Compliance
Meet regulatory requirements with built-in compliance controls and automated reporting
Compliance Overview
TigerIdentity helps you achieve and maintain compliance with major regulatory frameworks through automated controls, comprehensive audit logging, and streamlined reporting.
SOC 2 Type II
Certified Since 2024
TigerIdentity maintains SOC 2 Type II certification audited by independent third-party assessors. Our report covers Security, Availability, and Confidentiality trust service criteria.
Request SOC 2 Report →What SOC 2 Covers
Security
Logical and physical access controls, encryption, network security, incident response
Availability
System uptime, disaster recovery, business continuity, monitoring and alerting
Confidentiality
Data classification, encryption at rest and in transit, access logging, data retention
How TigerIdentity Helps Your SOC 2
- CC6.1: Immutable audit logs satisfy logical access control requirements
- CC6.2: Automated access reviews and attestations before audits
- CC6.3: Just-in-time access eliminates standing privileges
- CC7.2: Comprehensive audit trail for all system activity
ISO 27001
TigerIdentity's Information Security Management System (ISMS) is certified to ISO/IEC 27001:2022, demonstrating systematic management of information security risks.
Scope of Certification
- • Design, development, and operation of TigerIdentity platform
- • Cloud infrastructure and hosting
- • Customer data processing and storage
- • Support and professional services
Key Controls
- • A.5.1: Information security policies
- • A.8.2: Access control
- • A.8.9: Configuration management
- • A.8.16: Monitoring activities
How TigerIdentity Helps Your ISO 27001
- A.9.1.1: Access control policy enforcement via centralized policies
- A.9.2.1: User registration and de-registration tracking
- A.9.4.1: Information access restriction based on policies
- A.12.4.1: Event logging and monitoring of all access
GDPR Compliance
TigerIdentity provides controls and features to help you comply with the EU General Data Protection Regulation (GDPR).
Article 5: Data Processing Principles
Article 17: Right to Erasure
Delete personal data via API or dashboard. Deletion propagates across all systems within 30 days.
DELETE /v1/principals/{principal_id}?gdpr_erasure=true
# Deletes identity and pseudonymizes audit logsArticle 15: Right of Access
Export all data associated with a data subject in machine-readable format.
POST /v1/data-exports/gdpr
{ "principal_id": "user_jane_doe" }
# Generates JSON export of all personal dataArticle 30: Records of Processing
Generate processing records for your GDPR documentation.
- • Categories of data subjects (employees, contractors, customers)
- • Categories of personal data (name, email, department, role)
- • Purpose of processing (access control, audit, security)
- • Data retention periods (configurable, default 1 year)
Article 32: Security of Processing
TigerIdentity implements technical and organizational measures:
HIPAA Compliance
For healthcare organizations handling Protected Health Information (PHI), TigerIdentity provides HIPAA-compliant controls.
Business Associate Agreement (BAA)
Available for Enterprise customers. Contact sales to execute a BAA.
Request BAA →164.308: Administrative Safeguards
- (a)(1): Security management process with risk assessments
- (a)(3): Workforce clearance via background checks
- (a)(5)(ii)(C): Log-in monitoring and audit logs
164.312: Technical Safeguards
- (a)(1): Unique user identification for all principals
- (a)(2): Emergency access procedures via break-glass policies
- (b): Audit controls with immutable logging
- (e)(1): Transmission security via TLS 1.3
PCI-DSS
For organizations processing credit card data, TigerIdentity helps satisfy PCI-DSS access control requirements.
Requirement 7: Restrict Access
- ✓7.1: Limit access to need-to-know
- ✓7.2: Access control system with default deny
Requirement 8: Identify Users
- ✓8.1: Unique ID for each user
- ✓8.2: Strong authentication
Requirement 10: Track Access
- ✓10.1: Audit trails for all access
- ✓10.2: Automated audit trail
Requirement 12: Security Policy
- ✓12.3: Usage policies for technologies
- ✓12.10: Incident response plan
FedRAMP (Planned)
TigerIdentity is pursuing FedRAMP Moderate authorization for U.S. federal government customers. Expected availability: Q3 2026.
Express interest in FedRAMP →Generating Compliance Reports
Generate compliance reports for auditors on-demand or on a schedule.
POST /v1/compliance/reports
Content-Type: application/json
{
"report_type": "access_review",
"period": {
"start": "2026-01-01",
"end": "2026-03-31"
},
"scope": {
"resources": ["prod-*"], # All production resources
"principals": ["department:finance"]
},
"format": "pdf", # pdf, csv, json
"include_sections": [
"access_grants",
"policy_changes",
"denied_requests",
"orphaned_accounts",
"privilege_escalations"
]
}
# Response
{
"report_id": "rpt_abc123",
"download_url": "https://reports.tigeridentity.com/...",
"expires_at": "2026-02-12T15:30:00Z"
}Available Report Types
Access Review Report
Who has access to what, changes over time, certification status
Policy Change Report
All policy modifications with before/after diffs and approvers
Audit Log Summary
Aggregated access decisions, anomalies, security events
Compliance Posture
Control effectiveness, gaps, remediation recommendations
Access Review Automation
Automate periodic access reviews required by SOC 2, ISO 27001, and other frameworks.
# config/access-reviews.yaml
reviews:
- name: quarterly-production-access
schedule: "0 0 1 */3 *" # First day of quarter
scope:
resources:
environment: production
reviewers:
- role: resource_owner
- department: security
auto_revoke:
enabled: true
if_not_certified_within_days: 14
notifications:
- on_start: [email, slack]
- reminder_after_days: 7
- on_complete: [email]
- name: monthly-privileged-access
schedule: "0 0 1 * *" # Monthly
scope:
principals:
has_privileged_access: true
reviewers:
- role: manager
- department: security
require_justification: trueReview Workflow
- 1.TigerIdentity generates access snapshot and assigns reviewers
- 2.Reviewers receive notification with dashboard link
- 3.Reviewers certify (approve) or revoke each access grant
- 4.Uncertified access auto-revoked after deadline (configurable)
- 5.Final report generated with all decisions and attestations
Need Compliance Documentation?
Request SOC 2 reports, BAA, or discuss your compliance requirements