Compliance Automation Cannot Replace Real Security: Lessons from the Delve Collapse | Lorikeet Security Skip to main content
Back to Blog

Compliance Automation Cannot Replace Real Security: Lessons from the Delve Collapse

Lorikeet Security Team March 20, 2026 8 min read

The Delve scandal is the most dramatic compliance fraud in SOC 2 history. But the reaction from much of the security industry has not been shock — it has been a resigned nod. Because the uncomfortable truth is that Delve was selling what the market was buying: the appearance of security without the cost of actually being secure.

This article is not about Delve. It is about the systemic problem Delve exploited and why compliance automation, even when used honestly, cannot substitute for genuine security work.


The compliance-security gap

There is a fundamental difference between being compliant and being secure. Compliance asks: "Do you have controls that meet framework requirements?" Security asks: "Can an attacker compromise your system?"

These questions overlap, but they are not the same. A company can be fully compliant with SOC 2 and still be trivially vulnerable to SQL injection in its main application. A company can fail its SOC 2 audit because of a documentation gap while having excellent security practices that the framework does not measure.

Delve exploited this gap by making compliance infinitely easy while doing nothing for security. But even legitimate compliance automation tools operate primarily on the compliance side of this divide.

What automation can and cannot do

What compliance platforms do well

These are genuinely valuable capabilities. Vanta, Drata, and Secureframe save compliance teams hundreds of hours of manual evidence collection. That time savings is real.

What no platform can automate

The Delve playbook was simple: automate the appearance of controls without requiring the controls to actually exist. But even honest automation only handles evidence collection — the underlying security work still needs to happen.

The perverse incentives

The SOC 2 ecosystem has a structural problem: the buyer of the audit is the company being audited. This creates predictable incentives:

Delve took this to an extreme by fabricating everything. But the incentive structure that allowed Delve to exist for years applies to the entire ecosystem. When the goal is "get the certificate" rather than "be secure," the certificate loses its meaning regardless of whether fraud is involved.

What the industry needs to change

Enterprise buyers need to actually read the reports

A SOC 2 report is not a pass/fail certificate. It is a detailed document describing what was tested, how it was tested, and what was found. If your vendor risk team accepts SOC 2 reports as a binary checkbox without reading the contents, you will accept fraudulent reports along with legitimate ones.

Auditor independence needs enforcement

The AICPA standards require auditor independence, but enforcement is largely self-policing. When a platform like Delve acts as an intermediary between the company and the auditor, provides pre-written audit conclusions, and selects auditors based on willingness to rubber-stamp, the independence requirement is rendered meaningless.

Penetration testing needs to be independently verified

A SOC 2 report that claims a penetration test was conducted should include enough detail to verify the claim — the testing firm, the scope, the methodology, and a summary of findings. Multiple Delve trust pages listed penetration tests that never occurred.

The "compliance in days" claim should be a disqualifier

SOC 2 Type II requires a minimum observation period during which controls must be operating. Any platform claiming to deliver Type II compliance in days is either lying about the timeline or skipping the observation period. Neither is acceptable.

What this means for your organization

If you are pursuing SOC 2 or ISO 27001 compliance, use the Delve scandal as a catalyst to do it genuinely:

  1. Use compliance automation for what it is good at — evidence collection, monitoring, and workflow — but do not confuse the tool with the outcome
  2. Invest in actual security workpenetration testing, code reviews, threat modeling, and incident response exercises
  3. Choose your auditor carefully — verify their credentials independently, talk to them directly, and choose firms with genuine reputations
  4. Build a security program, not just a compliance program — the best compliance outcome is a natural byproduct of actually being secure

Compliance frameworks exist to create a baseline of security practices. When the process of achieving compliance becomes disconnected from the practice of being secure, the framework fails. Delve proved how far that disconnect can go. The question for every organization now is: where are you on that spectrum?

Security first, compliance follows

We help organizations build genuine security programs that make compliance a natural outcome. Penetration testing, security assessments, and compliance support from real security engineers.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!