2Lines Software — Trust Center

Last updated: February 21, 2026


Our Commitment to Security

2Lines Software builds and operates cloud-based software for our clients. We take the security of our systems and our clients' data seriously. This Trust Center provides an overview of our security practices, compliance posture, and commitments.


Compliance Status

ProgramScopeStatus
SOC 2 Type ISecurity, ConfidentialityAudit-ready; engagement pending

We have implemented a comprehensive compliance program covering 40 Trust Service Criteria controls across Security (CC1-CC9) and Confidentiality (C1). Our compliance framework is assessed and maintained on an ongoing basis.


Security Practices

Access Control

We enforce strict access controls across all systems:

  • Multi-factor authentication (MFA) is required for all user accounts
  • Role-based access controls limit permissions to what is necessary for each role
  • Access grants are reviewed quarterly and revoked promptly when no longer needed
  • Service accounts are inventoried and unused credentials are removed

Encryption

We protect data in transit and at rest:

  • All web traffic is encrypted using TLS 1.2 or higher
  • Data at rest is encrypted using AES-256 encryption
  • Encryption keys are managed through dedicated key management services
  • SSL certificates are issued by trusted Certificate Authorities with automated renewal

Change Management

We follow controlled processes for all system changes:

  • All code changes require review through pull requests before deployment
  • Automated CI/CD pipelines enforce testing, linting, and security scanning before merge
  • Branch protection rules prevent direct commits to production branches
  • Emergency changes follow a documented expedited process with post-incident review

Monitoring and Logging

We maintain visibility into our systems:

  • Centralized logging with 365-day retention across all production environments
  • Automated security alerts for suspicious activity, authentication failures, and configuration changes
  • Regular vulnerability scanning of all public-facing applications
  • Quarterly penetration testing of production infrastructure

Incident Response

We maintain a documented incident response plan:

  • Defined severity levels with corresponding response procedures
  • Notification to affected parties within 72 hours of confirmed incidents
  • Post-incident reviews to identify root causes and prevent recurrence
  • Cyber insurance coverage for incident response support

Business Continuity

We design for resilience:

  • Automated database backups with defined recovery objectives
  • Disaster recovery procedures documented and maintained
  • Cloud infrastructure deployed across managed services with built-in redundancy
  • Recovery time and recovery point objectives defined for all critical systems

Data Handling

Where Data Resides

All production data is hosted in North American data centers through enterprise-grade cloud providers. We do not process or store data in regions outside of North America unless specifically agreed upon with clients.

Data Classification

We classify data into four levels — Critical, Sensitive, Internal, and Public — with controls appropriate to each level. Client data is classified as Sensitive or Critical depending on its nature, and is protected accordingly.

Data Retention and Disposal

Data is retained only as long as necessary for business purposes or as required by contractual obligations. When data is no longer needed, it is securely deleted using methods appropriate to the storage medium.


Vulnerability Management

We conduct regular security assessments of our infrastructure:

  • Automated vulnerability scanning against all public-facing URLs
  • Dependency scanning for known vulnerabilities in third-party libraries
  • Secret scanning to prevent accidental credential exposure
  • Remediation tracked and prioritized by severity

Our most recent scan (February 2026) found zero critical, high, or medium vulnerabilities across all production targets.


Subprocessors

We use the following third-party services in delivering our products:

ProviderPurpose
Google Cloud PlatformCloud infrastructure, compute, database, and storage
GitHubSource code management, CI/CD, and collaboration
Google WorkspaceBusiness email, identity management, and collaboration
1PasswordSecrets and credential management
CloudflareDNS management and CDN
ZensuranceCyber insurance

Governance

Policies

We maintain 12 security policies covering information security, access control, encryption, change management, incident response, risk assessment, vendor management, data classification, acceptable use, business continuity, logging and monitoring, and security training. All policies are reviewed and approved annually.

Training

All personnel complete annual security awareness training covering topics including secure coding practices, phishing awareness, data handling, and incident identification.

Risk Assessment

We conduct formal risk assessments to identify, evaluate, and mitigate risks to our systems and data. Risks are scored and tracked through a documented process with regular review.


Contact

For security inquiries, to request our compliance documentation under NDA, or to report a security concern:

Email: john@2linessoftware.com


2Lines Software is committed to maintaining the trust our clients place in us. This page reflects our current security posture and is updated as our program evolves.