Mesta
Mesta
Compliance Framework

SOC 2 Type II

SOC 2 Type II certification demonstrates that Mesta has implemented and maintained effective controls over security, availability, and confidentiality of customer data over a sustained period. The audit evaluates Trust Services Criteria (TSC) across five categories.

Audit In Progress
Coverage
100%
18 / 18 requirements
Controls Mapped
82
Security controls
Policies
15
Supporting policies
Auditor
Prescient Assurance
Scope

All systems, processes, and controls related to the Mesta payment platform, including infrastructure, application security, data protection, and organizational controls.

Framework Requirements

Common Criteria

CC1.1satisfied
Control Environment - COSO Principle 1
The entity demonstrates a commitment to integrity and ethical values.
CC1.2satisfied
Control Environment - COSO Principle 2
The board of directors demonstrates independence and oversight.
CC1.3satisfied
Control Environment - COSO Principle 3
Management establishes structures, reporting lines, and authorities.
CC1.4satisfied
Control Environment - COSO Principle 4
The entity demonstrates a commitment to competence.
CC1.5satisfied
Control Environment - COSO Principle 5
The entity holds individuals accountable for internal control responsibilities.
CC6.1satisfied
Logical and Physical Access Controls
The entity implements logical access security software, infrastructure, and architectures over protected information assets.
CC6.2satisfied
Access Control - New Users
Prior to issuing system credentials and granting system access, the entity registers and authorizes new users.
CC6.3satisfied
Access Control - Modifications and Removals
The entity authorizes, modifies, or removes access to data, software, functions, and services based on roles.
CC6.6satisfied
Logical and Physical Access - Encryption
The entity implements encryption to protect data at rest and in transit.
CC6.7satisfied
Transmission of Data
The entity restricts transmission, movement, and removal of information to authorized users.
CC7.1satisfied
Detection of Security Events
The entity identifies and implements detection measures to identify anomalies.
CC7.2satisfied
Security Incident Response
The entity monitors system components and the operation of those components.
CC7.3satisfied
Security Incident Evaluation and Response
The entity evaluates security events to determine whether they could impact the system.
CC8.1satisfied
Change Management
The entity authorizes, designs, develops, configures, documents, tests, approves, and implements changes.

Availability

A1.1satisfied
Availability Performance
The entity maintains, monitors, and evaluates current processing capacity.
A1.2satisfied
System Recovery and Business Continuity
The entity authorizes, designs, develops, implements, operates, approves, maintains, and monitors environmental protections.

Confidentiality

C1.1satisfied
Confidentiality Controls
The entity identifies and maintains confidential information.
C1.2satisfied
Confidential Information Disposal
The entity disposes of confidential information to meet the entity objectives.

Mapped Controls (82)

Chat with us!