Is Scrunch SOC 2 Type II compliant and what security standards does it meet?

Yes. Scrunch has successfully completed a SOC 2 Type II audit conducted by an independent third‑party auditor.

Scrunch maintains comprehensive security controls across infrastructure, organizational practices, product safeguards, internal procedures, and data privacy protections.

Verify in the Scrunch Trust Center

You can independently review Scrunch’s security posture in the public Scrunch Trust Center. It provides:

Image of Scrunch Trust Center

Enterprise security features

Example: implementing SSO with a SAML 2.0 provider

  1. Request activation from Scrunch support to enable SSO.
  2. Configure the Scrunch application in your identity provider (Okta, Entra ID, etc.).
  3. Share IdP metadata with Scrunch.
  4. Test and deploy, then enforce SSO organization‑wide.

Step‑by‑step instructions for supported providers are available in the SSO integration guide.

Related FAQs