Certify provider network management
  • Products
  • Clients
  • Company
  • Resource Library

Why We’re Proud of Our SOC 2 Type 2 Certification

CertifyOS has been awarded SOC Type 2 certification for its adherence to stringent security controls.

SOC 2 Type 2 Certification

With the mass influx of information, today’s businesses prioritize data security.

Information security spending worldwide jumped from under $100 billion in 2017 to nearly $200 billion in 2023.

Organizations that handle sensitive information, like healthcare providers, need reliable and secure platforms to process and manage it.

To cater to this ongoing demand, CertifyOS has always been at the forefront of delivering API-first credentialing, licensing, and enrollment to payors, health systems, and digital health companies.

The accomplishment of achieving our SOC 2 Type 2 Certification is the result of maintaining the highest security standards, and it enhances the trust and confidence placed in us by our existing base of 70+ clients and future partners and clients.

In this article, we’ll discuss what SOC 2 Type 2 certification represents and the difference between Type 1 and Type 2 certifications. Moreover, we'll explore how this benefits CertifyOS's clients and, potentially, you.

What is SOC 2?

SOC stands for System and Organizational Controls, and SOC 2 is the industry standard, leading audit for cybersecurity.

Within healthcare and beyond, it's the primary audit that companies choose to make sure they're working with trusted partners.

The American Institute of Certified Public Accountants (AICPA) sets the standards and oversees the system, while independent accredited businesses perform the audits.

In healthcare, SOC 2 holds significant relevance because its controls align closely with the requirements outlined by HIPAA (Health Insurance Portability and Accountability Act).

Our SOC 2 Type 1 Certification

In our earlier blog post, we discussed achieving our SOC 2 Type 1 certification. As a refresher, a SOC 2 Type 1 certification verifies that we at CertifyOS have built a powerful framework of security controls.

We’ve specially designed these controls to protect your data and handle sensitive information seamlessly.

The SOC 2 demands that the system in place should offer protection of data from unauthorized access, physical damage, or modification.

Multiple control components are involved:

  • Control environment
  • Communication and information
  • Risk assessment
  • Monitoring activities
  • Control activities
  • Logical and physical access controls
  • System operations
  • Change management
  • Risk mitigation

What Does Being SOC 2 Type 2 Certified Mean?

Receiving our Type 2 certification means that we've implemented and adhered to the aforementioned system and process controls for a year (March 1, 2023 – February 28, 2024).

For now, our Type 2 certification pertains to our credentialing SaaS services.

Now, by establishing these comprehensive security controls, we at Certify are looking forward to forging a stronger bond with you. The cornerstone of our relationship will be founded on absolute trust and assurance of continuous protection of your valuable data.

Why Is Having Both SOC 2 Type 1 and Type 2 Certifications Beneficial?

Data breaches are happening at an increasingly alarming rate across industries, and companies need a way to show their customers that their information is safe.

A SOC 2 Type 1 certification is like having a detailed blueprint for creating a system that is strong and functional when it comes to handling sensitive information. The certification verifies that the design incorporates all the necessary security features and attaches trustworthiness and credibility to the platform that achieves it.

A crucial thing that must be kept in mind, is that SOC 2 Type 1 certification is issued for having security controls in place at a specific, fixed point of time. 

However, a SOC 2 Type 2 certification goes a step further in the same direction. It's a more thorough check that examines how well those security controls are working over time. If the service provider demonstrates a strong track record of effectively safeguarding customer data for a period of time, typically six to twelve months, they’re awarded the SOC 2 Type 2 certification.

This signals to our users that Certify not only has the right security checks in place but has also been successful in maintaining those security standards over time without any hiccups.

How is This Beneficial to Our Clients?

You might wonder why it is such a big deal. Well, as a business reliant on trust to sell and deliver our market offerings, these certifications mean the world to us.

While we have always upheld high standards of data security, those who haven't tried our services may not know if we're truly capable of doing so. Those who are already with us need assurance that they're in safe hands.

Having these certifications helps us communicate to our current and potential clients that we’re the best at taking care of them and their data.

Lower Probability Of Data Breaches

Data breaches can be quite expensive, involving legal fees, fines, remediation costs, and lost business. SOC 2 certification confirms the implementation of strong security controls, significantly reducing the possibility of data breaches.

Lower Insurance Premiums

Many insurance companies also offer lower premiums for businesses with evidently and practically strong security practices. SOC 2 certification can lead to substantial cost savings on your cyber insurance policy.

Easy Compliance

For organizations in highly regulated industries, managing compliance can be challenging. Our SOC Type 2 compliance aligns with many compliance requirements, simplifying the process and saving you valuable time and resources.


Moreover, you are who you hang out with.

In a world where data breaches incredibly common, having a reliable and credible security partner can increase the trust of your clients and other stakeholders. Thus, the SOC 2 certification establishes CertifyOS as a leader in secure credentialing solutions. By partnering with us, you gain a competitive edge as you utilize a platform trusted by forward-thinking organizations.

Many enterprise customers will not consider working with vendors until they are SOC 2 certified. At CertifyOS, we're ahead of the game.

Your Security is Our Ongoing Priority

CertifyOS takes data security seriously. We're constantly on the lookout for new ways to improve our security posture.

Moreover, our SOC 2 Type 2 Certification is not just a benchmark we’ve achieved; it’s a commitment to ongoing improvement. We're dedicated to further strengthening data security to protect against both current and emerging threats.

“We're thrilled to have achieved our SOC 2 Type 2 Certification and bring this additional level of security and trust to our 70+ existing clients. Additionally, we're excited to expand our reach not only for our existing clients but for all future partners, ensuring that Certify adheres to the strictest of industry standards, providing an unparalleled level of trust and security.”

— Anshul Rathi, CertifyOS founder and CEO

We also plan to expand our certification to cover our entire platform, providing an even more comprehensive layer of protection for your information.

If you have any questions about our SOC 2 certifications—or any of the other measures we’re taking to ensure the security of customer data—you can read over our privacy policy or reach out to our team to speak with a provider intelligence expert.

Share this article:


See All Articles
  • Blog
    Why We Opted for SOC 2 Certification
    What our new certification status says about our commitment to protecting customer data
  • Blog
    Best Practices for NCQA Survey Readiness
    Actionable tips and best practices to get (and keep) your healthcare organization survey-ready
  • Blog
    The “One & Done” CAQH Integration Myth
    A common myth we’ve come across in the provider network management industry is that a vendor’s CAQH integration can fast-track your payer enrollment and credentialing processes.
See All Articles