Company

OutboundSync is SOC 2 Type II compliant

OutboundSync achieves SOC 2 Type II compliance, enhancing security and reliability for syncing data between HubSpot, Salesforce, and popular GTM tools.


SOC_CPA_BlueOutboundSync is officially SOC 2 Type II compliant. In this post, I’ll explain how we did it and what it means for our company, our partners, and our users.

If you're a Smartlead, Instantly, EmailBison, or SASMail user looking to integrate with HubSpot or Salesforce, you're in the right place. If you're a founder considering pursuing SOC 2, you may find it useful too.

Summary
  • OutboundSync is now SOC 2 Type II compliant and just completed its audit. This comes as the company continues to scale, approaching 20m records synced.
  • Smartlead, Instantly, EmailBison, and SASMail users can integrate HubSpot and Salesforce in a compliant manner that's ready for security review.
  • You can view OutboundSync's Trust Center (controls, compliance, audit coverage, subprocessor list, and more) at trust.outboundsync.com.

 

Why this matters

boy-holding-envelope-illustrationBefore jumping in, let's set some context for why this matters. Because I believe it reflects a larger trend that's years in the making in the outbound space—and one that's still just building momentum with consequences for founder-led startups and SMBs to multinational, publicly traded companies.

The programmatic outbound movement is going mainstream. Sales motions, powered by AI and automation, are becoming more like marketing. And the tools that enable those go to market ("GTM") teams—like Smartlead, Instantly, EmailBison, and SASMail—are getting traction as a result. 

They’re no longer just side projects for solo SDRs trying to book a few more meetings, or growth hackers trying to work around existing tools. They’re powering GTM at fast-growing SaaS teams and mid-market revenue organizations.

As these platforms move upstream, so do expectations. We believe OutboundSync is the best way for companies to sync activity and attribution data from these tools into CRMs like HubSpot and Salesforce—at scale, securely, and reliably.

And we're seeing larger and larger companies wanting to do this, with more complex requirements along the way. With nearly 20m records synced by OutboundSync and counting, we think we're onto something here. And by making this investment in our company, we think we can help bridge the gap to enable revenue teams to run this motion at scale. 

What is SOC 2?

SOC stands for System and Organization Controls. It’s a compliance framework from the American Institute of Certified Public Accountants (AICPA).

A SOC 2 report, which we just attained, is specifically “a report on controls at a service organization relevant to security, availability, processing integrity, confidentiality, or privacy.” (Source: AICPA)

And yes, it’s from the AICPA because, fundamentally, it’s an audit. Having helped run a $20M hardware company that went through inventory counts and financial audits, the structure felt familiar.

But unlike a financial audit, this isn’t just for the finance team. It touches everything:

  • Hiring and onboarding
  • Vendor management
  • Incident response
  • Product development
  • Access control
  • Infrastructure

You don’t just "get" SOC 2... You commit to it—across your company.

SOC 2 Type I vs. Type II

There are two versions of SOC 2:

  • Type I: A snapshot at a single point in time.
  • Type II: An evaluation over a set period (typically 3–12 months).

We chose Type II from the start. The cost and effort are similar, but the level of credibility is higher because it shows that policies are being actively followed over time.

Why we did it

This one’s easy: Our buyers kept asking for it.

We work with a lot of B2B SaaS companies—many of whom are SOC 2 compliant themselves. If you’re one of those companies, it’s a lot easier to use a vendor who also has it.

Security is especially relevant for OutboundSync because we have read/write access to companies’ systems of record (e.g. HubSpot and Salesforce) and are responsible for syncing business communications data. And I always knew I wanted us to invest more in this direction. But when buyers kept asking, it helped get the ball rolling faster.

Having a SOC 2 attestation saves everyone time. But it’s not a substitute for having good security practices. And your SOC 2 attestation can absolutely be deemed insufficient by a CISO who reads through it. So how you do it matters too. Let's talk about that next.

How we did it

Step 1: Deciding whether or not to use a GRC platform

SOC 2 is a set of standards that you choose to follow. You then have to document and manage your compliance.

You can get SOC 2 with spreadsheets, screenshots, and documents that reflect your compliance with those standards. Then send them to an auditor and have them return a report back. This is the way it used to be done. Companies paid a lot more for manual processes and fewer companies did it. 

Or you can invest in a trust management platform or governance, risk, and compliance (GRC) platform that helps you manage the whole thing, provides best practice policies, and includes real-time integrations with the tools in your tech stack. 

The point of a platform is two-fold:

  1. Helps your internal team, vendors, and contractors manage the compliance process.
  2. It provides an easy way for third parties to review your compliance. For auditors, this means issuing a report. For buyers, it means passing their security review process.

Needless to say, I recommend selecting a platform. Especially if you anticipate managing additional programs like ISO, GDPR, CCPA, GDPR, etc. 

Step 2. Choosing a GRC platform

engaving-illustration-llamaWe evaluated several Governance, Risk & Compliance (GRC) platforms.

Some were sketchy. One vendor falsely claimed we were a customer of theirs in a cold email campaign—after we took only one discovery call. Another blatantly misrepresented their product in a sales call. Yikes.

Ultimately we chose Vanta and I'm glad we did. (N.b. their mascot is a llama.)

They essentially created the modern GRC category. And for us, they had the best mix of integrations, platform maturity, quality policy templates to work off of, and appropriate access boundaries.

Many of our buyers also used Vanta. And I suspected that Vanta itself, the platform and their brand, would be trusted as we went through security reviews. I can tell you that this absolutely has been the case and compliance is actually a revenue-driver for us.

Step 3. Selecting an auditor

After you select a platform, you need to select an auditor that will access your instance of that platform. It's how they create the report that represents your actual attestation.

We interviewed several auditing firms and got different vibes from each. Some felt like report mills where they would just plug you into a process to get a PDF on the other side. 

We went with a smaller, more engaged, conscientious, and emerging technology-focused firm, Advantage Partners, based in Seattle. I felt like they would help us get to a place we’d be proud of. And they did.

If you’re in the outbound space like we are, you may be happy to know this auditor also works with Clay. I learned later but it validated my decision when I learned this because I respect the Clay team, what they’re building, and how they’re doing it.

Once you have your platform and your auditor, you just need to roll up your sleeves and work with your team.

Step 4. Preparing for your audit

This is the long, quiet part. Drafting policies. Reviewing templates. Cleaning up vendor lists. Configuring cloud infrastructure. Integrating tools and creating automations.

During this time, a few critical things helped get us ready for our audit.

  • Having a typical tech stack. By using common tools, it was much easier to find integrations and documentation to ensure we were following everything we had to.
  • Learning from others. During our vendor assessment, I got SOC 2 Type II reports from a number of vendors and was able to learn how they did a few things I was unsure of.
  • Upgrading devops. Aikido helps us meet a few requirements and it's now part of our tech stack—we wouldn’t have been able to do this without their tool.
  • Pre-audit checklist. Our auditor shared a useful document that helped me understand a few policies that were difficult to develop.
  • Asking for help. Founder friends like Jade Null at GlitchSecure, Patrick Farwick at Amomitto Security, Daniel Zarick at Arrows, and Bec Hu at Channeled were incredibly generous with their time along the way. 

Any good GRC platform is going to provide templates and out of the box integrations to help you get started. Vanta certainly did for us. But they don't do everything for you. And the auditors don't get started at all until you're ready for them.

Here be dragons! Don't be like other companies I've talked to that got stuck here.

Step 5. Conduct your audit

Once you're ready, you'll go through final review with your auditor and get to work. Audit window/observation periods vary. During this time you will be following all the policies and controls you put in-place earlier.

Once the audit is complete, you'll review your audit with your auditor and provide a management representation or sign off that everything in the audit report is true.

And you're done!

How long did it take

Here's a quick overview of how long it took us to complete the SOC 2 Type II process, from beginning to end. My understanding is that this experience is pretty typical but your mileage may vary.

AUG 2024

It took about a month to wrap my head around the process, decide to do it, and select a GRC platform, and select an auditing firm.

NOV 2024

Finished getting in compliance to start our audit, tracking progress along the way in Vanta before getting signoff from Advantage Partners..

FEB 2025

Completed our initial audit, which was three months. This is now an annual part of how we run our company, and beyond that, we are continuously enforcing our policies and contorls. 

MAR 2025

Finalize the SOC 2 Type II attestation report, including reviewing any final questions with the auditor and signing our management representation letter.

Was getting SOC 2 worth it?

For us, the answer is yes—unquestionably.

We closed deals in the month after getting compliant that exceeded our annual cost of compliance. More importantly, it made our company better.

If you think of your data like water, we consider our role to be like that of an aqueduct, channeling it from one place to another. Especially from remote places (siloed tools) to central locations (your systems of record) where it's more valuable. As an infrastructure company, investing in our security and reliability will always be a priority as it's core to what we do.

engraving-illustration-aqueduct-of-segoviaOur team sleeps easier knowing that we have:

  • Stronger processes
  • Documented fallbacks
  • Shared understanding across the team
  • A security posture we’re proud to show off

It was a forcing function for growth. And now, a foundation for what’s next, the kind of company we’re trying to build for our partners and customers too. 

As the programmatic outbound and GTM engineering approach goes more mainstream, we believe more mid-market and enterprise customers will require it as companies like Smartlead, Instantly, EmailBison, and SASMail get more traction. We've certainly already seen it with Clay. 

The route we didn't take

The security community can be pretty cynical. Fairly so. Add any cyber security professional to your group chat and they can share why. In practice, you can do checkbox security and “get away with it” with many customers.

Just because you’ve made a SOC 2 attestation, it does not mean it will be accepted by your buyers. As lower quality GRC platforms and auditors have entered the market, I'd wager that the percentage of companies getting rejected during security reviews has gone up and will continue to go up.

We didn't go that route.

SOC 2 is a voluntary, self-attestation with limited guardrails. For the most part, it is not prescriptive. In many cases it states that you must have a policy—not what that policy should be. And you can deactivate controls that don’t apply to your company. It's up to each company to define what a good security posture looks like for them.

We are doing our best to get this right from the start.

Is that all?

We’ve identified things we’ll implement in the next year to improve our security posture further. This includes the training, process documentation, and tooling that we use to run our company. But finishing the process did feel a little anti-climactic.

Am I writing this blog post in pursuit of some closure? Perhaps... (Yes.)

To learn more about our security program, visit OutboundSync's Trust Center, continuously monitoring 80 controls, subprocessors, and more. If you're interested in syncing outbound data to your system of record, contact us.

And if you're just interested in SOC 2 in general, I hope this post helps you choose the right security posture for your company.

Thanks for reading and good luck!

One more thing

We couldn’t have done this without joining TinySeed, the accelerator for bootstrapped SaaS companies. I have to acknowledge this because the capital from TinySeed made it possible for us to make this investment as early in our company's life as we did.

Joining TinySeed changed the trajectory of our company. The guidance from their team, other founders in the batch, and of course the funding made this possible.

And as the founder, it changed my life. If you're curious, I wrote about our decision to join TinySeed here: OutboundSync Selected for TinySeed Spring 2024

Similar posts

Get the Outbound Office Hours email newsletter

Learn from outbound experts about advanced workflows to help your team hit their numbers. Sign up today for the latest in outbound sales strategics, tactics, and tools ➔