SOC 2

SOC 2 Control Library

50 controls across 12 control families. Adopt any control into your SOC 2 compliance program.

50 controls

preventivemedium
Adopt

Code of Conduct and Ethics Policy

Formal policy establishing expected standards of ethical behavior, conflicts of interest, and disciplinary consequences for all employees and contractors.

CC1.1CC1.2

Testing: Annually

preventivemedium
Adopt

Organizational Structure and Accountability

Documented org chart with clear reporting lines, defined roles, and delegated authority for security and compliance responsibilities.

CC1.3

Testing: Annually

preventivemedium
Adopt

Employee Background Check Process

Pre-employment background screening for all employees and contractors with access to customer data or production systems.

CC1.4

Testing: Per hire

preventivelow
Adopt

Performance Management and Competency Assessment

Formal process for evaluating employee performance, identifying skills gaps, and ensuring staff have the competencies required for their security-relevant roles.

CC1.4CC1.5

Testing: Annually

preventivemedium
Adopt

Information Security Policy

Master security policy communicating management's commitment to security, defining objectives, and assigning responsibilities across the organization.

CC2.1CC2.2

Testing: Annually

preventivelow
Adopt

External Security Communication Process

Defined process for communicating security commitments and obligations to customers, partners, and regulators.

CC2.2

Testing: Annually

detectivehigh
Adopt

Annual Risk Assessment Process

Formal methodology for identifying, analyzing, and evaluating risks to the confidentiality, integrity, and availability of systems and data.

CC3.1CC3.2

Testing: Annually

detectivemedium
Adopt

Risk Register Maintenance

Maintained register of identified risks with assigned owners, treatment decisions, and tracked remediation status.

CC3.3

Testing: Quarterly

detectivemedium
Adopt

Fraud Risk Assessment

Assessment of fraud risks relevant to financial reporting and operations, including insider threat scenarios.

CC3.4

Testing: Annually

detectivehigh
Adopt

Internal Audit Program

Scheduled internal reviews or third-party assessments to evaluate the design and operating effectiveness of controls.

CC4.1

Testing: Annually

correctivemedium
Adopt

Control Deficiency Remediation Tracking

Process for identifying, documenting, prioritizing, and tracking remediation of control deficiencies found during audits, assessments, or monitoring.

CC4.2

Testing: Monthly

preventivemedium
Adopt

Control Selection and Design Process

Documented process for selecting, designing, and implementing controls in response to identified risks.

CC5.1

Testing: Annually

preventivehigh
Adopt

System Configuration and Hardening Standards

Baseline security configuration standards for servers, cloud infrastructure, and endpoints to reduce the attack surface.

CC5.2

Testing: Monthly

preventivemedium
Adopt

Policy and Procedure Management

Process for creating, reviewing, approving, and distributing security policies and procedures to ensure they remain current and enforced.

CC5.3

Testing: Annually

preventivehigh
Adopt

Multi-Factor Authentication (MFA)

Requirement for a second authentication factor for all access to production systems, cloud consoles, VPNs, and identity providers.

CC6.1

Testing: Quarterly

preventivehigh
Adopt

Privileged Access Management

Controls governing the granting, use, and monitoring of privileged (admin/root) access to production systems and cloud infrastructure.

CC6.1CC6.2

Testing: Monthly

preventivehigh
Adopt

User Provisioning and Deprovisioning

Formal process for granting system access when employees join or change roles, and revoking it within 24 hours of termination.

CC6.2CC6.3

Testing: Per offboarding event

detectivemedium
Adopt

Quarterly Access Review Process

Structured review of all user accounts and their access rights to confirm appropriateness and remove stale or excessive permissions.

CC6.3

Testing: Quarterly

preventivemedium
Adopt

Physical Access Controls

Controls restricting physical access to offices, data centers, and server rooms to authorized personnel only.

CC6.4

Testing: Monthly

preventivehigh
Adopt

Logical and Physical Access Boundary Controls

Network and infrastructure controls that enforce boundaries between public-facing systems, internal networks, and restricted production environments.

CC6.5

Testing: Quarterly

preventivehigh
Adopt

Firewall and Network Security

Firewall rules and network monitoring controls that restrict unauthorized network traffic into and between systems.

CC6.6

Testing: Quarterly

preventivehigh
Adopt

Encryption at Rest

Encryption of all data-at-rest in databases, object storage, and backups using industry-standard algorithms.

CC6.1CC6.7

Testing: Monthly

preventivehigh
Adopt

Encryption in Transit (TLS)

Enforcement of TLS 1.2+ for all data transmitted over networks, including internal service-to-service communication.

CC6.7

Testing: Quarterly

preventivemedium
Adopt

Endpoint Protection (EDR/Antivirus)

Endpoint detection and response software on all corporate laptops and workstations used to access production systems or customer data.

CC6.8

Testing: Weekly

detectivehigh
Adopt

Vulnerability Management Program

Continuous scanning of production infrastructure and applications for known vulnerabilities, with SLA-based remediation.

CC7.1

Testing: Weekly

detectivehigh
Adopt

Annual Penetration Testing

Annual external penetration test of production infrastructure and applications by an independent third party.

CC7.1

Testing: Annually

detectivehigh
Adopt

Security Monitoring and SIEM

Centralized log aggregation and automated alerting for security-relevant events across production systems.

CC7.2

Testing: Daily

correctivehigh
Adopt

Security Incident Response Plan

Documented and tested plan for detecting, containing, eradicating, and recovering from security incidents.

CC7.3CC7.4

Testing: Semi-annually

correctivemedium
Adopt

Post-Incident Review Process

Blameless post-mortems after security incidents to identify root causes, contributing factors, and preventive actions.

CC7.4CC7.5

Testing: Per incident

preventivehigh
Adopt

Change Management Process

Formal process for requesting, approving, testing, and documenting changes to production infrastructure and systems.

CC8.1

Testing: Continuous

preventivehigh
Adopt

Code Review and Approval Process

Peer code review requirement for all changes to production application code before merging.

CC8.1

Testing: Continuous

preventivehigh
Adopt

Deployment and Release Management

Controlled deployment pipeline with automated testing gates to prevent untested or unauthorized code from reaching production.

CC8.1

Testing: Continuous

preventivemedium
Adopt

Security Commitments Documentation

Published security commitments to customers and stakeholders, documented in contracts, SLAs, and public security documentation.

S1.1S1.2

Testing: Annually

preventivemedium
Adopt

Capacity Planning and Monitoring

Processes to ensure infrastructure capacity meets current and projected demand, preventing availability failures due to resource exhaustion.

A1.1

Testing: Monthly

detectivehigh
Adopt

Availability Monitoring and Alerting

Continuous uptime monitoring with automated alerting and defined on-call response procedures to minimize downtime.

A1.2

Testing: Continuous

correctivehigh
Adopt

Backup and Disaster Recovery Testing

Automated backups with documented RPO/RTO targets and regularly tested restoration procedures.

A1.3

Testing: Quarterly

preventivemedium
Adopt

Data Classification and Handling Policy

Policy defining data classification tiers (e.g., Public, Internal, Confidential, Restricted) and the handling requirements for each tier.

C1.1

Testing: Annually

preventivemedium
Adopt

Data Retention and Secure Disposal Policy

Policy defining retention periods for each data type and procedures for secure disposal of data at end-of-life.

C1.2

Testing: Annually

preventivehigh
Adopt

Input Validation Controls

Application-layer controls that validate and sanitize all user-supplied input to prevent injection attacks and data corruption.

PI1.1

Testing: Continuous

detectivemedium
Adopt

Processing Error Monitoring and Logging

Centralized error logging and alerting to detect and investigate data processing failures, corruption, and anomalies.

PI1.2PI1.3

Testing: Weekly

preventivemedium
Adopt

Privacy Notice and Consent Management

Public privacy notice that clearly communicates what personal data is collected, how it is used, and users' rights.

P1.1

Testing: Annually

preventivemedium
Adopt

User Choice and Consent Mechanisms

Technical controls enabling users to exercise data subject rights including opt-out of certain processing and consent withdrawal.

P2.1

Testing: Annually

preventivemedium
Adopt

Data Minimization and Collection Limitation

Policy and technical controls ensuring only data necessary for the stated purpose is collected from individuals.

P3.1

Testing: Annually

preventivemedium
Adopt

Data Use Limitation Policy

Policy restricting the use of personal data to the purposes disclosed in the privacy notice and agreed to by the data subject.

P4.1

Testing: Annually

preventivemedium
Adopt

Privacy Data Retention Practices

Defined and enforced retention schedules for personal data, with automatic deletion or anonymization at end-of-retention.

P5.1

Testing: Quarterly

preventivemedium
Adopt

Data Disclosure and Third-Party Sharing Controls

Controls governing disclosure of personal data to third parties, including contractual safeguards and approval processes.

P6.1

Testing: Annually

preventivelow
Adopt

Data Quality and Accuracy Processes

Processes ensuring personal data is accurate, complete, and current, with mechanisms for individuals to correct inaccurate data.

P7.1

Testing: Quarterly

detectivemedium
Adopt

Privacy Program Monitoring and Compliance

Ongoing monitoring of the privacy program's effectiveness, including annual privacy impact assessments and regulatory compliance tracking.

P8.1

Testing: Annually

preventivehigh
Adopt

Remote Access VPN Policy

Policy and technical enforcement requiring VPN use for access to internal systems and production environments from outside the corporate network.

CC6.6CC6.7

Testing: Quarterly

preventivemedium
Adopt

Security Awareness Training

Annual security awareness training for all employees covering phishing, social engineering, password hygiene, and data handling responsibilities.

CC1.4CC2.2CC5.3

Testing: Annually