Case Study: How SOC 2 Mistake Costed Drizly $1B in Damages
By Ramyar Daneshgar
Security Engineer | USC Viterbi School of Engineering
Looking for a security engineer? Visit SecurityEngineer.com
Disclaimer: This article is for educational purposes only and does not constitute legal advice.
Executive Summary
In 2020, Drizly—a fast-growing alcohol delivery startup—suffered a breach that exposed the personal information of 2.5 million customers. Although the company publicly claimed to maintain "industry-leading security standards," an FTC investigation revealed fundamental failures across areas that directly map to SOC 2’s Trust Services Criteria.
This case serves as a critical warning: having policies that look like SOC 2 controls is not enough—those controls must be operational, enforced, and auditable. In this analysis, we unpack what went wrong, how it violated core SOC 2 principles, and why Drizly’s CEO became personally liable for the company’s failures.
Company Overview
- Company: Drizly, Inc.
- Founded: 2012
- Industry: Alcohol e-commerce / delivery
- Acquired by: Uber Technologies in 2021 for $1.1 billion
- Security Commitment (Pre-Breach): Publicly stated use of "industry-standard security"
Timeline of Events
Date | Event Description |
---|---|
April 2018 | A Drizly executive is granted GitHub repo access for a hackathon. Access remains active for two years. |
2018–2019 | An engineer commits AWS credentials to a personal GitHub repository. |
2018 | Drizly’s AWS environment is compromised and used for cryptojacking. |
July 13, 2020 | Drizly discovers a new compromise involving GitHub access and AWS credentials. |
July 28, 2020 | Public breach notification issued. 2.5 million records exposed. |
October 2022 | FTC issues proposed enforcement order against Drizly and CEO James Cory Rellas. |
January 2023 | FTC finalizes order—mandates data minimization, ongoing audits, and executive accountability. |
What Data Was Exposed?
- Full names
- Email addresses
- Date of birth
- Postal addresses
- Phone numbers
- Last four digits of payment cards
- Order history and geolocation metadata
This data was later found listed on underground forums.
Root Cause: SOC 2 Failures in Practice
Despite Drizly’s public-facing security claims, the breach stemmed from fundamental control breakdowns—many of which would have been flagged or mitigated through consistent SOC 2 implementation.
1. Access Control (CC6.2, CC6.3)
- GitHub access was not reviewed or revoked for an employee who left the company.
- No multi-factor authentication (MFA) was required for GitHub or AWS access.
- No quarterly access reviews were documented.
SOC 2 Expectation: RBAC enforcement, periodic access reviews, MFA on privileged accounts.
2. Change Management (CC8.1)
- AWS credentials were committed to GitHub without approval or peer review.
- There was no documented change management process for code pushes or configuration changes.
SOC 2 Expectation: All production changes must follow a documented approval process with clear audit logs.
3. Security Monitoring & Detection (CC7.1 – CC7.4)
- The initial cryptojacking incident (2018) indicated a failure in monitoring infrastructure logs and alerting.
- The 2020 intrusion occurred despite previous warnings, showing no improvement in incident response or log analysis.
SOC 2 Expectation: Organizations must detect and respond to anomalous activity in real-time.
4. Governance & Accountability (CC1.1 – CC1.2)
- Drizly lacked a dedicated CISO or data protection officer.
- The FTC cited a failure to assign security responsibility and to oversee policy implementation.
SOC 2 Expectation: Security governance must be documented, assigned, and enforced at the leadership level.
Regulatory Outcome
FTC’s final enforcement order held CEO James Cory Rellas personally accountable, citing a pattern of negligence and failure to enforce basic security practice.
Key requirements of the order included:
- 20-year obligation for Drizly to implement and maintain a comprehensive security program
- CEO Rellas is personally bound to implement similar controls in any future role involving consumer data
- Mandatory biennial third-party security assessments, similar in scope to SOC 2
- Data minimization: collect and retain only what is strictly necessary
- Deletion of data not tied to ongoing user accounts or regulatory requirements
This is one of the first cases where executive liability was explicitly codified into a data security enforcement order.
Key Lessons Summary
Lesson | SOC 2 Alignment | What Drizly Missed |
---|---|---|
Access must be tightly controlled and reviewed | CC6.2, CC6.3 | No revocation process, no MFA |
Credential leakage must be monitored and enforced | CC7.1 – CC7.4 | No detection on credential exposure |
Change management is a frontline defense | CC8.1 | No PR approvals or peer validation |
Security is a board-level function | CC1.2 | No formal ownership or escalation structure |
Breaches from past events must inform future controls | CC4.1 | Prior cryptojacking incident was not remediated systemically |
Closing Thoughts
Drizly’s breach is not just a story about missing controls—it’s a case study in the gap between policy and practice. For any company pursuing SOC 2, the lesson is clear:
Achieving compliance means nothing unless controls are continuously enforced, monitored, and adapted as the company evolves.
Whether you’re an early-stage SaaS company or an enterprise compliance officer, Drizly’s story is a reminder: security controls don’t fail—people do when enforcement stops.
Looking for a security engineer? Visit SecurityEngineer.com
Need a Cybersecurity Attorney?
Get top legal guidance in breach response, data privacy, and cybersecurity compliance. Connect with attorneys who know how to defend against audits, investigations, and liability.
👉 Hire a Cybersecurity Attorney