Built for the CISO
Governance & Compliance Suite

Audit-Ready

Governance & Compliance

Seven compliance tools purpose-built for startups — from SOC 2 control tracking and vendor risk management to PII inventory, DPA lifecycle, security incidents, and compliance calendars. Wired into AI Contract Analyzer for automated risk extraction across your vendor agreements.

SOC 2 ready

GDPR compliant

Auditor-ready exports

Compliance posture
Live Data

CC1–CC9

SOC 2 controls baseline

Art. 30

GDPR records ready

AAL2

NIST 800-63B + MFA

Auditor

JSON export ready

Compliance Suite

Seven tools. One compliance platform.

From SOC 2 control tracking to vendor risk, PII inventory, DPA management, security incidents, training tracking, and compliance calendars — every tool feeds the next. AI Contract Analyzer integration is one click away.

Premium

SOC 2 Control Tracker

Track SOC 2 Common Criteria (CC1–CC9) evidence in one place. Seed a 30-control baseline, attach evidence per control, export auditor-ready JSON.

CC1–CC9 baseline seeded in one click

Inline status + evidence attachment

Readiness % scoreboard by category

Auditor-ready JSON export

Premium

Vendor / Subprocessor Register

Track every SaaS vendor and subprocessor — DPA status, renewal dates, regions, data classes. Satisfies GDPR Art. 28 disclosure.

DPA lifecycle (pending/signed/expired)

Subprocessor flag for public /trust page

Renewal alerts

Data-class tagging

Premium

Security Incident Register

Log and triage security incidents, distinct from ops incidents. Severity tracking, postmortem URL, regulatory notification clock.

Severity + status workflow

Mean-time-to-resolve

Detection-source tagging

Postmortem links

Premium

PII & Data Inventory

GDPR Art. 30 records of processing activities. Data classification, retention schedules, legal basis, owner teams.

Public / internal / confidential / restricted

Retention-day tracking

GDPR Art. 6 legal-basis capture

Owner-team attribution

Premium

DPA Management

Data Processing Agreements with vendors and customers. Signature lifecycle, renewal tracking, SCC version capture.

Draft → signed → expired lifecycle

Counterparty type (vendor/customer/subprocessor)

Renewal alerts

Standard Contractual Clauses version

Premium

Security Training Tracker

Track team security training completion — phishing, SOC 2 awareness, GDPR, password hygiene. Overdue detection.

Per-user completion tracking

Due-date alerts

Completion-rate reporting

Certificate URL capture

Premium

Compliance Calendar

Deadline tracker for SOC 2 / GDPR / CCPA / HIPAA events. Recurring milestones, renewal alerts, auto-overdue flagging.

Framework-tagged events

Recurring cadences

Auto-overdue detection

Per-event assignment

Premium

Data Subject Requests

GDPR / CCPA DSR queue for the platform-global contact graph. Public submission with magic-link verification; admin processing erases shared rows in one transaction and fans out suppression entries across the platform.

Public submission + magic-link verification

Erasure: redact + cascade-delete identifiers/sources/cache

Auto-populate suppression list per request

Statutory window tracking (30d EU/UK · 45d CA)

Premium

Suppression List

Identifiers that must never be re-sourced. Auto-populated by erasure DSRs; manually editable by platform admins for hard bounces and known opt-outs. Checked on every sourcing lookup.

Email / LinkedIn / GitHub / phone / domain types

Hashed display option for redacted identifiers

Reason tagging (DSR / opt-out / bounce / spam / manual)

Resolver short-circuits on suppression hit — no spend

Standards & Frameworks

Built to the standards your enterprise buyers ask about

Identity, audit, privacy, and application security — every claim below maps to a feature you can demo. Drop this page into your security questionnaire response.

Identity & Access

NIST SP 800-63B

Digital Identity Guidelines (AAL2)

Implemented

Multi-factor authentication, password rules, session management, and re-authentication thresholds aligned to Authenticator Assurance Level 2.

Evidence: TOTP MFA · refresh-token rotation · session idle/absolute timeouts · sessionVersion atomic revoke

OWASP ASVS L2

Application Security Verification Standard

Implemented

V2 Authentication, V3 Session Management, V7 Cryptography. Verified against the level required for SaaS handling business-critical data.

Evidence: PBKDF2-SHA256 (100k iter) · device fingerprint · idle timeout · concurrent-session cap

RFC 6238

TOTP — Time-based One-Time Passwords

Implemented

Time-based 6-digit codes for MFA, compatible with Google Authenticator, Authy, 1Password, etc.

Evidence: Self-service TOTP enrollment · backup codes (Phase 4) · per-device trust

RFC 6749 §10.4

OAuth 2.0 Refresh-Token Rotation

Implemented

Every refresh issues a new token; reuse of a rotated token revokes the entire session family. Token-theft detection per the OAuth Security BCP.

Evidence: Family-id chain · automatic family revoke on reuse · hashed tokens at rest

OWASP Top 10 — A07

Identification & Authentication Failures

Implemented

Mitigations for credential stuffing, brute force, session hijacking, and weak recovery flows.

Evidence: Email enumeration prevention · double-verify email change · MFA · sessionVersion bump on password change

Audit & Controls

SOC 2 Type II

Trust Services Criteria (CC1–CC9)

Audit-ready

Evidence collection across all five Common Criteria categories — control environment, communication, risk, monitoring, and access.

Evidence: 30-control baseline · evidence attachment · auditor JSON export

ISO/IEC 27001:2022

Information Security Management System

Aligned

Annex A control mapping for access control, cryptography, supplier relationships, and incident management.

Evidence: Vendor register · incident register · access reviews · audit trail

ISO/IEC 27002:2022

Information Security Controls

Aligned

Implementation guidance for the 93 controls referenced by ISO 27001:2022 Annex A.

Evidence: Mapped to product features in the Compliance Calendar

Privacy & Data Protection

GDPR (EU 2016/679)

General Data Protection Regulation

Implemented

Art. 30 records of processing, Art. 28 subprocessor disclosure, Art. 32 security of processing, 72-hour breach notification.

Evidence: PII inventory · DPA lifecycle · subprocessor /trust page · incident clock

CCPA / CPRA

California Consumer Privacy Act

Implemented

Data subject access, deletion, and opt-out rights for California residents.

Evidence: DSR portal · suppression list · right-to-delete workflow

ISO/IEC 27701:2019

Privacy Information Management

Aligned

Extension to ISO 27001 covering controllers and processors of PII.

Evidence: Data inventory · processing-purpose tagging · retention schedules

Application Security

OWASP Top 10 — A01

Broken Access Control

Implemented

RBAC + multi-tenant scoping enforced at the route layer; per-route permission checks.

Evidence: Role-based access control · account+company dual-key scoping · per-feature gates

NIST SP 800-53 (selected)

Security & Privacy Controls

Aligned

Mapped subset for AC (Access Control), AU (Audit), IA (Identification), and IR (Incident Response).

Evidence: Audit log · access reviews · MFA · incident register

Need this in a questionnaire format?

Export the full standards matrix as JSON or PDF fromSOC 2 Control Tracker.

Review your account security

Frequently Asked Questions

How does BurnRateOS help with SOC 2 compliance?

How does the Vendor Register support subprocessor management?

Does BurnRateOS support GDPR compliance?

How are security incidents tracked?

What does the Compliance Calendar do?

Which authentication standards does BurnRateOS implement?

How do you handle session security and trusted devices?

Ready to Be Audit-Ready?

Join startups using our governance and compliance suite to track SOC 2 controls, manage vendor risk, and pass security audits with confidence.

No credit card required • Free forever plan • Setup in 2 minutes

🎯 BurnRateOS

Survival-driven agile platform for startups. Where every feature either extends your runway, gets you paid, or validates the business.

Foundations

Integrations & Migrations

AI Coach

Companies & Contacts

Foundational capabilities that power every BurnRateOS domain.


© 2026 Fix Faster LLC. All rights reserved.

Survival-driven agile platform 🎯 · v2026.05.13