Shovels Security Center
Shovels is committed to protecting your data. Here's how we safeguard your information and comply with industry standards and regulations.
Request our SOC 2 Type 2 report
Resources
SOC 2 Type 2 Report
SOC 2 Type 2 Representation Letter
FAQs
Is Shovels SOC 2 compliant?
Yes. Shovels has completed a SOC 2 Type 2 examination conducted by Zero Day CPA, PC, an independent CPA firm. The audit covered the period November 1, 2025 through January 31, 2026, and resulted in a clean opinion with no deviations noted across all tested controls.
What does SOC 2 Type 2 mean, and why does it matter?
A SOC 2 Type 2 report goes beyond a point-in-time assessment — it verifies that our security controls were not only properly designed but also operated effectively over a multi-month period. This gives enterprise customers stronger assurance than a Type 1 report, which only evaluates design.
Which Trust Services Criteria does the report cover?
The examination covers the Security criteria (also called the Common Criteria), which is the foundational SOC 2 category. This includes controls related to logical access, change management, risk assessment, monitoring, incident response, and vendor management.
Who conducted the audit?
The audit was performed by Zero Day CPA, PC, based in Troy, Michigan. The report was signed on April 7, 2026.
Can I request a copy of the full SOC 2 report?
Yes. The full report is available to customers and prospective customers under NDA. Request it from our Security Center.
Where is Shovels' data hosted?
All production systems and customer data are hosted in Amazon Web Services (AWS). Shovels does not operate any physical data centers. Physical and environmental security controls are the responsibility of AWS, which maintains its own SOC 1 and SOC 2 Type 2 certifications.
How does Shovels protect data at rest and in transit?
All customer data stored in data repositories is encrypted at rest using industry-standard encryption protocols. Data transmitted over public networks is encrypted in transit using HTTPS/TLS. Cloud resources are also configured to restrict public access without authentication.
How does Shovels manage access to systems?
Access to in-scope systems follows the principle of least privilege. All personnel are assigned unique IDs, multi-factor authentication (MFA) is required, and user access is reviewed quarterly. Access is revoked within 24 hours of employee or contractor termination.
Does Shovels perform vulnerability testing?
Yes. Shovels conducts continuous vulnerability scanning using Rapid7 and engages an independent third party to perform an external penetration test at least annually. Critical and high-severity findings are tracked through remediation.
How does Shovels handle security incidents?
Shovels maintains a formal Security Incident Response Plan covering identification, prioritization, containment, communication, and resolution. The plan is tested annually via tabletop exercise. A public security reporting channel is also available — if you become aware of a potential security issue involving Shovels, please contact us at [email protected].
Subprocessors
New Subprocessor

Amazon Web Services
Cloud infrastructure provider hosting all Shovels production systems and customer data, including compute, storage (S3, RDS, DynamoDB), and networking.
Data location: United States
Google LLC (Google Cloud Platform)
Cloud infrastructure provider used for additional compute and data processing services.
Data location: United States
Monitoring
Continuously monitored by Secureframe
Compliance

SOC 2
SOC 2 Type 2
