covered Security Criteria: SOC2.CC.1.1.2, SOC2.CC.1.1.3, SOC2.CC.1.5.1,
Code of Conduct

A code of conduct exists and is required to be signed by all employees upon hire. The code of conduct is updated by management as needed, and available to employees via the human resources site.

Covered Security Criteria: SOC2.CC.1.1.2, SOC2.CC.1.1.3,
Headcount Planning

A staffing roadmap of the expertise needed to build the product and related costs are closely managed through use of a forecast model that includes headcount; the forecast model is prepared by management and shared at every board meeting.

Covered Security Criteria: SOC2.CC.3.1.4,
Management Updates

Management presents status on corporate goals and objectives to all hands quarterly; this includes sales updates, department updates, and key operational metrics.

Covered Security Criteria: SOC2.CC.1.1.1, SOC2.CC.2.1.2, SOC2.CC.2.2.11, SOC2.CC.2.2.7, SOC2.CC.3.1.13, SOC2.CC.3.1.3,
Staffing Gaps

Management is made aware of departmental staffing needs and approves staffing requests.

Covered Security Criteria: SOC2.CC.1.4.2, SOC2.CC.1.4.4, SOC2.CC.3.1.4,
C-Level Update

The CEO presents corporate goals and objectives to all hands annually, or as business needs change; the CFO presents periodic financial updates to all hands quarterly.

Covered Security Criteria: SOC2.CC.1.1.1, SOC2.CC.2.1.2, SOC2.CC.2.2.10, SOC2.CC.2.2.7, SOC2.CC.3.1.1,
Board Independence

The Board of Directors or executive management come from diverse backgrounds and operate independently from process owners/management.

Covered Security Criteria: SOC2.CC.1.2.1, SOC2.CC.1.2.3,
Tech Competence

The new hire screening process includes a consideration of skills and competencies of the candidate. Each job candidate is interviewed by personnel within the employing department to determine if education, experience, and technical competency are appropriate for the job function. Background/reference checks are also performed prior to hire.

Covered Security Criteria: SOC2.CC.1.4.1, SOC2.CC.1.4.5, SOC2.CC.1.4.6, SOC2.CC.4.1.4,
Professional Development

Relevant professional development opportunities are approved as they are requested. Training requests are approved by management.

Covered Security Criteria: SOC2.CC.1.4.3, SOC2.CC.1.4.7,
Employee Performance

A formal performance evaluation procedure is in place and employees are evaluated at least annually.

Covered Security Criteria: SOC2.CC.1.1.3, SOC2.CC.1.1.4, SOC2.CC.1.4.2, SOC2.CC.1.5.1, SOC2.CC.1.5.5,
Internal Controls

Internal control responsibilities are assigned to control owners who are responsible for monitoring controls for deficiencies, documenting deficiencies in a corrective action plan, and communicating them to management for review.

Covered Security Criteria: SOC2.CC.1.5.1, SOC2.CC.2.2.1, SOC2.CC.2.2.5, SOC2.CC.2.3.10, SOC2.CC.4.1.3, SOC2.CC.5.1.2, SOC2.CC.5.1.5, SOC2.CC.5.3.2, SOC2.CC.5.3.3, SOC2.CC.5.3.5, SOC2.P.8.1.8,
Incident Response: Employee Responsibility

A documented incident response plan is in place to guide employees in identifying, reporting, and acting on breaches and incidents.

Covered Security Criteria: SOC2.CC.2.2.3, SOC2.CC.2.2.6, SOC2.CC.2.3.5, SOC2.CC.7.3.2, SOC2.CC.7.3.4, SOC2.CC.7.4.1, SOC2.CC.9.2.4, SOC2.P.6.3.1, SOC2.P.6.5.1, SOC2.P.8.1.6, SOC2.P.8.1.7,

Physical

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to physical access, such as doors, loading docks, copy
rooms, server rooms. This also includes any environmental risks, such as fires, floods, or earthquakes.

Policy

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to how information security is governed at Headset. This
includes policy, procedures, work instructions, and how they are communicated throughout the
organization. Mitigated and monitored by 6 control(s)

Incident Response: Employee Responsibility

A documented incident response plan is in place to guide employees in identifying, reporting, and acting on breaches and incidents.

Covered Security Criteria: SOC2.CC.2.2.3, SOC2.CC.2.2.6, SOC2.CC.2.3.5, SOC2.CC.7.3.2, SOC2.CC.7.3.4, SOC2.CC.7.4.1, SOC2.CC.9.2.4, SOC2.P.6.3.1, SOC2.P.6.5.1, SOC2.P.8.1.6, SOC2.P.8.1.7,
Incident Driven Change

Security incidents that require a change to in-scope systems follow change management procedures.

Covered Security Criteria: SOC2.CC.7.4.5, SOC2.CC.7.4.8, SOC2.CC.7.4.9, SOC2.CC.7.5.4, SOC2.CC.8.1.11,
Policy Review

IT security related policies are reviewed and approved annually or as business needs change.
Procedure documents related to access control, change management, and incident management are
updated as processes change.

Covered Security Criteria: SOC2.CC.5.3.3, SOC2.CC.5.3.6,
Internal Controls

Internal control responsibilities are assigned to control owners who are responsible for monitoring
controls for deficiencies, documenting deficiencies in a corrective action plan, and communicating
them to management for review.

Covered Security Criteria: SOC2.CC.1.5.1, SOC2.CC.2.2.1, SOC2.CC.2.2.5, SOC2.CC.2.3.10, SOC2.CC.4.1.3,
SOC2.CC.5.1.2, SOC2.CC.5.1.5, SOC2.CC.5.3.2, SOC2.CC.5.3.3, SOC2.CC.5.3.5, SOC2.P.8.1.8,
Business Continuity

A Business Continuity Plan has been developed and reviewed in the event of a catastrophic event.
The plan identifies a process, roles, and milestones for maintaining business continuity and restoring
system functionality.

Covered Security Criteria: SOC2.A.2.1.3, SOC2.A.2.2.1, SOC2.CC.3.2.1, SOC2.CC.5.1.2, SOC2.CC.5.2.1,
Asset Inventory

An inventory of information assets, including hardware, software, processing facilities and data, is
maintained and updated at least annually. All assets have an assigned asset owner. All assets are
classified based on the data classification convention.

Covered Security Criteria: SOC2.C.1.1.1, SOC2.CC.3.2.6, SOC2.CC.6.1.1,

Privacy

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to any of Headset’s operations that can be tied to or
attributed to the personal or protected data of an individual. Mitigated and monitored by 3 control(s)

Privacy Notice

The privacy notice is written in understandable language, includes the date it was last updated, and is
prominently displayed on the website. The privacy notice includes:
The purpose for collecting personal information
Types of personal information collected
Methods of collection
Use, retention, and disposal of personal information
Access to personal information
Disclosure of personal information to third parties
Security for privacy
Quality of personal information
Collection from other sources

Covered Security Criteria: SOC2.P.1.1.1, SOC2.P.1.1.4, SOC2.P.2.1.5, SOC2.P.3.1.2,
Cyber Insurance

Cybersecurity insurance is utilized.

Covered Security Criteria: SOC2.CC.9.1.2,
Incident Response: Employee Responsibility

A documented incident response plan is in place to guide employees in identifying, reporting, and
acting on breaches and incidents.

Covered Security Criteria: SOC2.CC.2.2.3, SOC2.CC.2.2.6, SOC2.CC.2.3.5, SOC2.CC.7.3.2, SOC2.CC.7.3.4,
SOC2.CC.7.4.1, SOC2.CC.9.2.4, SOC2.P.6.3.1, SOC2.P.6.5.1, SOC2.P.8.1.6, SOC2.P.8.1.7,

Software

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to the use of protection of any applications or code, whether proprietary or provided by others. Mitigated and monitored by 1 control(s)

Data Processing Completely and Accurately

Critical data is entered, processed, outputted completely and accurately.

Technical

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to anything having to do with how the network operates. This includes firewalls, data loss prevention, and network operations. Mitigated and monitored by 14 control(s)

Vulnerability Scan

Vulnerability scans are performed on a (frequency) basis to help identify security risks and results are
triaged and actioned per Service Level Agreement.

Covered Security Criteria: SOC2.CC.4.1.1, SOC2.CC.5.3.4, SOC2.CC.6.1.5, SOC2.CC.6.8.2, SOC2.CC.7.1.2,
SOC2.CC.7.1.4, SOC2.CC.7.1.5, SOC2.CC.7.2.2, SOC2.CC.7.2.4,
Activity Logging

Processing activities are methodically logged within the cloud to monitor its quality.

Covered Security Criteria: SOC2.CC.4.1.2,
Antivirus

Antivirus is installed on workstations and servers to help protect against viruses and malicious
software on the systems.

Covered Security Criteria: SOC2.CC.6.8.4,
Workstation Lockout

Internal users' screensavers are configured to lock after a specified period of time of inactivity and to
require a password to unlock.

Covered Security Criteria: SOC2.CC.6.1.2,
Change Management Policy

A Change Management Policy and Procedures are in place to request, document, test, and approve
changes.

Covered Security Criteria: SOC2.CC.8.1.1, SOC2.CC.8.1.2, SOC2.CC.8.1.3,
Change Management: Production Systems

Automation is maintained to enforce required approval on all changes to production environments.

Covered Security Criteria: SOC2.CC.8.1.5,
Monitoring Infrastructure

IT infrastructure monitoring tools are configured to monitor IT infrastructure availability and
performance, generate alerts when specific predefined thresholds are met, and forecast capacity
requirements to ensure system performance.

Covered Security Criteria: SOC2.A.1.1.1, SOC2.A.1.1.2, SOC2.A.1.1.3, SOC2.A.2.1.2, SOC2.A.2.1.3, SOC2.A.2.1.4,
SOC2.A.2.1.5, SOC2.A.2.1.6, SOC2.CC.4.1.3,
Incident Driven Change

Security incidents that require a change to in-scope systems follow change management procedures.

Covered Security Criteria: SOC2.CC.7.4.5, SOC2.CC.7.4.8, SOC2.CC.7.4.9, SOC2.CC.7.5.4, SOC2.CC.8.1.11,
Encryption

Disc encryption is enforced, by centrally managed data loss prevention rules, on all employee devices.

Covered Security Criteria: SOC2.CC.6.1.9, SOC2.CC.6.7.2,
Security Update

An industry-standard tool is used to monitor the provisioning of security updates for workstations,
servers, and network devices.

Covered Security Criteria: SOC2.CC.6.7.4,
Software Install Scan

Users are allowed to install authorized software on issued devices. Devices are scanned for malicious
and suspicious applications.

Covered Security Criteria: SOC2.CC.7.1.2,
Uptime Monitoring

A system is in place to monitor uptime and alert team members in the event of an outage.

Covered Security Criteria: SOC2.A.1.1.1,
Malware Email

Email is scanned for malware and phishing attempts prior to and after email delivery, respectively.

Covered Security Criteria: SOC2.CC.6.8.4,
Change Management: Ticketing System

A centralized ticketing and workflow tool tracks software change activity, including development,
approvals and testing.

Covered Security Criteria: SOC2.CC.8.1.4, SOC2.CC.8.1.8, SOC2.CC.8.1.9,

Vendor

Last updated Friday June 30, 2023
Subheading Right Here

The following controls mitigate risks related to any supplier or service provider, including contractors,
consultants, and cloud providers. Mitigated and monitored by 1 control(s)

Outsourced Development

The organization monitors the activity of outsourced system development and a completed contract
is in place.