We are mid-audit. Below is the scope, the controls mapped, the audit firm engaged, and the timeline to certification. Anything else, ask us directly.
The audit covers all production systems that process or store client data, including the marketing attribution platform, the staffing operations console, and every internal tool we ship to clients.
Specifically in scope: production application servers, the data warehouse, identity and access management, change-management workflows, vendor-management procedures, and the on-call incident response process. Out of scope: corporate marketing properties (this site), recruiting databases, and the financial back office, which are handled under separate controls.
The audit period covers a continuous 12-month operating window. Type II means controls are tested for design and for operating effectiveness over time, not just at a point in time.
Three Trust Services Criteria apply: Security, Availability, and Confidentiality. Privacy and Processing Integrity are deferred to a future audit cycle once two more enterprise client requirements come into scope.
We engaged a regionally recognized AICPA-licensed firm with a portfolio focused on growth-stage operators. The name is shared on request, under NDA.
Methodology follows AICPA SSAE 18. Evidence collection runs continuously through the audit period, not in a single end-of-period sweep. Sample testing covers control populations of every size, with stratified sampling for higher-frequency controls.
Quarterly readiness checkpoints are held with the auditor. Findings, if any, are remediated inside the same audit period whenever feasible.
A formal readiness letter, on auditor letterhead, is available to enterprise prospects under NDA. The letter confirms scope, the period of testing, the criteria covered, and the expected report-issuance window.
The readiness letter is the document your security review team needs while the final report is in motion.
Request via the link at the bottom of this page. Turnaround is 48 hours from NDA execution.
Final report issuance is expected in the third quarter of 2026.
Most controls are already in production. The audit confirms what is already operating; it does not introduce changes to client workflows.
What does change: enterprise security reviews shorten substantially. Most procurement teams will accept the SOC 2 Type II report in lieu of a custom security questionnaire, removing two to four weeks from the procurement cycle for new engagements.
Existing clients receive the final report at no additional cost. New engagements signed before issuance are amended to reference the report once available.
Questions on scope, methodology, or report distribution should go to the trust team directly.
Email trust@famaash.com or use the contact form. Responses are returned within one business day.