From software development to service delivery, BMC is committed to providing cloud services using industry-leading service locations and a rigorous set of internal processes that meet or exceed international industry security and compliance standards. 

SOC 2 Type II

BMC completes a Type II Service Organization Control (SOC 2) examination annually. This examination is conducted in accordance with attestation standards established by the American Institute of Certified Public Accountants (AICPA). The SOC 2 report is issued by an independent CPA firm and includes a qualified opinion on BMC's controls relative to the security, availability, and confidentiality trust services principles and criteria of its BMC Helix services. The purpose of the SOC 2 report is to provide assurance to BMC and its customers that the BMC Helix services are designed and implemented using effective security controls.  During the examination, the independent auditors evaluate and test controls over the following domains:

  • Organization and management
  • Communications 
  • Risk management and design and implementation of controls
  • Monitoring of controls
  • Logical and physical access controls
  • System operations
  • Change management

The SOC 2 audit document is available upon request and with a signed non-disclosure agreement. For more information, contact your BMC Account Manager or Customer Success Specialist.

Other third-party audits

SOC 1 Type II System and Organization Controls (SOC) for Service Organizations are internal control reports created by the American Institute of Certified Public Accountants (AICPA). They are intended to examine services provided by a service organization so that end users can assess and address the risk associated with an outsourced service. The SOC 1 attestation has replaced SAS 70, and it is appropriate for reporting on controls at a service organization relevant to user entities' internal controls over financial reporting.

SOC 3System and Organization Controls (SOC) for Service Organizations are internal control reports created by the American Institute of Certified Public Accountants (AICPA). They are intended to examine services provided by a service organization so that end users can assess and address the risk associated with an outsourced service. This also report contains a written assertion by service organization management regarding control effectiveness to achieve commitments based on the applicable trust services criteria, as well as the service auditor's opinion on whether management's assertion is stated fairly.

Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) program - is a public-facing registry of security and privacy controls that includes a comprehensive self-assessment of a company's security posture for its cloud offerings. This program offers third-party auditing and certification processes, as well as automated auditing options.

ISAE 3402 - International Standard on Assurance Engagements No. 3402 was developed to provide an international assurance standard for allowing public accountants to issue a report for use by user organizations and their auditors on the controls at a service organization that is likely to impact or be a part of the user organization’s system of internal control over financial reporting.  

OHSAS 18001 - Occupational Health and Safety Management Systems is an international unified approach to the requirements of an occupational health and safety management system. It is a British Standard that exists to help organizations put in place demonstrably sound occupational health and safety performance.

PCI DSS - The Payment Card Industry Data Security Standard is a proprietary information security standard for organizations that handle branded credit cards from major credit card companies. The standard was created to increase controls around cardholder data to reduce credit card fraud. Validation of compliance is performed annually.

PCI 3DS - Payment Card Industry 3-Domain Secure (PCI 3DS) is a PCI Core Security Standard by PCI SSC, supporting the functionality of EMVCo’s EMV 3D Secure core security protocol and respective core function specification. PCI 3DS adds an extra layer of security that lets users authenticate themselves with the service providers or payment gateways during Card-Not-Present (CNP) transactions. It helps in reducing CNP payment frauds and assures security to payment service providers.

SSAE 18 - Statement on Standards for Attestation Engagements (SSAE) No. 18, also referred to as a Service Organization Controls (SOC) 1 report, is an auditing standard for service organizations and serves as the authoritative guidance for reporting. It was drafted with the intention and purpose of updating the US service organization reporting standard so that it mirrors and complies with the international service organization reporting standard ISAE 3402. 

Tier III Certification of Design Documents - As certified by Uptime Institute, tier certification is a performance-based evaluation of a data center's specific infrastructure. The first step in the certification process is the Tier Certification of Design Documents (TCDD) designation. To obtain the TCDD compliance level, Uptime Institute reviews all design documents, ensuring each subsystem among electrical, mechanical, monitoring, and automation meet the fundamental concepts.

HIPAA / HITECHUnder the Health Insurance Portability and Accountability Act of 1996 (HIPAA), AISN is defined as a covered entity or a business associate. As such, we are required to implement policies necessary to secure electronically protected health information (ePHI) in accordance with the HIPAA Security Rule.  Additionally, the HITECH Act includes requirements for organizations that store ePHI to implement procedures to report the breach of unprotected ePHI. Our certification is an attestation to our compliance with the HIPAA Security Rule. Further, our incident response and breach reporting procedures are evaluated against the HITECH requirements.

ISO standards

In collaboration with industry-leading solution experts, the International Organization for Standardization (ISO) team designs and implements standards to ensure the quality, safety, and efficiency of products, services, and systems. ISO does not enforce or certify these standards; rather it relies on independent bodies to assess and certify that your company or service meets them. Certification includes a written attestation that these standards are met, and as such provides the designation along with the version of the standard that is being met, for example ISO27001:2015 designates that the ISO 27001 information security management system launched in 2015 has been met. Standards usually remain static for several years at a time.

ISO 9001 - International Organization for Standardization 9001 sets criteria for a quality management system. Based on a number of quality management principles, this certification assesses customer focus and helps ensure that customers get consistent, good-quality products and services.

ISO 14001 - International Organization for Standardization 14001 certifies that a company's environmental policies, protocols, and procedures meet a standard whereby impact on the environment is minimized.  

ISO 22301International Organization for Standardization 22301 is the international standard for Business Continuity Management (BCM). this certification is designed to help organizations prevent, prepare for, respond to and recover from unexpected and disruptive incidents. 

ISO 27001 - International Organization for Standardization 27001 is a specification for an information security management system. This system is an approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process.

ISO 27017 / 27018 - International Organization for Standardization 27017 and 27018 are cloud-based compliance frameworks for information security controls and privacy protection, respectively. 

ISO 50001 - International Organization for Standardization 50001 specifies requirements for establishing, implementing and maintaining and improving an energy management system, whose purpose is to enable an organization to follow a systematic approach in achieving continual improvement of energy performance. It includes energy efficiency, energy use and consumption.

FedRamp authorization

The US Federal Government is dedicated to delivering its services to the American people in the most innovative, secure, and cost-efficient fashion. Cloud computing plays a key part in how the federal government can achieve operational efficiencies and innovate on demand to advance their mission across the nation. That is why many federal agencies today are using AWS cloud services to process, store, and transmit federal government data.

FedRAMP - Federal Risk and Authorization Management Program is a US federal agency-specific process for assessing and authorizing federal cloud computing products and services. FedRAMP consists of a subset of National Institute of Standards and Technology Special Publication (NIST SP) 800-53 and (NIST SP) 800-171 security controls specifically selected to provide protection in cloud environments.  BMC's FedRAMP certification Open link is defined for the Federal Information Processing Standards (FIPS) 199 Moderate impact level. 

Service location standards

Certifications and standards vary based on the vendor and specific service location. For a comprehensive list of compliance standards, see the following links:

  • Amazon Web Services compliance programs Open link
  • Equinix certifications and standards Open link
  • Microsoft Azure compliance Open link
  • IBM Cloud compliance programs Open link
  • Jitterbit Harmony platform security overview Open link

Service location features

Each BMC-controlled service location adheres to the following minimum standards:


Site characteristics

  • Built to Tier III design specifications
  • Raised floor and/or overhead cable management systems


  • Security framework: based on the NIST SP 800-53 standards at a Moderate level
  • Compliant with NIST SP 800-171
  • Guarded 24 hours a day, 7 days a week
  • Card access or biometrics access
  • Multilevel security card readers with battery backup
  • Closed-circuit television (CCTV) surveillance
  • Automated building monitoring system that oversees facility power, environment, and backup systems
  • Perimeter fence and gate controls 


  • FIPS 140-2 compliant cryptographic ciphers
  • Engineered with redundant network equipment, switches, links, and carriers, ensuring high availability and performance
  • Backbone speeds of the network are based on Gigabit Ethernet and 10-gigabit. Switches and routers have dual power supplies and failover LAN cards.
  • Redundant high speed internet links with multiple carriers for primary sites
  • Redundant firewalls

Electrical and mechanical systems

  • N+1 power infrastructure
  • Redundant grids
  • Mirrored, fully redundant uninterruptible power supply systems (UPS)
  • Redundant diesel generators
  • Redundant power distribution units
  • Redundant chillers, cooling towers, or water pumps
  • Redundant packaged heating and air conditioning units
  • Multizone, dry-pipe sprinkler, and smoke-detector system with VESDA; water-detection system
  • On-site emergency diesel fuel
Was this page helpful? Yes No Submitting... Thank you