What to Do If Delve Was Your Compliance Platform: A Recovery Guide | Lorikeet Security Skip to main content
Back to Blog

What to Do If Delve Was Your Compliance Platform: A Recovery Guide

Lorikeet Security Team March 20, 2026 11 min read

If your company used Delve for SOC 2 or ISO 27001 compliance, you are likely dealing with a mix of anger, embarrassment, and urgency. The investigative report published on March 19 revealed that Delve fabricated audit reports at industrial scale, and your organization may now be holding a compliance certification that is not worth the PDF it is written on.

This guide is not about assigning blame. It is about what to do right now to protect your organization, your customers, and your business relationships.


Week 1: Immediate assessment

Take down your trust page

If your public trust page was powered by Delve, take it offline immediately. Multiple affected companies have already done this. A trust page displaying fabricated compliance data is worse than having no trust page at all — it actively misleads your customers and partners, and continuing to display it after the scandal is public knowledge compounds your liability.

Identify your auditor

Determine which audit firm signed your SOC 2 or ISO 27001 report. The auditor is critical context for your next steps:

Assess what evidence was real

Delve's platform offered one-click adoption of pre-fabricated evidence. Your team needs to honestly assess which controls described in your SOC 2 report actually exist:

Be honest with yourself. If you know that Delve's templates were adopted without implementing the actual controls behind them, your compliance gap is not just a paperwork problem — it is a genuine security problem. Your organization may be operating without the security controls your customers believe are in place.

Week 2: Legal and stakeholder assessment

Engage legal counsel

Your legal exposure depends on your industry, the data you process, and the commitments you made to customers based on your SOC 2 report:

Determine notification obligations

Work with legal counsel to determine whether you need to notify:

Week 3-4: Begin rebuilding

Choose a legitimate compliance platform

If you plan to use a compliance automation tool (and you should — they genuinely help when used honestly), choose an established platform:

The key difference between these platforms and Delve: they automate evidence collection and workflow, not evidence fabrication. You still need to actually implement and operate the controls.

Conduct a genuine gap assessment

Before starting a new SOC 2 audit, you need to know where you actually stand. A readiness assessment performed by an independent security firm will identify the gaps between where you are and where you need to be. This is not the same as running a compliance platform's automated checks — it requires human judgment about whether controls are genuinely operating.

Get a real penetration test

If your Delve trust page listed a penetration test that was never conducted, schedule one immediately. A genuine web application pentest is typically the first thing sophisticated enterprise buyers verify, and it is one of the easiest claims to disprove if fabricated.

Select a qualified auditor

For your re-audit, choose a CPA firm with verifiable credentials:

Months 2-6: Operate genuine controls

There is no shortcut here. A SOC 2 Type II observation period exists for a reason: controls need to be operating consistently over time. Use this period to:

This work takes months, not days. That is the point. If compliance could legitimately be achieved in days, the framework would have no value.

The opportunity in the wreckage

Here is the uncomfortable truth: if you used Delve, you probably knew something was off. SOC 2 "in days" is not a realistic claim, and most technical founders understand that. The appeal was not that Delve delivered genuine compliance — it was that Delve made the checkbox go away quickly and cheaply so you could close enterprise deals.

The Delve scandal is an opportunity to do it right. Companies that rebuild with genuine controls will not only have a defensible compliance posture — they will have an actual security program that protects their customers. That is what enterprise buyers are really trying to verify when they ask for your SOC 2 report.

Need help rebuilding your compliance program?

We help Delve-affected companies assess their actual security posture, close gaps, and prepare for legitimate re-certification. Penetration testing, readiness assessments, and ongoing security support.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!