BenchmarksStack RankingAPIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
In Progress

ISO 27001 at H33

H33 is building its Information Security Management System on a foundation of SOC 2 Type II certification, post-quantum cryptography, and continuous compliance monitoring via Drata.

Annex A Controls — Organizational

Information Security Policies

A.5.1 – A.5.8

Documented information security policy, roles, responsibilities, and segregation of duties. Management direction established through Drata policy framework.

Implemented

Asset Management

A.5.9 – A.5.13

Inventory of all information assets including 13 RDS instances, 56 S3 buckets, and compute infrastructure. Classification and labeling procedures in place.

Implemented

Access Control

A.5.15 – A.5.18

Identity and access management with IAM policies, MFA enforcement, 14-char password minimums, 90-day rotation, and role-based FHE permissions with time-bounded grants.

Implemented

Supplier Relationships

A.5.19 – A.5.23

Supplier security requirements documented for AWS, Stripe, Twilio, and Auth1. Data processing agreements in place. Third-party risk assessments conducted.

Implemented

Incident Management

A.5.24 – A.5.28

Incident response plan with severity classification, escalation procedures, and SNS-based real-time alerting. 14 CIS benchmark alarms for automated detection.

Implemented

Business Continuity

A.5.29 – A.5.30

Multi-AZ RDS deployment, automated daily backups with KMS encryption, point-in-time recovery, and disaster recovery procedures documented.

Implemented

Annex A Controls — Technological

Cryptography

A.8.24

Post-quantum cryptographic controls: Kyber-1024 (ML-KEM) key encapsulation, Dilithium (ML-DSA) signatures, AES-256-GCM symmetric encryption. All KMS keys with automatic annual rotation.

Implemented

Logging and Monitoring

A.8.15 – A.8.17

CloudTrail (2 multi-region trails, KMS-encrypted), VPC flow logs (5 VPCs), GuardDuty threat detection, AWS Config continuous recording, and application-level immutable audit logs.

Implemented

Network Security

A.8.20 – A.8.22

VPC network segmentation, default security groups locked (no rules), TLS 1.2/1.3 on all connections, nginx rate limiting, and IAM Access Analyzer for continuous external access monitoring.

Implemented

Data Protection

A.8.10 – A.8.12

All databases KMS-encrypted at rest. All S3 buckets KMS-encrypted. EBS default encryption enabled. Field-level FHE encryption for sensitive data. Data masking and deletion capabilities (GDPR Right to be Forgotten).

Implemented

Vulnerability Management

A.8.8

Amazon Inspector enabled for EC2 and Lambda scanning. GuardDuty malware protection for EBS volumes. Dependency scanning in CI/CD pipeline.

Implemented

Secure Development

A.8.25 – A.8.31

GitLab branch protection with required merge request approvals. Code review process enforced. Separate development, staging, and production environments.

Implemented

Continuous Compliance

Drata Automation

SOC 2 Type II Certified

Continuous compliance monitoring with automated evidence collection. 114+ controls tested and passing. Real-time drift detection and remediation tracking.

Active

AWS Security Hub

CIS AWS Foundations Benchmark

Automated security posture assessment against CIS benchmarks. Findings triaged and remediated. Integration with GuardDuty, Inspector, and Config for unified view.

Active