Skip to content

Target Operating Model (TOM) Summary Checklist

Governance & Ownership

  • Product, platform, and security ownership defined
  • Clear accountability and escalation paths
  • Risk and vendor oversight managed centrally

People & Access

  • Role-based access control enforced
  • SSO with MFA supported
  • Least-privilege access applied
  • Joiner / mover / leaver process in place
  • Annual security awareness training

Processes

  • Documented SDLC and change management
  • Incident response and breach notification procedures
  • Periodic access reviews
  • Sub-processor oversight and disclosure
  • Defined data retention and deletion processes

Technology & Architecture

  • Multi-tenant SaaS architecture
  • Secure cloud hosting environment
  • Encryption in transit and at rest
  • Centralized logging and monitoring
  • Regular backups and recovery testing

Data & Information Management

  • Data types clearly defined and minimized
  • Logical tenant segregation enforced
  • Secure data export and deletion supported
  • Default data retention: 12 months (configurable)

AI & Automated Processing

  • Intended use of AI documented
  • AI used for research simulation only
  • No fully autonomous decision-making
  • Human review of outputs supported
  • Inputs and outputs logged and auditable
  • External AI providers disclosed
  • No customer data used for model training

Security & Compliance

  • SOC 2 Type II controls implemented
  • Information security and privacy policies maintained
  • Audit logging enabled
  • Vulnerability and dependency monitoring in place
  • ISO 27001: Not claimed

Monitoring & Incident Management

  • Availability and security events monitored
  • Incident response metrics tracked
  • Customer notification processes defined

Documentation & Review

  • Policies and procedures centrally maintained
  • Customer-facing security and legal documentation available
  • Evidence retained for audits and vendor reviews
  • TOM reviewed as part of SOC 2 lifecycle

This Target Operating Model is aligned to our SOC 2 Type II control environment and is reviewed regularly to ensure ongoing security, reliability, and compliance

Last updated 23 June 2025

Released under the MIT License.