{"id":46173,"date":"2021-07-21T15:00:00","date_gmt":"2021-07-21T19:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=46173"},"modified":"2024-11-14T19:08:52","modified_gmt":"2024-11-15T00:08:52","slug":"staying-soc-2-compliant-remote-workers","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/staying-soc-2-compliant-remote-workers","title":{"rendered":"Staying SOC 2 Compliant with Remote Workers"},"content":{"rendered":"\n

With many of today\u2019s companies taking advantage of hybrid or fully remote work environments, IT departments have to take extra steps to ensure they\u2019re staying SOC 2 compliant as employees transition between in-office and remote work. <\/p>\n\n\n\n

While traditional identity management solutions struggle to host remote work due to on-prem infrastructure and the inflexibility that follows, cloud-based infrastructure allows organizations to quickly adapt to a changing work environment and provides much-needed system control that directly affects compliance. <\/p>\n\n\n\n

This new work model that allows employees to work from anywhere presents unique challenges for organizations. New processes have to be implemented to retain control over remote users and systems, and existing processes need to be revamped to remain useful in this modern, tech-centric era. A few examples of these processes are: <\/p>\n\n\n\n