FISPA RECAP 2023
The Sonar team was in Nashville, Tennessee last week exhibiting at the 2023 FISPA conference. It brought many executives, network operators, and...
Security is often talked about in terms of frameworks, reports, and checklists. But in practice, security is about how a company operates every single day—especially when customers rely on your platform to support critical services.
That’s why completing our SOC 2 Type 2 report at Sonar matters so much to me.
SOC 2 Type 2 is fundamentally different from a one-time assessment. It doesn’t just ask whether controls exist on paper. It evaluates whether those controls are consistently followed over time, as the business actually runs.
That distinction is important.
Anyone can prepare for a single audit date. Type 2 looks at what happens day in and day out—how access is granted and reviewed, how changes are managed, how incidents are handled, and how monitoring and alerting function when no one is watching.
Our SOC 2 Type 2 report resulted in an unqualified opinion, which indicates the auditor found our controls were operating effectively over the review period.
At Sonar, security isn’t treated as a side project or a compliance task that lives outside the business. It’s embedded into how we operate the platform.
Preparing for SOC 2 Type 2 required us to mature and formalize everyday practices, including:
These aren’t temporary measures for an audit window. They are repeatable processes that we rely on to keep systems secure as the platform evolves.
Our customers trust Sonar with systems that support billing, provisioning, customer data, and day-to-day operations. That’s a significant responsibility.
SOC 2 Type 2 provides independent validation that we take that responsibility seriously. It gives customers confidence that security controls are not only designed appropriately but are consistently followed as part of normal operations.
It also helps reduce friction during vendor reviews, procurement processes, and compliance-driven evaluations. Instead of relying on self-attestation or lengthy questionnaires, customers can reference a widely recognized, third-party assessment.
For ISPs pursuing public funding, municipal partnerships, or regulated opportunities, this type of assurance can be especially valuable.
One of the most important aspects of SOC 2 Type 2 is that it highlights operational discipline.
Controls must be followed consistently. Evidence must exist naturally as part of doing the work. Gaps become visible quickly if processes aren’t actually embedded into how teams operate.
This report validates that Sonar’s security program is structured, repeatable, and sustainable—not dependent on individual effort or tribal knowledge.
Completing a SOC 2 Type 2 report isn’t the finish line. Security is an ongoing process.
We maintain our SOC 2 posture through continuous monitoring, regular reviews, and annual SOC 2 Type 2 assessments. As the platform grows and threats evolve, our controls and processes evolve with them.
For me, SOC 2 Type 2 is less about the report itself and more about what it confirms: that security at Sonar is built into how we operate every day.
That’s the standard our customers expect—and the one we hold ourselves to.
The Sonar team was in Nashville, Tennessee last week exhibiting at the 2023 FISPA conference. It brought many executives, network operators, and...
The Sonar team was in Oklahoma City, Oklahoma from March 4th – 7th exhibiting at the 2024 WISPAMERICA conference. This show brought over 1,500...
1 min read
Sonar reached version 1.0 at the end of 2016. On our path towards 1.0, we’ve brought over 150 ISPs around the world onto the Sonar...