SOC 2 Type II · Active

Security and trust,
built into how
we operate.

Intras Cloud Services delivers managed cloud, security, and AI-driven business operations to mid-market organizations. This Trust Center gives customers, prospects, and auditors transparent, evidence-backed visibility into our controls, certifications, and operating posture.

SOC 2 Type II
Active
Through March 2027
Controls Monitored
141/142
Continuously verified
Service Uptime
99.98%
Trailing 12 months
MFA Coverage
100%
All workforce identities
Security Posture

How we protect your data, end to end.

Our security program is built on layered defense, zero-trust access, and continuous monitoring — operationalized through Microsoft 365 E5 security, Azure-native controls, and documented policies.

Defense in depth

Layered controls across identity, endpoint, network, application, and data — built on Microsoft 365 E5 security, Defender XDR, and continuous SIEM monitoring.

Encryption by default

TLS 1.2+ in transit; AES-256 at rest. Customer secrets isolated in cloud-native key vaults with role-based access and audit logging.

Zero-trust access

MFA enforced for 100% of workforce identities. Conditional access, device compliance, and least-privilege role assignments reviewed quarterly.

Continuous monitoring

24x7 SIEM aggregation of identity, endpoint, network, and SaaS logs. Alerts triaged through documented incident response runbooks.

Personnel security

Background checks for all employees and contractors. Annual security and AML awareness training with documented completion tracking.

Documented program

Written information security policy, vendor management standard, incident response plan, and BCP/DR program reviewed at least annually.

Certifications

SOC 2 Type II, verified — and only what's verified.

We maintain SOC 2 Type II to the AICPA Trust Services Criteria. Reports are shared with prospects and customers under mutual NDA. We do not claim other frameworks we have not formally achieved.

SOC 2 Type II

Active

AICPA TSP 100, 2017 Trust Services Criteria

Security, Availability, and Confidentiality Trust Service Criteria covering managed cloud services, customer support, and internal business systems.

Coverage period
12-month observation period: March 1, 2025 – February 28, 2026
Issued / Valid through
March 12, 2026March 11, 2027
Auditor
Independent CPA firm (auditor name disclosed under NDA)
Report type
Type II
Trust Service Criteria

Scoped, mapped, and monitored.

Our SOC 2 Type II report covers the Security, Availability, and Confidentiality criteria. Processing Integrity and Privacy are explicitly out of scope today.

CC

Security

In scope

Information and systems are protected against unauthorized access, unauthorized disclosure, and damage that could compromise availability, integrity, confidentiality, and privacy.

Controls in this criterion
64
A

Availability

In scope

Information and systems are available for operation and use to meet the entity's objectives.

Controls in this criterion
18
C

Confidentiality

In scope

Information designated as confidential is protected to meet the entity's objectives.

Controls in this criterion
22
PI

Processing Integrity

Out of scope

System processing is complete, valid, accurate, timely, and authorized to meet the entity's objectives.

P

Privacy

Out of scope

Personal information is collected, used, retained, disclosed, and disposed of to meet the entity's objectives.

Subprocessors

Vendors who process data on our behalf.

We carefully select subprocessors and review them annually. Reach out to trust@intrascloudservices.com to be notified of additions or material changes.

Microsoft Azure
Cloud Infrastructure
Visit

Primary cloud hosting and managed services delivery

Data: Customer configuration, telemetry, application data
Region: United States (East US, South Central US)
Microsoft 365
Productivity
Visit

Email, document collaboration, identity

Data: Business email content, customer correspondence, files
Region: United States
Microsoft Defender XDR
Cloud Infrastructure
Visit

Endpoint protection, EDR, identity threat detection

Data: Endpoint and identity telemetry
Region: United States
Microsoft Sentinel
Cloud Infrastructure
Visit

SIEM and security log aggregation

Data: Security event logs and metadata
Region: United States
Zoho Corporation
Business Systems
Visit

Business operations (Books, Projects, Desk, People, Campaigns, CRM)

Data: Customer business contact and engagement data
Region: United States
GitHub
Developer Tools
Visit

Source code management and CI/CD

Data: Source code, deployment artifacts (no customer data)
Region: United States
Cloudflare
Cloud Infrastructure
Visit

DNS, CDN, and DDoS protection for customer-facing properties

Data: Connection metadata, request logs
Region: Global edge
Google Workspace
Productivity
Visit

Calendar and supplemental collaboration for select teams

Data: Calendar metadata, attendee email addresses
Region: United States
Perplexity
AI / Analytics
Visit

AI-assisted internal research and operations tooling

Data: Internal research prompts (no customer data submitted)
Region: United States
Vulnerability Management

Continuous detection. Honest disclosure.

We do not currently engage a third-party penetration testing firm. Our vulnerability management program focuses on continuous detection, prioritization, and remediation across endpoints, identity, cloud workloads, and SaaS systems.

Penetration testing — A first independent third-party penetration test is on our 2026 roadmap. We will publish a redacted summary in this Trust Center once complete.
Program practices

How we find and fix

Workforce endpoints, Microsoft 365 tenant, Azure subscriptions, customer-facing web properties, and internal business systems.

  • Continuous vulnerability scanning

    Microsoft Defender Vulnerability Management runs continuously across all enrolled endpoints and identifies CVEs against installed software inventory.

  • Cloud security posture management

    Microsoft Defender for Cloud monitors Azure subscriptions for misconfigurations and benchmarks against the Microsoft Cloud Security Benchmark.

  • Endpoint detection & response

    Microsoft Defender for Endpoint provides EDR coverage on 100% of managed workforce devices.

  • SIEM correlation

    Microsoft Sentinel ingests identity, endpoint, network, and SaaS logs. Alerts triaged through documented runbooks.

  • Patch management

    Critical OS and browser patches deployed within 14 days; high severity within 30 days; standard within 90 days.

  • Responsible disclosure

    Security researchers can report findings to security@intrascloudservices.com. We acknowledge within 2 business days.

Open findings · Q1 2026
Critical
0
High
1
Medium
6
Low
14
Average remediation
4.2 days for high+; 18 days for medium
Responsible disclosure

Found a vulnerability? Email our security team. We acknowledge within 2 business days and won't pursue good-faith research.

security@intrascloudservices.com
Security Awareness

Training across every role.

Our security awareness program is built into onboarding, refreshed annually, and reinforced with quarterly phishing simulations across the entire workforce.

Program at a glance

Internal Zoho-based learning paths combined with role-specific modules. Phishing simulations delivered through Microsoft Defender for Office 365 Attack Simulation Training.

Workforce trained
100%
Phishing simulation click rate
2.1%
Average reporting time
47 sec
Cadence
Onboarding + annual refresh; targeted phishing simulations quarterly
Audience
All Intras Cloud Services employees and long-term contractors
Workforce coverage
100%
Tracking
Documented in HRIS with evidence retained for SOC 2
Curriculum

Topics covered

  • Acceptable use, password hygiene, and MFA
  • Phishing, smishing, vishing, and AI-enabled social engineering
  • Data classification, handling, and confidentiality
  • Endpoint and physical device security
  • Incident reporting expectations and channels
  • AML / sanctions awareness for relevant roles
  • Privacy, secure collaboration, and AI tool usage standards
Update Calendar

A shared view of what's next.

Past and upcoming compliance milestones — audits, policy refreshes, training cycles, and program changes — visible to customers and auditors at any time.

Subscribe (.ics)
  • Audit·UpcomingMar 1, 2027

    SOC 2 Type II annual renewal

    Next 12-month observation window concludes; renewal report targeted by end of Q1 2027.

  • Program·UpcomingSep 1, 2026

    First third-party penetration test (planned)

    Initial external penetration test engagement scheduled. Redacted summary to be published here on completion.

  • Audit·UpcomingJul 1, 2026

    Mid-year SOC 2 readiness checkpoint

    Internal control walkthroughs and evidence sampling against SOC 2 controls.

  • Training·UpcomingMay 15, 2026

    Q2 phishing simulation

    Quarterly phishing simulation across all workforce mailboxes.

  • Audit·CompletedMar 12, 2026

    SOC 2 Type II report issued

    Final report covering March 2025 – February 2026 issued by independent auditor.

  • Policy·CompletedFeb 15, 2026

    Annual policy refresh

    Information Security Policy, Access Control Standard, and Incident Response Plan reviewed and re-approved by leadership.

  • Training·CompletedFeb 1, 2026

    Annual security awareness training cycle

    All employees and active contractors completed annual training and acknowledgment.

  • Subprocessor·CompletedJan 10, 2026

    Subprocessor list refresh

    Subprocessor inventory reviewed; no new subprocessors added.

Status & Incidents

System availability, in the open.

Service availability and a transparent summary of any incidents over the trailing 12 months.

Last 30 days
100%
0 incidents
Last 90 days
99.99%
1 incident
Last 12 months
99.98%
2 incidents

Recent incidents

  • Nov 4, 2025·Duration: 27 min

    Brief degraded performance on customer ticket portal

    Impact — Slow response from one regional endpoint; no data loss

    Resolution — Capacity issue with upstream SaaS provider. Failed over to secondary region; coordinated remediation with provider.

  • Jun 18, 2025·Duration: 1h 12min

    Email delivery delay

    Impact — Outbound notifications delayed; queued and re-delivered

    Resolution — Upstream Microsoft 365 transport delay. No customer data exposure. Internal alerting tuned.