Leadline Inc.Leadline Inc.

SOC 2 Compliance

Comprehensive guide to SOC 2 Type I and Type II compliance for organizations

Control Requirements

SOC 2 Compliance Framework

SOC 2 (System and Organization Controls 2) is a comprehensive framework for managing customer data based on five trust service criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy.

What is SOC 2?

SOC 2 is an auditing procedure developed by the American Institute of CPAs (AICPA) that ensures your service providers securely manage your data to protect the interests of your organization and the privacy of its clients.

Trust Service Criteria

Security

Availability

Processing Integrity

Confidentiality

Privacy

SOC 2 Types

SOC 2 Type I

  • Point-in-time assessment
  • Evaluates design of controls
  • Typically completed in 3-6 months

SOC 2 Type II

  • Continuous assessment over time
  • Evaluates both design and operating effectiveness
  • Typically covers 6-12 month period

SOC 2 Control Requirements

SOC 2 compliance is built upon a comprehensive set of control requirements that govern how organizations manage their systems, applications, and databases. These controls are systematically organized into numbered control IDs that correspond to specific control categories.

Control Categories

The SOC 2 control framework is organized into the following categories, each identified by a unique prefix:

Control CategoryPrefixDescription
Change ManagementCMControls related to managing system changes, code deployments, and configuration modifications
Communications & MonitoringCOMControls for system monitoring, alerting, and communication protocols
Backup & Disaster RecoveryBDRControls ensuring data backup, recovery procedures, and business continuity
Data SecurityDSControls protecting sensitive data through encryption, access controls, and data handling procedures
Incident ResponseIRControls for detecting, responding to, and recovering from security incidents
Policies & ProceduresPPControls establishing organizational policies, procedures, and governance frameworks
Risk AssessmentRAControls for identifying, assessing, and managing security risks
Logical SecurityLSControls for access management, authentication, authorization, and encryption
Third-Party ManagementTPMControls for managing vendor relationships, third-party access, and supply chain security

Control Structure

Each SOC 2 control follows a standardized structure that includes:

Control ID Format

Controls are identified using a category prefix followed by a sequential number:

  • CM-01: Change Management control #1
  • COM-02: Communications & Monitoring control #2
  • BDR-04: Backup & Disaster Recovery control #4
  • IR-01: Incident Response control #1
  • LS-21: Logical Security control #21

Control Components

Every control requirement includes:

  1. Purpose: Clear description of what the control accomplishes

    • Example: "Restricting code changes to authorized staff only"
    • Example: "Performing regular security vulnerability scans"
    • Example: "Reviewing firewall configurations quarterly"
  2. Frequency: How often the control must be executed

    • Ongoing: Continuous monitoring and enforcement
    • Daily: Daily operational activities
    • Weekly: Weekly review and maintenance tasks
    • Monthly: Monthly assessments and updates
    • Quarterly: Quarterly reviews and evaluations
    • Annually: Annual comprehensive assessments
  3. Scope: Systems, applications, and infrastructure covered

    • In-scope applications and databases
    • Network infrastructure components
    • Cloud services and third-party systems
    • Development and production environments
  4. Variations: Alternative acceptable methods for meeting control objectives

    • Different implementation approaches
    • Technology-specific solutions
    • Organizational variations based on size and complexity

Complete SOC 2 Control Requirements

Below is a comprehensive list of SOC 2 control requirements organized by category. Each control includes its ID, description summary, and associated Trust Service Criteria (TSC).

CM – Change Management

Control IDDescription SummaryPrimary TSCSecondary TSC
CM-01Quarterly review of source code change accessSecurityConfidentiality
CM-03Automated alerts for production changes; audit loggingSecurityAvailability
CM-04Stakeholder review/approval for changes impacting system trust criteriaSecurityProcessing Integrity
CM-09Weekly security-related change meetingsSecurity
CM-11Restrict promotion to production to those without code edit rightsSecurityProcessing Integrity
CM-12Management approval for all types of production changesSecurityProcessing Integrity
CM-13Formal change management methodology documentedSecurityProcessing Integrity
CM-15De-identification of confidential data in non-prodConfidentialitySecurity
CM-16Monthly review of production changes to ensure authorization and separation of dutiesSecurityProcessing Integrity
CM-17Vulnerability scanning or peer review of source code before releaseSecurityProcessing Integrity
CM-18Version control and access restrictions for source codeSecurityConfidentiality

COM – Communications & Monitoring

Control IDDescription SummaryPrimary TSCSecondary TSC
COM-02Centralized logging with restricted accessSecurityConfidentiality
COM-03Malware scans before installation into productionSecurityProcessing Integrity
COM-04IDS/IPS continuous monitoring with alertsSecurityAvailability
COM-05Quarterly firewall reviewSecurityAvailability
COM-06Network diagrams available to IT securitySecurity
COM-07Unauthorized access monitoring & alertingSecurity
COM-08Quarterly internal vulnerability scansSecurity
COM-09Annual third-party external vulnerability scansSecurity
COM-10Firewalls deployed & maintainedSecurityAvailability

BDR – Backup & Disaster Recovery

Control IDDescription SummaryPrimary TSCSecondary TSC
BDR-04Annual BCP/DRP testAvailabilitySecurity
BDR-05Restrict backup tool accessSecurityConfidentiality
BDR-06Data destruction after retention periodConfidentialityPrivacy
BDR-07Formal data retention/destruction standardsConfidentialityPrivacy
BDR-08Daily/incremental backups with alertsAvailabilityProcessing Integrity
BDR-09AES encryption for backupsConfidentialitySecurity

DS – Data Security

Control IDDescription SummaryPrimary TSCSecondary TSC
DS-01Encryption & physical protection for removable mediaConfidentialitySecurity
DS-03Enforce hard drive encryption on laptopsConfidentialitySecurity
DS-04MDM for mobile devicesConfidentialitySecurity
DS-05Scrub/dispose of external media or use DLPConfidentialityPrivacy
DS-06Annual review/update of data classification policyConfidentialityPrivacy

IR – Incident Response

Control IDDescription SummaryPrimary TSCSecondary TSC
IR-01Monthly review of closed incidentsSecurityAvailability
IR-02Defined incident management with RCASecurityAvailability
IR-03Incident evaluation for data disclosure & legal complianceConfidentialityPrivacy

PP – Policies & Procedures

Control IDDescription SummaryPrimary TSCSecondary TSC
PP-19Anonymous hotline for incident reportingSecurityPrivacy
PP-20Written IT job descriptionsSecurity

RA – Risk Assessment

Control IDDescription SummaryPrimary TSCSecondary TSC
RA-01Internal audits of controlsSecurity
RA-02Annual risk assessment including fraud riskSecurityAvailability
RA-03Annual risk assessment of laws/regulations/SLAs/vendorsSecurityConfidentiality

LS – Logical Security

Control IDDescription SummaryPrimary TSCSecondary TSC
LS-01Encrypt sensitive data at restConfidentialitySecurity
LS-04User account changes require client approvalSecurity
LS-05Restrict direct DB accessSecurityConfidentiality
LS-06Admin account access via password vaultSecurity
LS-07Secure encryption key storageConfidentialitySecurity
LS-10Semi-annual external user access reviewSecurity
LS-14Restrict admin accessSecurity
LS-16Encrypt transmissions over public networksConfidentialitySecurity
LS-19Timely removal of terminated user accessSecurity
LS-21Password policy parametersSecurity
LS-22Manager approval for access changesSecurity
LS-24Quarterly access reviewSecurityConfidentiality
LS-25Require valid IDs/passwordsSecurity
LS-26MFA for admin activities or VPN for remote accessSecurity

TPM – Third-Party Management

Control IDDescription SummaryPrimary TSCSecondary TSC
TPM-01Third-party incident communication protocolsSecurityAvailability
TPM-02Vendor compliance violation remediation or terminationSecurityConfidentiality
TPM-03Annual third-party risk rating & security reviewsSecurityConfidentiality
TPM-04Standard vendor agreements with security clausesSecurityConfidentiality

Trust Service Criteria (TSC) Legend

  • Security: Protection against unauthorized access, use, or disclosure
  • Availability: System availability for operation and use
  • Processing Integrity: System processing is complete, accurate, timely, and authorized
  • Confidentiality: Information designated as confidential is protected
  • Privacy: Personal information is collected, used, retained, disclosed, and disposed of in conformity with commitments

Getting Started

Key Benefits

  • Customer Trust: Demonstrates commitment to data security
  • Competitive Advantage: Differentiates from competitors
  • Risk Management: Identifies and mitigates security risks
  • Regulatory Compliance: Meets industry standards and regulations
  • Continuous Improvement: Establishes ongoing security practices