Security Policies for Craic Studio LLC
We are a software development firm. We are not currently SOC 2 certified. However, we strictly adhere to SOC 2 protocols in our operations. This site serves as our repository of evidence, policies, and procedures to demonstrate our security posture and commitment to data protection.
Fortified Infrastructure
We rely exclusively on industry-standard, SOC 2 compliant infrastructure providers. We do not manage physical servers or deviate from this stack. Whether building for clients or launching our own SaaS applications, this is our immutable foundation.
Primary database and authentication provider. Handles all data storage with automated PITR backups and row-level security.
Frontend deployment and edge functions. Provides immutable deployments, DDoS protection, and global CDN.
DNS management, WAF (Web Application Firewall), and edge security network protecting all ingress traffic.
Mobile application build and update infrastructure. Securely manages signing credentials and OTA updates.
Security Policies & Procedures
Our operational protocols are documented below. Click any policy to view the full text.
Information Security Policy 1. Overview 1.1 Purpose The purpose of this Information Security Policy (ISP) is ...
Acceptable Use Policy 1. Overview 1.1 Purpose The Acceptable Use Policy (AUP) defines the standards for the a...
Access Control Policy 1. Overview 1.1 Purpose This policy establishes the framework for managing access to Cr...
Data Management & Classification Policy 1. Overview 1.1 Purpose This policy defines the framework for classif...
Software Development Lifecycle (SDLC) Policy 1. Overview 1.1 Purpose This policy mandates security integratio...
Incident Response Plan 1. Overview 1.1 Purpose The Incident Response Plan (IRP) defines the organized approac...
Vendor Management Policy 1. Overview 1.1 Purpose This policy establishes the requirements for evaluating, sel...
Business Continuity & Disaster Recovery Plan 1. Overview 1.1 Purpose The purpose of this plan is to ensure th...
Physical Security Policy 1. Overview 1.1 Purpose This policy outlines the physical security controls required...