Log in
product

Tuist is now SOC 2 Type II compliant

We are thrilled to announce that Tuist is now SOC 2 Type II compliant

SOC Type II compliance is a big step in proving our commitment to security and reliability. Whether you’re using Tuist to manage Xcode projects, streamline development, or handle sensitive data, you can trust that we take security seriously.

Unlike SOC 2 Type I, which is a one-time assessment, Type II requires us to demonstrate consistent security practices over several months. This means our security isn’t just a snapshot—it’s baked into how we operate every day.

Here’s why we pursued SOC 2, how we tackled compliance, and what we learned along the way.

Why go for SOC 2?

Security isn’t just a nice-to-have—it’s a necessity. As more teams adopted Tuist, we found ourselves answering security questionnaires and explaining our security measures over and over again. We wanted a clear, industry-recognized way to show that we handle your data responsibly.

SOC 2 helps with that. It’s designed for SaaS companies like us and focuses on the security and privacy of customer data. Achieving compliance means we’ve implemented strong controls and had them independently verified.

Another reason we started early? Future-proofing. Security is easiest when it’s built into a company’s DNA. Instead of scrambling to meet compliance as we scale, we’re setting a strong foundation now—so security never becomes an afterthought.

What is SOC 2 Type II?

SOC 2 is a security and compliance framework developed by the American Institute of CPAs (AICPA). It evaluates companies on five Trust Services Criteria:

  • Security – Protecting systems and data from unauthorized access.
  • Availability – Ensuring services are reliable and accessible.
  • Processing Integrity – Making sure systems operate as expected.
  • Confidentiality – Safeguarding sensitive data.
  • Privacy – Managing personal data responsibly.

SOC 2 has two types of audits:

  • Type I – A one-time assessment of security policies and controls.
  • Type II – A long-term audit (6–12 months) proving those controls are consistently followed.

We went for Type II because we didn’t just want to pass a one-time check—we wanted to show we take security seriously, every day.

Picking the right compliance tool

We needed a compliance tool that worked well with our stack—Supabase, GitHub, Google Workspace, and Tigris. After evaluating:

We landed on Vanta. It had the best automation, worked smoothly with our existing tools, and didn’t require overly intrusive permissions (some alternatives wanted full GitHub access—not happening).

Finding the right auditor

Once we had Vanta set up and running, we needed an independent auditor to review our security practices. Vanta connected us with several options, and we picked one that specializes in SaaS security audits.

The process started with a scoping call, where we determined which systems and processes would be reviewed. Then, we set a date for the audit’s Type II snapshot—a point in time that proves our policies were in place and working as intended.

Preparing for the audit

The months leading up to the audit were all about proving that security was part of our daily workflow. Vanta’s osquery agent helped us track:

  • Device security – Ensuring all company laptops had encryption, screen locks, and proper access controls.
  • Policy enforcement – Creating and refining security policies for access control, data management, and asset tracking.
  • Compliance checks – Verifying we had proper logging, monitoring, and security controls in place.

Another key step was reviewing our vendor security. If we were being audited, we wanted our vendors to meet the same standards. So we asked for SOC 2 reports from any service we relied on that handled sensitive data.

Open security policies

We believe in transparency, which is why we’ve made our security policies public in the Tuist Handbook.

This includes:

  • How we manage access control.
  • How we protect user and project data.
  • Our incident response process.

Security shouldn’t be a black box. By sharing our policies, we make it clear how we operate and hold ourselves accountable to our users.

Making SOC 2 work for us

One thing we didn’t want? Mindless checkbox compliance. Every security control we implemented had to make sense for Tuist—not just to satisfy an auditor.

For example:

  • Access Reviews – Instead of a rigid quarterly review, we built security checks into our onboarding/offboarding process to ensure permissions stay up to date.
  • Incident Response – Rather than a generic playbook, we tailored our process to match how we actually work and respond to security events.
  • Security Training – We kept it practical. Sure, we still had to sit through the “don’t reuse passwords” training video, but we focused on real security risks our team faces.

Launching the Tuist Security Center

We’re also launching the Tuist Security Center, a hub where you can:

  • Learn how we protect your data.
  • Request a copy of our SOC 2 audit report.
  • Get in touch with our security team at [email protected].

Security is an ongoing effort, not a one-time project. We’ll continue improving our security posture, refining our processes, and making sure Tuist stays a trusted tool for developers everywhere.

If you’re working toward SOC 2 yourself, we hope this breakdown helps. It’s a big effort, but it’s worth it—not just for compliance, but for building a truly secure product. 🚀

You might also like

Optimize your Swift test suite to run faster
Slow test suites drag your team down. Learn how to speed up your Swift tests effectively.
Tuist 0.16.0 allows users to link system libraries and frameworks
From the just released 0.16.0 version of Tuist, users will be able to define dependencies with system libraries and frameworks from their targets. Moreover, we added support for customizing the list of input and output files in their target action, and generation of targets with no build settings at all. This version also ships with minor improvements and bug fixes that had been reported by users.
Debugging the communication between Xcode and XCBBuildService
Learn how to debug the communication between Xcode and XCBBuildService with XCBLoggingBuildService.

Supercharge your app development

Get started