Security and compliance built into the systems we design, deploy, and operate.
Security and compliance are built into the systems we design, deploy, and operate — not treated as a separate layer. Our approach integrates security practices directly into infrastructure, application development, and ongoing operations.
We believe in transparency about our compliance journey. Below, we outline our current status across key frameworks, our implemented controls, and our roadmap for formal third-party attestation.
We have aligned our cybersecurity program with the NIST Cybersecurity Framework, implementing controls across all five core functions:
Current Status: We meet requirements for NIST CSF Low-Impact baseline and are actively implementing controls to achieve higher maturity levels across all functions.
We implement and operate controls aligned to HIPAA requirements and support clients in maintaining compliant environments, including execution under Business Associate Agreements (BAAs) when required.
HIPAA-aligned environments are implemented and operated as part of our engagements, not treated as a separate compliance layer. Compliance responsibility remains with the covered entity unless explicitly contracted.
Implemented Controls:
Important Note: The U.S. Department of Health & Human Services (HHS) does not offer formal "HIPAA certification." We represent our internal compliance program based on documented policies, procedures, and controls aligned with HIPAA requirements. We conduct regular risk assessments and maintain ongoing compliance monitoring.
We are actively conducting a SOC 2 readiness self-assessment and have documented controls aligned with the AICPA Trust Services Criteria. Our control framework addresses:
Next Steps: We are preparing for formal SOC 2 Type II audit engagement with an accredited third-party auditor. We will update this page when attestation is achieved.
Foundational controls we implement and operate across all client engagements.
We leverage integrated security platforms, monitoring systems, and governance frameworks as part of our delivery model, aligning environments to industry requirements where applicable.
Voss Alan is registered with the System for Award Management (SAM) and maintains an active CAGE Code for federal contracting opportunities.
CMMC Roadmap: We are preparing for Cybersecurity Maturity Model Certification (CMMC) requirements and will pursue formal assessment as DoD contract opportunities arise.
We align environments to industry frameworks and support clients in achieving and maintaining compliance. Formal compliance ownership remains with the client organization unless explicitly contracted.
These controls are implemented and operated as part of our engagements — not provided as standalone advisory.
Our security and compliance capabilities are expanding as part of our managed security and compliance offering. We are committed to:
We discuss our security controls, compliance status, and roadmap in detail with prospective clients.
Contact Us