Skip to content

Synthetic Users Internal Audit Report

Version: 1.0

Audit Period: January 2025 – January 2026

Report Date: 15 February 2026

Prepared by: Artur Ventura, CTO & CISO

Reviewed by: Kwame Ferreira, CEO


1. Executive Summary

This report presents the findings of Synthetic Users' annual internal audit, evaluating the design and operational effectiveness of security, privacy, and compliance controls across the organization. The audit was conducted in preparation for the SOC 2 Type II renewal cycle and to satisfy internal governance requirements.

Overall Assessment: Controls are operating effectively with no critical deficiencies identified. Five observations were noted, with remediation actions assigned and tracked.


2. Audit Scope

The audit covered the following control domains for the period January 2025 – January 2026:

DomainControls Reviewed
Access Control & Identity ManagementSSO, MFA, RBAC, access provisioning/deprovisioning, privileged access
Data Protection & EncryptionEncryption at rest and in transit, key management, backup immutability
Network & Infrastructure SecurityFirewalls, WAF, IDS/IPS, server hardening, configuration management
Application SecuritySDLC, code review, vulnerability scanning, input validation
Incident ResponseDetection, containment, notification, post-incident review
Business Continuity & Disaster RecoveryBCP, DRP, BIA, DR testing
Third-Party Risk ManagementVendor assessment, contractual controls, ongoing monitoring
HR & Security AwarenessBackground checks, training, code of conduct
Data Management & PrivacyRetention, deletion, GDPR compliance, consent management
Change ManagementChange control process, peer review, deployment procedures

3. Methodology

The audit used the following methods:

  • Inspection: Review of policy documents, configuration screenshots, and system logs.
  • Observation: Verification of controls in live systems (Sprinto dashboards, AWS console, Google Workspace Admin, Cloudflare, Render).
  • Testing: Sample-based testing of control operation (access reviews, change records, incident logs, backup restoration).
  • Interviews: Discussions with CTO, CFO, and engineering team leads to verify understanding and execution of controls.

4. Findings

4.1 Access Control & Identity Management

ControlStatusEvidence
SSO enforced for all corporate and production accessEffectiveGoogle Firebase configuration, Google Workspace SSO settings
MFA mandatory for all usersEffectiveGoogle Firebase MFA policy, Sprinto compliance dashboard
RBAC with least privilegeEffectivePermission system documentation, Render/AWS IAM policies
Access provisioned via SSO — single revocation pointEffectiveOnboarding/offboarding logs
Semi-annual access rights reviewEffectiveAccess review records (July 2025, January 2026)
Privileged access restricted to named individuals with MFAEffectiveAWS IAM user list, Render team settings
Access revoked within 24 hours of terminationEffectiveSampled 3 terminations — all revoked same day

Observation A-01: Access review documentation could be more structured. Currently maintained in Notion; recommend formalizing the review template for audit trail consistency.


4.2 Data Protection & Encryption

ControlStatusEvidence
TLS 1.2+ for all data in transitEffectiveSSL Labs test results (A+ rating), Cloudflare TLS settings
AES-256 encryption at restEffectiveAWS S3 encryption configuration, RDS encryption settings
AWS KMS for key managementEffectiveKMS key policies, rotation configuration
Secrets stored in encrypted vaults (Render env vars)EffectiveNo secrets in source code (GitHub secret scanning clean)
Backups immutable via S3 Object Lock (compliance mode)EffectiveS3 bucket configuration, Object Lock policy

No observations.


4.3 Network & Infrastructure Security

ControlStatusEvidence
AWS Security Groups restrict traffic to required portsEffectiveSecurity group configuration review
Cloudflare WAF blocks known attack patternsEffectiveCloudflare WAF event logs, rule configuration
No SSH access to production serversEffectiveRender service configuration, no SSH keys provisioned
Immutable container deploymentsEffectiveRender deployment logs — containers replaced, never modified
Firewall rules reviewed quarterlyEffectiveReview records (Q1, Q2, Q3, Q4 2025)

No observations.


4.4 Application Security

ControlStatusEvidence
Documented SDLC with security gatesEffectiveSDLC policy v1.6, Git commit history
Peer review required for all production changesEffectiveGitHub branch protection rules, PR merge records
Automated security scanning (SAST/DAST)EffectiveCI/CD pipeline configuration, scan reports
Dependency vulnerability scanning (Dependabot)EffectiveDependabot alerts and resolution logs
Input/output validation via Pydantic schemasEffectiveCode review of API endpoints
Cache-Control headers on sensitive pagesEffectiveHTTP response header inspection

No observations.


4.5 Incident Response

ControlStatusEvidence
Documented incident response planEffectiveIRP v1.1
Severity classification definedEffectiveIRP Section 4.1
72-hour GDPR breach notification processEffectiveIRP Section 4.5, no breaches reported in audit period
Annual tabletop simulation conductedEffectiveSimulation records (2025)
Post-incident review within 10 business daysEffectiveNo major incidents in period; process validated via simulation

Observation A-02: No real security incidents occurred during the audit period to fully validate the incident response process under live conditions. Tabletop simulation was conducted successfully, but a more complex scenario (e.g., simulated data breach with notification workflow) is recommended for 2026.


4.6 Business Continuity & Disaster Recovery

ControlStatusEvidence
BCP documented with RTO/RPO/MTDEffectiveBCP v1.1, BIA v1.0
DRP with multi-provider failoverEffectiveDRP v1.1
Annual DR exercise conductedEffectiveBCP exercise records (2025)
Backup restoration testedEffectiveFull rebuild test (November 2025)
Exit/portability plan documentedEffectiveBCP Section 11

No observations.


4.7 Third-Party Risk Management

ControlStatusEvidence
Third-party risk management policy documentedEffectiveTPRM policy v1.0
Vendor risk categorization (High/Medium/Low)EffectiveVendor register
DPA in place for data-processing vendorsEffectiveDPA agreements on file
Annual review of high-risk vendorsEffectiveReview records for AWS, Render, OpenAI, Anthropic
Subprocessor list disclosed and maintainedEffectiveSubprocessors page on legal site

Observation A-03: Vendor risk register is maintained informally. Recommend consolidating into a structured register with review dates, risk ratings, and DPA expiry tracking.


4.8 HR & Security Awareness

ControlStatusEvidence
Background checks for new hiresEffectiveHR onboarding records
Annual security awareness trainingEffectiveTraining schedule, completion records (2025)
Employee code of conduct with mandatory acknowledgmentEffectiveSigned acknowledgments on file
Monthly security focus communicationsEffectiveEmail records (January–December 2025)

No observations.


4.9 Data Management & Privacy

ControlStatusEvidence
Data retention schedule documentedEffectiveData deletion and retention policy
Data deletion within 30 days of requestEffectiveNo deletion requests received in audit period; process validated
Regional data residency (US, EU, UK, CA)EffectiveAWS region configuration
Privacy policy published and currentEffectivePrivacy policy (updated Feb 2025)
Consent capture via cookie bannerEffectiveCookie policy, banner implementation

Observation A-04: Privacy policy last updated February 2025. Should be reviewed and updated to reflect any changes from the past year, particularly around AI subprocessor updates.


4.10 Change Management

ControlStatusEvidence
Change management policy documentedEffectiveChange management policy
All changes via Git with peer reviewEffectiveGitHub branch protection, PR history
CI/CD pipeline for automated deploymentEffectiveRender deployment configuration
Rollback procedures documentedEffectiveChange management policy, Render instant rollback
Emergency change process definedEffectiveChange management policy

No observations.


5. Summary of Observations

IDDomainObservationPriorityRemediationOwnerTarget
A-01Access ControlAccess review documentation should be formalized with structured templateLowCreate standardized access review template in NotionSecurity LeadQ2 2026
A-02Incident ResponseTabletop simulation should include more complex scenarios (e.g., full breach notification workflow)MediumPlan enhanced tabletop exercise for 2026Security LeadQ3 2026
A-03Third-Party RiskVendor risk register should be consolidated into structured formatLowBuild formal vendor register with review dates and DPA trackingSecurity LeadQ2 2026
A-04Data ManagementPrivacy policy due for annual reviewLowReview and update privacy policyCEOQ1 2026

No critical or high-priority findings. All controls audited were found to be operating effectively.


6. Conclusion

The internal audit confirms that Synthetic Users' security, privacy, and compliance controls are designed appropriately and operating effectively for the audit period. The organization's control environment is aligned with SOC 2 Type II requirements, GDPR obligations, and documented policies.

The five observations identified are low-to-medium priority improvements that will strengthen the control environment further. Remediation actions have been assigned and will be tracked to completion.


7. Approval

NameRoleDate
Artur VenturaCTO & CISO15 February 2026
Kwame FerreiraCEO15 February 2026

Released under the MIT License.