Most companies tighten security after a wake-up call. At Softdocs, we never wait for one.
Security at Softdocs isn’t a one-time initiative or a line item on a checklist—it’s a continuous mindset that shapes how we plan, build, and evolve our platform.
“Our main approach to security is prevention over remediation. As early as possible, we try to plan for potential vulnerabilities and security holes. Before we even write the code, we want that in place.”
Steven Lowder, Engineer V, Security Softdocs
Let’s break down exactly how this prevention-first approach is built into our operations and our technology.
“Our authorizations go above and beyond what most companies try to do these days,” says Steven. The platform's authorization model is incredibly granular and allows customers to set detailed permissions that dictate what a user can or can’t do.
This level of control is foundational to prevention. By clearly defining who can view, edit, or share specific types of information, Softdocs minimizes opportunities for human error or unauthorized access long before issues occur. It also helps institutions meet compliance standards and internal governance requirements without adding administrative burden.
Built-in access controls make it easy to cordon off different parts of the application when necessary, so institutions can confidently manage access for different departments, roles, and individual users.
Everybody can work efficiently within the same system, while still staying securely in their own lanes.
At Softdocs, we maintain several certifications that validate our commitment to practical, proactive security.
NIST 800-53 (National Institute of Standards and Technology Special Publication 800-53) is a comprehensive framework of cybersecurity requirements that guides all of our security decisions, including the implementation of 80 specific controls necessary to achieve SOC 2 Type II compliance.
Our SOC 2 Type II certification isn’t a one-time accomplishment. It requires annual audits, making it a major undertaking for a company of our size.
They do a full audit of our company, down to the nitty-gritty details of how we write code. We produce all the artifacts to show we’re following compliance guidelines. Every auditor says, ‘I can’t believe a company of your size does this.’
Steven Lowder, Engineer V, Security Softdocs
What's even more impressive? Softdocs has never been downgraded in a SOC 2 Type II audit.
Not a single error. Not a single oversight.
We know that most of our customers manage a significant amount of student, staff, and constituent personally identifiable information (PII) within the system. It’s our job to protect that data—and we take that responsibility seriously.
That’s why our complete audit trails track every time a user views or accesses any type of data within the system.
“Our application audits every single data access or change,” says Steven. “We can go back into our logs 60 days, 90 days, or even a year to see who accessed what.”
Steven highlights a recent example of when a customer created a form incorrectly, allowing users to access other people’s information.
“They asked us for help to see who saw what, when, and where,” Steven explains. “We were able to get that information down to the second through our logs.”
Our proactive approach helped the institution to immediately identify the scope of the issue, notify affected users, and correct the form—without any lingering uncertainty about who had access. As Steven says, “When mistakes are made, we can help remediate that problem quickly.”
For many companies, security training is an annual or sporadic check-the-box exercise. At Softdocs, we focus on continuous learning and education, as evidenced by our Security Ranger training program.
We dedicate at least one of only a few developers on every team to serve as a Security Ranger, meaning they go through specialized training on application security practices and are the point of contact for any kind of app and security information. It’s unusual for a company of our size to invest this heavily in dedicated, in-house security training, but we know it’s non-negotiable for keeping security top of mind in every project.
Steven Lowder, Engineer V, Security Softdocs
This isn’t about generic or high-level lessons. We’ve developed our own security training specifically for this program to equip Rangers with the knowledge and best practices they need to do security reviews on every line of code.
“Even when code is being written and features are being thought of, we can make sure vulnerabilities aren’t being introduced. If they are, we’re catching them early,” adds Steven.
The program doubles as a learning and development opportunity for the entire team, since no one serves as Security Ranger indefinitely. After a set period, another team member steps into the role, ensuring that developers are continuously trained on security best practices. This rotation keeps security knowledge circulating across the team, rather than tied to any one individual.
At Softdocs, security isn’t an afterthought or an add-on—it’s an integral part of how we build and operate every single day. We’re committed to helping institutions modernize with confidence, while knowing their data is protected at every step.
If you’re rethinking your security strategy, now’s the perfect time to dig deeper. Many threats don’t show up in firewall logs. They hide in edge cases where physical access and digital systems collide.
In this Cybersecurity Awareness Month webinar, Cameron Armistead, Cloud and Information Security Manager at Softdocs, will walk through real-world examples of overlooked vulnerabilities that can lead to serious security gaps. You’ll gain practical ways to assess these threats and strengthen your defenses without overhauling your entire strategy. Duration: 30 minutes.
Check out this on-demand webinar to learn more.
Tags