SOC 2 Type 2 Certification Completion
We are thrilled to announce that our SOC 2 Type 2 audit has been successfully completed and active as of 1/1/2026!
Our independent auditors have issued the final report, confirming the effectiveness of our controls over the review period in alignment with the AICPA Trust Services Criteria for security, availability, confidentiality, processing integrity, and privacy.
This milestone underscores Altitude's dedication to delivering a secure and trustworthy platform for our customers.
The SOC 2 Type 2 report is now available in our Trust Center at https://trust.gainaltitude.ai (under the Compliance section or Documents area—login or request access as needed). Current and prospective customers can request a copy under NDA directly through the Trust Center portal, by reaching out to your account manager, or by emailing [email protected].
A huge thank you to our entire team, our partners, and especially to you—our customers—for your continued trust and support as we maintain and strengthen our security program.
If you have any questions about the report, our controls, or how this fits into your vendor risk reviews, please don't hesitate to contact me.
Regards,
Jeffrey Luck
Operational Security Specialist
SOC 2 Type 2 Certification
We are now moving into the final 30 days of our Type 2 Audit. We appreciate all your patience. Our auditors have told us that we should have our report within 2 weeks of Dec. 31st. Again thank you!
If you have any questions please feel free to reach out to me.
Regards,
Jeffrey Luck
Operational Security Specialist
Documents
Subprocessors
Subprocessors
Data Security
Data Security
We follow industry best practices for data security. We are happy to provide more details about our data security practices upon request.
Data Privacy
Data Privacy
Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.
Continuous Monitoring
Continuous Monitoring
We continuously monitor our systems for security threats and vulnerabilities. We are happy to provide more details about our continuous monitoring practices upon request.





