Compliance & regulatory considerations
SaaS compliance is mostly procurement compliance. The framework that matters is whichever one your largest enterprise prospect has put in their security questionnaire. We design the controls once and map them to whatever framework comes next.
SOC 2 Type 1 (in progress)
ISO 27001 control mapping
GDPR & UK GDPR
CCPA / CPRA
HIPAA-eligible architecture
PCI DSS SAQ A scope
Cyber Essentials Plus aware
UAE Data Protection Law
SOC 2 is the lingua franca of B2B SaaS procurement. We are working through SOC 2 Type 1 readiness with our own auditor and we are honest about the stage we are at. For client engagements we deliver compliance-ready architecture against the SOC 2 Trust Services Criteria: access management with least privilege and quarterly reviews, change management through pull requests with required reviewers, vendor management with a documented sub-processor register, incident response runbooks tested with tabletop exercises, encryption at rest (AES-256) and in transit (TLS 1.3 only), structured audit logging with append-only retention, and BCP / DR plans with measured recovery point and recovery time objectives. When you need a Type 2 attestation for your enterprise customers, the controls and the evidence are in place; you run the audit with your chosen auditor.
GDPR is engineering more than legal. Data subject rights (Articles 15 to 22) are first class endpoints, not customer support tickets. Records of Processing Activities, sub-processor registers, DPA appendices, and Standard Contractual Clauses for international transfers are templated and version controlled. EU and UK customer data is hosted in eu-west-2 (London), eu-west-1 (Ireland), or eu-central-1 (Frankfurt) by default, with US clients on us-east-1 or us-west-2. Cross border data flows are documented in the ROPA so the next data protection officer to join the company does not have to reverse engineer them.
HIPAA-eligible architecture for healthcare-adjacent SaaS is available on request: BAA-eligible AWS services only, customer-managed KMS keys, expanded audit logging on PHI access paths, and a separate environment if your customer profile requires it. We will not pretend to be a HIPAA certification body, because no such body exists, but we will deliver the architecture and evidence base your healthcare customers' compliance teams ask for.