BlogAboutSupportSign In
    Governance March 18, 2026 12 min read

    SOC 2, ISO 27001, and GDPR Badges: What Integration Vendors Are Not Telling You

    Most integration vendors display SOC 2, ISO 27001, and GDPR badges with no verifiable proof. Here is how to check a SOC 2 certified integration platform — and what we found when we audited the market.

    SOC 2, ISO 27001, and GDPR Badges: What Integration Vendors Are Not Telling You — Governance guide by APIWORX

    > TL;DR: Compliance badges have become marketing wallpaper. SOC 2 is an attestation report, not a certificate. ISO 27001 certificates carry a unique number you can verify on IAF CertSearch and UKAS CertCheck. GDPR is a regulation, not a badge. We audited multiple India-based integration vendors marketing to UK and US mid-market buyers — Constacloud, eZintegrations, and APPSeCONNECT — and found a consistent pattern of unverifiable claims. Here is the verification playbook every enterprise buyer should run before signing a contract.

    Key takeaways

    • SOC 2 is an AICPA attestation report from a named CPA firm — not a certificate. There is no public registry. Demand the report under NDA.
    • Every legitimate ISO 27001 certificate has a unique number, a named accredited certification body, and is verifiable on IAF CertSearch or UKAS CertCheck in under 60 seconds.
    • GDPR is a regulation. Real readiness requires a signed DPA, a named EU Representative under Article 27, and a documented 30-day response window.
    • Constacloud, eZintegrations, and APPSeCONNECT all display compliance claims that do not hold up to verification.
    • Real SOC 2 Type II costs $50,000–$200,000 and takes 9–10 months. Real ISO 27001 costs $10,000–$50,000 plus annual surveillance. The economics explain the badge inflation.

    What These Certifications Actually Require

    If you are evaluating an integration platform for your e-commerce or SaaS stack, you have almost certainly seen the badges: "SOC 2 Type II Certified." "ISO 27001:2022 Certified." "100% GDPR Compliant." They appear on pricing pages, trust centers, and sales decks. They look authoritative. Most of them are not.

    This post documents a specific pattern we found while researching the competitive landscape for APIWORX. The pattern is consistent enough across multiple vendors that it deserves a name: badge inflation. It is the practice of displaying compliance logos with no verifiable documentation behind them — no certificate numbers, no named audit firms, no downloadable reports. For enterprise buyers, it is a serious problem. For vendors selling to enterprise buyers, it is apparently a temptation that many cannot resist.

    Before looking at specific vendors, it helps to understand what each of these standards actually is — because the terms are not interchangeable, and some are not even certifications at all.

    SOC 2 Is Not a Certificate

    SOC 2 is not a certificate. It is an attestation report issued by a licensed CPA firm operating under AICPA standards. There is no central registry where you can look up a company and confirm their status. A real SOC 2 engagement requires:

    • A named CPA audit firm
    • A report dated within the past 12 months
    • A clear designation of Type I (point-in-time design assessment) versus Type II (operating effectiveness tested over a 6–12 month observation period)

    Enterprise procurement teams require Type II. Getting to Type II takes a minimum of 9–10 months from scratch and costs between $50,000 and $200,000 or more, depending on scope and firm. When a vendor says "SOC 2 compliant" without being able to produce an actual report, they are using a marketing phrase, not a compliance status.

    ISO 27001 Is Verifiable in 60 Seconds

    ISO 27001 is a real, verifiable certificate issued by an accredited certification body — firms like Bureau Veritas, TÜV, SGS, BSI, or LRQA. Every legitimate ISO 27001 certificate carries:

    • A unique certificate number
    • The name of the issuing body
    • The accreditation body that oversees that issuer
    • A defined scope
    • Validity dates

    Certificates are valid for three years but require annual surveillance audits to remain active. You can verify any legitimate ISO 27001 certificate on two public databases: IAF CertSearch at iafcertsearch.org and UKAS CertCheck at certcheck.ukas.com. If a vendor cannot give you a certificate number, they do not have a certificate.

    GDPR Is a Regulation, Not a Badge

    GDPR is a regulation, not a certification. There is no badge to earn. Real GDPR readiness for a non-EU company processing EU personal data requires, at minimum:

    • A signed Data Processing Agreement (DPA) available to customers
    • A named EU Representative as required under Article 27 of the regulation
    • Documented legal bases for each type of data processing
    • A commitment to respond to data subject requests within 30 days under Article 12

    A privacy policy that says "we take data seriously" is not GDPR compliance.

    What We Found When We Looked

    We reviewed several India-based integration vendors who market to the same UK and US mid-market buyers that APIWORX serves. The findings were consistent.

    Constacloud / Commercium

    Constacloud, which operates the Commercium integration product, claims "ISO 27001:2022 Certified" and "100% GDPR Compliant" on its product pages. We searched both IAF CertSearch and UKAS CertCheck. No certificate appeared for Constacloud or Commercium on either database.

    Constacloud operates its own trust center through the TrustCloud platform. That trust center lists SOC 2 Type I and Type II assessments — but no ISO 27001 certificate appears anywhere in it. The company is claiming ISO 27001 certification on its marketing pages while its own trust center does not show one.

    The GDPR situation is similar. The Constacloud privacy policy:

    • Documents no legal bases for data processing
    • Names no EU Representative
    • Includes no DPA for customer download
    • Names no DPO
    • Refers to response timelines as a "reasonable timeframe" — not the 30-day maximum required by Article 12 of GDPR
    • References no supervisory authority

    This is not a minor gap; it is a structural absence of the documentation that GDPR compliance requires.

    There are also basic corporate facts that prospective customers should know. Constacloud was formally incorporated on January 31, 2020, per the Indian Ministry of Corporate Affairs (CIN: U72900CT2020PTC009939). The company markets itself as having "10+ years in business." Its registered address is a residential building in Korba, Chhattisgarh — a Tier 3 coal-mining city. Third-party business data from ZoomInfo reports a headcount of 11–50 employees. The company's own marketing claims "800+ clients worldwide" and "$5Bn+ GMV processed." These numbers do not add up.

    > A real SOC 2 Type II report costs between $50,000 and $200,000 USD and takes a minimum of 9–10 months to complete. ISO 27001 certification from an accredited body costs $10,000–$50,000 USD, plus annual surveillance audits. For a bootstrapped company of 11–50 people, these are prohibitive costs — but enterprise buyers expect to see the badges. The incentive to claim compliance without achieving it is high. Enforcement from India is essentially nonexistent.

    eZintegrations

    eZintegrations (operated by Brycksoft Pvt. Ltd., headquartered in Hyderabad, India) claims "SOC 2 TYPE II CERTIFIED," "GDPR COMPLIANT," and "HIPAA COMPLIANT" on its homepage — all as standalone badges with no documentation attached. We applied the same verification playbook.

    For SOC 2: no CPA firm is named on any public-facing page, no report date is disclosed, and no NDA-gated trust portal exists from which a Type II report can be requested. SOC 2 is an attestation report — without a named CPA firm, the claim is unverifiable on its face.

    For ISO 27001: the homepage does not display ISO 27001 as a badge, but the security page references "ISO-aligned controls." "ISO-aligned" is not a certified status. We searched IAF CertSearch and UKAS CertCheck for both Brycksoft and eZintegrations. No certificate appeared on either database.

    For GDPR: the privacy policy names no EU Representative under Article 27, includes no DPA available for customer download, and does not document the legal bases for processing required under Article 6. Data subject response timelines are described in vague terms rather than the 30-day maximum required under Article 12.

    The HIPAA claim is the most telling internal contradiction. The marketing page reads "HIPAA COMPLIANT." The FAQ on the same site describes "HIPAA-ready practices." HIPAA-ready and HIPAA-compliant are materially different positions — one is aspirational, the other carries Business Associate Agreement obligations under 45 CFR §164.504(e). When a vendor's own pages contradict each other on a compliance claim, the compliance posture is aspirational, not operational.

    APPSeCONNECT

    APPSeCONNECT (operated by InSync Tech-Fin Solutions Ltd., headquartered in Kolkata, India, with a US entity registered in Delaware) claims both ISO 27001:2022 and SOC 2 Type II on its security page. The verification trail does not hold up.

    A 2023 press release from the company announced ISO 27001:2013 certification — the legacy standard. The current security page now shows ISO 27001:2022 — a separate standard version that requires a formal transition audit by an accredited certification body before October 2025. No transition certificate number is displayed, no accredited certification body is named, and no result appears on either IAF CertSearch or UKAS CertCheck for InSync Tech-Fin Solutions or APPSeCONNECT under either standard version.

    For SOC 2 Type II: no CPA firm is identified, no report date is disclosed, and no NDA-gated mechanism exists to request the report. The badge appears with no underlying audit reference.

    For GDPR: the privacy policy references GDPR but does not name an EU Representative under Article 27 (mandatory for non-EU processors handling EU personal data), and the DPA referenced in the terms is not available for download without a sales conversation. The list of sub-processors required under Article 28(2) is not published.

    For corporate diligence: InSync Tech-Fin Solutions Ltd. is a publicly searchable Indian entity. Headcount on third-party business data sources is materially lower than the "200+ professionals" claim on the marketing site. The Delaware US entity exists primarily for invoicing — it does not change the data residency, processing location, or supervisory authority for EU or UK personal data, which remain in India.

    Pattern across all three vendors

    The three vendors above are not outliers. They share a consistent pattern: prominent compliance badges on marketing pages, no verifiable certificate numbers, no named auditors or certification bodies, GDPR privacy policies missing structural Article 27/28 elements, and corporate-history claims that do not reconcile with their official Ministry of Corporate Affairs filings. Any one of these gaps would be a yellow flag. The combination is a procurement stop signal.

    How to Run Your Own Due Diligence

    The good news is that real compliance is verifiable. If a vendor is legitimate, these checks take minutes. If they are not, the conversation usually ends quickly.

    Standard What to Ask For How to Verify
    SOC 2 The actual audit report under NDA CPA firm named on cover page; Type II designation; report dated within last 12 months
    ISO 27001 Certificate number and certification body Search the number on IAF CertSearch or UKAS CertCheck
    GDPR Signed DPA, named EU Representative, 30-day SLA Article 27 representative is a legal requirement, not optional

    For SOC 2, request the actual audit report under NDA before you sign any contract. The report will name the CPA firm on the cover page. Confirm it designates Type II and check that the report date is within the past 12 months. If a vendor refuses to share the report under NDA or says they "can't share it for legal reasons," that is not a normal response — a real SOC 2 report is specifically designed to be shared with prospective customers.

    For ISO 27001, ask the vendor for their certificate number and the name of their certification body. Then search that certificate number directly on IAF CertSearch or UKAS CertCheck. A valid certificate will appear. No number provided means no certificate exists.

    For GDPR, ask for a signed DPA as part of your pre-contract review. Verify that an EU Representative is named — this is a legal requirement under Article 27 for any non-EU company processing EU personal data, not an optional best practice. Confirm that response timelines are explicitly capped at 30 days. If a vendor cannot provide a DPA, they are not structured for EU compliance regardless of what their website says.

    These are not adversarial requests. Any vendor with real compliance infrastructure will answer them without hesitation.

    Why This Pattern Exists

    The economics are straightforward. Mid-market and enterprise e-commerce operators in the UK and US require security certifications as a baseline before they will onboard a new integration vendor. The certifications are expensive and slow to obtain. The badges are easy to copy from a competitor's website. Enforcement across international borders is minimal.

    The result is a market where compliance badges have become a default visual component of SaaS marketing pages rather than a meaningful signal of actual security posture. This is damaging to buyers who rely on those signals to make vendor decisions — and to vendors who have done the actual work and now have to distinguish themselves from companies that have not.

    This pattern sits inside a larger problem we have written about elsewhere: the hidden cost of cheap offshore integration developers and the broader case for treating vendor vetting as a Know Your Vendor (KYV) discipline on equal footing with KYC. Badge inflation is the marketing surface; the underlying issue is that controllers — not vendors — carry the regulatory liability when these claims fail.

    Where APIWORX Stands

    APIWORX is currently pursuing SOC 2 compliance through TrustCloud and holds itself to the verification standard described in this post. That means: when we make a compliance claim, we will be able to back it with a certificate number, a named audit firm, or a downloadable report. We will not display a badge that we cannot verify on demand.

    You can read our current security posture and architecture for the technical detail, and our Why Operations Leaders Choose APIWORX page for the broader vendor philosophy.

    We are publishing this research because we believe buyers deserve accurate information when making integration vendor decisions. If you are evaluating platforms at the $5M–$30M GMV tier, compliance documentation should be a non-negotiable part of your vendor review process — not something you assume is accurate because a badge appears on a product page.

    FAQ

    Is SOC 2 a certification?

    No. SOC 2 is an attestation report issued by a licensed CPA firm under AICPA standards. There is no central registry and no certificate number. The only valid proof is the actual report, which a real vendor will share under NDA. Anyone displaying a "SOC 2 Certified" badge without a report behind it is using a marketing phrase, not a compliance status.

    How do I verify an ISO 27001 certificate?

    Ask the vendor for their certificate number and the name of their accredited certification body (Bureau Veritas, TÜV, SGS, BSI, LRQA, or similar). Then search that number on IAF CertSearch or UKAS CertCheck. The verification takes under a minute. If no number is provided, no certificate exists.

    What does real GDPR readiness look like?

    A signed Data Processing Agreement (DPA) available to customers, a named EU Representative under Article 27, documented legal bases for each processing activity, a designated DPO where required, and a documented commitment to respond to data subject requests within the 30-day window required by Article 12. A privacy policy alone is not GDPR readiness.

    How much does real SOC 2 Type II cost?

    Between $50,000 and $200,000 USD for the initial engagement, plus 9–10 months of preparation and a 6–12 month observation window. Costs vary by scope, firm, and the maturity of the vendor's existing controls. Vendors with 11–50 employees claiming SOC 2 Type II without disclosing their CPA firm should be treated with skepticism.

    Why are India-based integration vendors specifically called out here?

    The pattern we documented appears consistently among India-based vendors marketing into UK and US mid-market buyers. The economic incentive (high badge demand, low enforcement risk across jurisdictions) is structurally larger for vendors operating outside the regulatory reach of buyers' supervisory authorities. The same verification process applies regardless of vendor geography.

    What is the controller's liability if a vendor's compliance claim is false?

    Under GDPR Article 28, the controller — not the processor — is fined when a vendor mishandles data. Relying on an unverified compliance badge does not transfer liability. The same logic applies under DORA for EU financial entities and under CCPA for California businesses. Verification is the controller's obligation.

    Talk to APIWORX

    If you are actively evaluating integration vendors and want to understand how APIWORX approaches data handling and compliance, we are happy to have that conversation directly. Book a free assessment and we will show you where our compliance work stands today — not where we hope it will be someday.

    See the APIWORX platform in action

    Tell us about your systems and we'll build a tailored automation plan within 24 hours.

    Related Articles

    See the platform behind trustworthy operations

    Tell us about your systems and challenges — our team will build a tailored automation plan within 24 hours.