Lacework Security & Compliance Status
Before you share customer data with Lacework, your compliance team needs documented proof they can be trusted. ThirdProof investigated Lacework across 27 intelligence sources — here's what we found.
- SOC 2 Status
- Lacework has not had a SOC 2 claim detected on their trust page.
- Sanctions Screening
- Lacework returned no matches in OFAC SDN, EU Consolidated, and UN sanctions screening.
- Risk Tier
- ThirdProof assigned Lacework a Moderate Risk tier with 96% confidence across 27 intelligence sources.
27 sources checked. Every investigation delivers two audit-ready artifacts: a risk report and an auto-filled security questionnaire — built from independent evidence, not vendor self-attestation.
Get Lacework's Full Report Free →Certification & Compliance Status
Need a complete vendor security questionnaire?
Run a full ThirdProof investigation to get 133 security questions auto-filled with source evidence — ready for your next audit or vendor onboarding review.
Get Lacework's Full Report Free →Assessment Preview — 23 Sources Queried
Run your own investigation to see the full evidence chain, compliance assessment, and recommended actions.
Get Lacework's Full Report Free →Executive Summary Preview
Lacework (lacework.com) is a cloud security vendor assessed at Tier 3 (Moderate Risk) with a 96% confidence score, reflecting a mixed security posture that includes meaningful positive signals alongside notable transparency and configuration gaps. On the positive side, Lacework presents several reassuring indicators: - The domain has been established for over 23 years, registered since 2002 via enterprise registrar MarkMonitor, with all standard transfer and deletion locks in place.
This is an excerpt. Run your own investigation to see the full assessment. Get Lacework's Full Report Free →
Key Findings for Lacework
| Severity | Finding | Source |
|---|---|---|
| info | Clean domain reputation | Threat Intelligence |
| low | No subprocessor page found | Supply Chain & Subprocessor Discovery |
| medium | Security header deficiencies detected | HTTP Security Scan |
| medium | No public AI data usage policy found | AI Data Usage Policy |
4 total findings. Get Lacework's Full Report Free →
Recommended Actions
- Request Lacework's current SOC 2 Type II report and bridge letter directly from their security team. Many vendors provide this via a trust portal or NDA-protected link — ask specifically for the Type II report (not just a Type I), and confirm the audit period covers the last 12 months. Their claimed trust page is at https://support.lacework.com/hc/en-us/articles/1500008001101-May-2021-Releases.
- Request Lacework's GDPR Article 28 subprocessor disclosure or Data Protection Addendum (DPA). Ask their legal or sales team for the document directly, and confirm it lists all third parties that process your data, including cloud infrastructure providers and AI/ML service providers.
- Ask Lacework's security team to share Observatory or equivalent security header scan results for the application endpoint (portal.lacework.com) — run independently at https://observatory.mozilla.org/analyze/portal.lacework.com to verify before granting production access.
Intelligence Sources Queried for Lacework
ThirdProof uses a deterministic rules engine to assign risk tiers. AI writes the narrative — rules drive the decision.
What a ThirdProof assessment covers↓
Sanctions Screening
Is Lacework on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
Cyber Risk Assessment
What is Lacework's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Business Registration
Is Lacework a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Adverse Media Analysis
Has Lacework appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Domain & Infrastructure
Is Lacework's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
Company Intelligence
What are Lacework's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Trust & Compliance Verification
Does Lacework claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Supply Chain & Subprocessor Discovery
Who does Lacework depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Regulatory & Financial Filings
Has Lacework appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Lacework and every other vendor in your stack — average report time: 7 minutes. Get Lacework's Full Report Free →
Frequently asked about Lacework
Does Lacework have SOC 2 Type II?+
Is Lacework on the OFAC sanctions list?+
What is Lacework's vendor risk tier?+
Can I get an auto-filled security questionnaire for Lacework?+
Is Lacework safe to use as a vendor?+
Does Lacework have SOC 2 certification?+
Is Lacework FedRAMP authorized?+
Has Lacework had any data breaches?+
Is Lacework on any sanctions lists?+
How do I assess Lacework for vendor risk?+
How long does a ThirdProof assessment take?+
Is ThirdProof free?+
Can I use a ThirdProof report as SOC 2 audit evidence?+
How is ThirdProof different from a security questionnaire?+
Also investigate these vendors
Lacework is in your vendor stack. Can you prove you assessed them?
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Lacework across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.