Back
News
October 13th, 2025
minute read

Runpod Achieves SOC 2 Type II Certification: Continuing Our Compliance Journey

Brendan McKeag
Brendan McKeag

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Back in March, we shared some exciting news: Runpod  achieved SOC 2 Type I certification. Today, we're thrilled to announce the next milestone in our security journey—we've now achieved SOC 2 Type II certification!

If you're wondering what the difference is between Type I and Type II (or why this matters), let's break down our compliance journey and what this means for you.

Understanding SOC 2: Type I vs Type II

SOC 2 (System and Organization Controls 2) is an auditing standard developed by the American Institute of CPAs that evaluates how companies manage and protect customer data across five trust principles: security, availability, processing integrity, confidentiality, and privacy.

SOC 2 Type I assesses whether security controls are properly designed and implemented at a specific point in time. Think of it as a snapshot—auditors verify that you have the right security measures in place and they're set up correctly.

SOC 2 Type II goes much further. It evaluates whether those controls are operating effectively over an extended period—typically six to twelve months. This isn't a snapshot; it's a continuous observation that proves you're consistently following your security practices day in and day out.

When we achieved Type I in March, we demonstrated that our security controls were properly designed. Now with Type II, we've proven that we maintain those controls effectively over time.

How Rigorous is the Type II Audit Process?

To give you a sense of what SOC 2 Type II compliance actually involves, here are some (generalized) examples of what auditors might examine over the entire observation period:

Access Controls: Auditors don't just verify that multi-factor authentication is enabled—they review months of logs to confirm it's consistently enforced, check that access revocation happens immediately when employees separate, and validate that privileged access is continuously monitored and restricted.

Infrastructure Security: Inspection of network architecture and verification that production environments remain properly segmented over time, and review of network infrastructure rules and changes. They validate that GPU nodes and serverless infrastructure maintain appropriate security controls through every update and configuration change.

Incident Response: Auditors review every security incident over the observation period. They examine detection times, notification procedures, remediation actions, and documentation—verifying that our incident response processes work consistently in practice, not just on paper.

Change Management: Every code deployment, infrastructure change, and configuration update across the entire audit period gets scrutinized. Auditors verify that changes consistently go through proper review processes, are tested, and maintain rollback capabilities.

Vendor Management: Since we work with data center partners and other vendors, auditors evaluate how we continuously assess and monitor third-party security, reviewing contracts, ongoing security assessments, and oversight procedures throughout the observation period.

The Type II audit covered our full six-month observation period, meaning auditors examined half a year of evidence across every security control. It's not a checkbox exercise—it's a comprehensive evaluation proving that security is woven into every aspect of our daily operations.

Why Type II Matters More

While Type I certification demonstrated that we had the right controls in place, Type II proves something far more valuable: that we consistently maintain and execute those controls over time. This distinction is critical because:

  • Real-World Validation: Type II shows that our security practices work under real operational conditions, not just in theory
  • Sustained Commitment: It demonstrates months of consistent security practices, proving this isn't just a one-time effort
  • Enterprise Requirements: Many enterprises and regulated industries specifically require Type II certification from their vendors
  • Operational Maturity: Type II proves that our security controls are mature, repeatable, and integrated into our workflows

For customers in healthcare, finance, government, or any regulated industry, Type II certification often isn't just preferred—it's mandatory for vendor approval.

What This Means for Runpod

Achieving SOC 2 Type II represents a major milestone in our evolution as a trusted AI infrastructure platform. Here's what it means for you:

For Enterprises: You can now deploy mission-critical AI workloads on Runpod with the confidence that we meet highly stringent security and compliance standards. Our SOC 2 Type II report is available upon request for your vendor evaluation processes through our Trust Center at trust.runpod.io.

For Everyone: Whether you're training models, running inference, or deploying production workloads, you can trust that your data and compute infrastructure are protected by enterprise-grade security controls that have been independently verified and proven effective over time.

Looking Forward: SOC 2 Type II compliance isn't the end of our compliance journey—it's a foundation. We continue to maintain and improve our security posture through ongoing audits and assessments.

What's Next?

Customers and partners who require a copy of the SOC 2 report can request it through Drata, subject to a signed NDA. Please note that the report cannot be shared without completing this process.

For everyone else, keep building amazing things on Runpod—now with even more confidence in the security, reliability, and operational maturity of our platform.

From Type I to Type II, we're committed to earning your trust every single day.

Newly  Features

We've cooked up a bunch of improvements designed to reduce friction and make the.

Create ->
Newly  Features

We've cooked up a bunch of improvements designed to reduce friction and make the.

Create ->
Newly  Features

We've cooked up a bunch of improvements designed to reduce friction and make the.

Create ->
Newly  Features

We've cooked up a bunch of improvements designed to reduce friction and make the.

Create ->
We're officially SOC 2 Type II Compliant
You've unlocked a referral bonus! Sign up today and you'll get a random credit bonus between $5 and $500
You've unlocked a referral bonus!
Claim Your Bonus
Claim Bonus
Blog

Runpod Achieves SOC 2 Type II Certification: Continuing Our Compliance Journey

Runpod has officially achieved SOC 2 Type II certification, validating that its enterprise-grade security controls not only meet strict design standards but also operate effectively over time. This milestone proves Runpod’s ongoing commitment to protecting customer data and maintaining trusted, compliant AI infrastructure for enterprises and developers alike.

Author
Brendan McKeag
Date
October 13, 2025
Table of contents
Share
Runpod Achieves SOC 2 Type II Certification: Continuing Our Compliance Journey

Back in March, we shared some exciting news: Runpod  achieved SOC 2 Type I certification. Today, we're thrilled to announce the next milestone in our security journey—we've now achieved SOC 2 Type II certification!

If you're wondering what the difference is between Type I and Type II (or why this matters), let's break down our compliance journey and what this means for you.

Understanding SOC 2: Type I vs Type II

SOC 2 (System and Organization Controls 2) is an auditing standard developed by the American Institute of CPAs that evaluates how companies manage and protect customer data across five trust principles: security, availability, processing integrity, confidentiality, and privacy.

SOC 2 Type I assesses whether security controls are properly designed and implemented at a specific point in time. Think of it as a snapshot—auditors verify that you have the right security measures in place and they're set up correctly.

SOC 2 Type II goes much further. It evaluates whether those controls are operating effectively over an extended period—typically six to twelve months. This isn't a snapshot; it's a continuous observation that proves you're consistently following your security practices day in and day out.

When we achieved Type I in March, we demonstrated that our security controls were properly designed. Now with Type II, we've proven that we maintain those controls effectively over time.

How Rigorous is the Type II Audit Process?

To give you a sense of what SOC 2 Type II compliance actually involves, here are some (generalized) examples of what auditors might examine over the entire observation period:

Access Controls: Auditors don't just verify that multi-factor authentication is enabled—they review months of logs to confirm it's consistently enforced, check that access revocation happens immediately when employees separate, and validate that privileged access is continuously monitored and restricted.

Infrastructure Security: Inspection of network architecture and verification that production environments remain properly segmented over time, and review of network infrastructure rules and changes. They validate that GPU nodes and serverless infrastructure maintain appropriate security controls through every update and configuration change.

Incident Response: Auditors review every security incident over the observation period. They examine detection times, notification procedures, remediation actions, and documentation—verifying that our incident response processes work consistently in practice, not just on paper.

Change Management: Every code deployment, infrastructure change, and configuration update across the entire audit period gets scrutinized. Auditors verify that changes consistently go through proper review processes, are tested, and maintain rollback capabilities.

Vendor Management: Since we work with data center partners and other vendors, auditors evaluate how we continuously assess and monitor third-party security, reviewing contracts, ongoing security assessments, and oversight procedures throughout the observation period.

The Type II audit covered our full six-month observation period, meaning auditors examined half a year of evidence across every security control. It's not a checkbox exercise—it's a comprehensive evaluation proving that security is woven into every aspect of our daily operations.

Why Type II Matters More

While Type I certification demonstrated that we had the right controls in place, Type II proves something far more valuable: that we consistently maintain and execute those controls over time. This distinction is critical because:

  • Real-World Validation: Type II shows that our security practices work under real operational conditions, not just in theory
  • Sustained Commitment: It demonstrates months of consistent security practices, proving this isn't just a one-time effort
  • Enterprise Requirements: Many enterprises and regulated industries specifically require Type II certification from their vendors
  • Operational Maturity: Type II proves that our security controls are mature, repeatable, and integrated into our workflows

For customers in healthcare, finance, government, or any regulated industry, Type II certification often isn't just preferred—it's mandatory for vendor approval.

What This Means for Runpod

Achieving SOC 2 Type II represents a major milestone in our evolution as a trusted AI infrastructure platform. Here's what it means for you:

For Enterprises: You can now deploy mission-critical AI workloads on Runpod with the confidence that we meet highly stringent security and compliance standards. Our SOC 2 Type II report is available upon request for your vendor evaluation processes through our Trust Center at trust.runpod.io.

For Everyone: Whether you're training models, running inference, or deploying production workloads, you can trust that your data and compute infrastructure are protected by enterprise-grade security controls that have been independently verified and proven effective over time.

Looking Forward: SOC 2 Type II compliance isn't the end of our compliance journey—it's a foundation. We continue to maintain and improve our security posture through ongoing audits and assessments.

What's Next?

Customers and partners who require a copy of the SOC 2 report can request it through Drata, subject to a signed NDA. Please note that the report cannot be shared without completing this process.

For everyone else, keep building amazing things on Runpod—now with even more confidence in the security, reliability, and operational maturity of our platform.

From Type I to Type II, we're committed to earning your trust every single day.

Build what’s next.

The most cost-effective platform for building, training, and scaling machine learning models—ready when you are.

You’ve unlocked a
referral bonus!

Sign up today and you’ll get a random credit bonus between $5 and $500 when you spend your first $10 on Runpod.