
SOC 2 (System and Organization Controls 2) is a framework designed by the American Institute of Certified Public Accountants (AICPA) to manage and protect customer data based on five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. SOC 2 compliance is crucial for service organizations to ensure that their systems are secure, reliable, and effective in protecting data from unauthorized access and vulnerabilities.
The entity demonstrates a commitment to integrity and ethical values.
The entity demonstrates a commitment to integrity and ethical values (CC1.1).
Management's actions reinforce the established standards of conduct and ethical values (CC1.1.1).
A formal written Code of Conduct clearly defines expected behavior (CC1.1.2).
The entity evaluates performance against the standards of conduct (CC1.1.3).
Deviations from standards are identified and remedied (CC1.1.4).
Individuals adhere to the standards of conduct (CC1.1.5).
The board demonstrates independence and exercises oversight (CC1.2).
The board is independent and includes members with requisite expertise (CC1.2.1).
Oversight responsibilities are defined and carried out (CC1.2.2).
The board monitors the operation of the system of internal control (CC1.2.3).
The board engages in oversight of the external auditor (CC1.2.4).
Management establishes structures, reporting lines, authorities, and responsibilities (CC1.3).
Management considers all aspects of the entity in establishing structures (CC1.3.1).
Defines and communicates roles, responsibilities, and authorities (CC1.3.2).
Limits the authority to manage system objectives to competent individuals (CC1.3.3).
Defines and communicates reporting lines for control and security (CC1.3.4).
Management and the board authorize transactions, procedures, and access (CC1.3.5).
The entity commits to attracting, developing, and retaining competent individuals (CC1.4).
Management specifies the competence levels for roles (CC1.4.1).
Translates required competence levels into knowledge and skills (CC1.4.2).
Acquires and develops individuals with the necessary knowledge and skills (CC1.4.3).
Provides training and other resources to address competency needs (CC1.4.4).
Assesses competence through formal evaluations (CC1.4.5).
Plans for succession in the control environment (CC1.4.6).
Contracts for outsourced expertise to meet objectives (CC1.4.7).
The entity holds individuals accountable for internal control responsibilities (CC1.5).
Accountability is enforced through performance measures (CC1.5.1).
Evaluates performance against controls (CC1.5.2).
Provides incentives and rewards for internal control performance (CC1.5.3).
Considers pressures on individuals to violate controls (CC1.5.4).
Considers excessive compensation and inadequate consequences (CC1.5.5).
The entity obtains or generates and uses relevant, quality information to support the functioning of internal control; internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control; and communicates with external parties regarding matters affecting the functioning of internal control.
The entity uses quality information and communicates internally and externally (CC2).
The entity obtains or generates and uses relevant, quality information (CC2.1).
Identifies information requirements for control (CC2.1.1).
Identifies information sources (CC2.1.2).
Processes relevant data into information (CC2.1.3).
Stores and protects information (CC2.1.4).
The entity internally communicates information and responsibilities (CC2.2).
Communicates control responsibilities to appropriate individuals (CC2.2.1).
Communicates objectives related to security and controls (CC2.2.2).
Communicates the entire system of internal control (CC2.2.3).
Selects appropriate internal communication methods (CC2.2.4).
Communicates relevant information needs of the entity (CC2.2.5).
Establishes communication lines to the board (CC2.2.6).
Considers information needs of external service providers (CC2.2.7).
Communicates information needs to external service providers (CC2.2.8).
Provides information to external service providers (CC2.2.9).
Communicates accountability for system use (CC2.2.10).
Communicates external service provider activities (CC2.2.11).
The entity communicates with external parties (CC2.3).
Communicates relevant control information to external parties (CC2.3.1).
Uses external communication methods that are appropriate (CC2.3.2).
Communicates relevant information needs to external parties (CC2.3.3).
Communicates accountability for system use to external parties (CC2.3.4).
Communicates relevant security responsibilities to external parties (CC2.3.5).
Communicates responsibilities of external providers (CC2.3.6).
Communicates expectations for confidentiality or privacy to external parties (CC2.3.7).
Communicates expectations for availability and processing integrity to external parties (CC2.3.8).
Communicates information regarding control deficiencies to external parties (CC2.3.9).
Communicates information needed by external parties (CC2.3.10).
Communicates information needs to external service providers (CC2.3.11).
The entity identifies and analyzes risks to the achievement of its objectives to determine how the risks should be managed; the entity considers the potential for fraud; and the entity identifies and assesses changes that could significantly impact the system of internal control.
The entity identifies and analyzes risks, considers fraud, and assesses changes (CC3).
The entity identifies and analyzes risks to objectives (CC3.1).
Considers the impact of identified risks on objectives (CC3.1.1).
Considers the risk of data compromise (CC3.1.2).
Considers the risk of failure in availability (CC3.1.3).
Considers the risk of erroneous processing (CC3.1.4).
Considers risks arising from technology implementation (CC3.1.5).
Considers risks arising from the use of technology (CC3.1.6).
Considers the risk of fraud (CC3.1.7).
Considers the inherent risk of errors (CC3.1.8).
Considers the risk from noncompliance with laws and external commitments (CC3.1.9).
Considers external factors and internal factors (CC3.1.10).
Involves relevant personnel (CC3.1.11).
Specifies how risks should be managed (CC3.1.12).
Documents the risk assessment (CC3.1.13).
Considers the risk of material omission or misstatement (CC3.1.14).
Considers the risk of management override of controls (CC3.1.15).
Considers risks that relate to the processing of personal data (CC3.1.16).
The entity considers the potential for fraud (CC3.2).
Considers the incentives and pressures to commit fraud (CC3.2.1).
Considers opportunities to commit fraud (CC3.2.2).
Considers attitudes and rationalizations that could justify fraud (CC3.2.3).
Considers fraud in all levels of the entity (CC3.2.4).
Considers the risk of management override of controls (CC3.2.5).
Considers the impact of fraud on objectives (CC3.2.6).
Documents the fraud risk assessment (CC3.2.7).
Considers fraud risk related to external service providers (CC3.2.8).
The entity identifies and assesses changes that could significantly impact internal control (CC3.3).
Assesses changes in the external environment (CC3.3.1).
Assesses changes in the business model (CC3.3.2).
Assesses changes in leadership (CC3.3.3).
Assesses changes in technology (CC3.3.4).
Considers the significance of changes (CC3.3.5).
The entity identifies and assesses changes in the control components (CC3.4).
Assesses changes in the control environment (CC3.4.1).
Assesses changes in risk assessment (CC3.4.2).
Assesses changes in control activities (CC3.4.3).
Assesses changes in information and communication (CC3.4.4).
Assesses changes in monitoring activities (CC3.4.5).
The entity selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to an acceptable level; and the entity selects and develops general control activities over technology to support the achievement of objectives.
The entity selects and develops control activities and general technology controls (CC4).
The entity selects and develops control activities to mitigate risks (CC4.1).
Integrates control activities with risk assessment (CC4.1.1).
Considers the entity's organizational structure (CC4.1.2).
Considers the segregation of duties (CC4.1.3).
Determines the appropriate mix of control activity types (CC4.1.4).
Designs and implements control activities over outsourced functions (CC4.1.5).
Designs and implements control activities over completeness and accuracy (CC4.1.6).
Designs and implements control activities to restrict access (CC4.1.7).
Designs and implements controls to prevent and detect unauthorized changes (CC4.1.8).
The entity selects and develops general control activities over technology (CC4.2).
Establishes technology controls for general IT processes (CC4.2.1).
Establishes controls over the infrastructure (CC4.2.2).
Establishes controls over security, availability, processing integrity, confidentiality, and privacy objectives (CC4.2.3).
The entity selects and develops ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning; and the entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate.
The entity selects and develops evaluations and communicates deficiencies (CC5).
The entity selects and develops ongoing and/or separate evaluations (CC5.1).
Considers the results of risk assessments (CC5.1.1).
Considers the control activities (CC5.1.2).
Considers the entity's organizational structure (CC5.1.3).
Considers the use of technology (CC5.1.4).
Considers the effectiveness of the control environment (CC5.1.5).
Considers the overall effectiveness of the system of internal control (CC5.1.6).
The entity develops ongoing and/or separate evaluations (CC5.2).
Considers the degree of integration of ongoing and separate evaluations (CC5.2.1).
Considers the frequency and extent of separate evaluations (CC5.2.2).
Considers the qualifications and objectivity of the evaluators (CC5.2.3).
Considers the scope of ongoing and separate evaluations (CC5.2.4).
The entity evaluates and communicates internal control deficiencies (CC5.3).
Assesses control deficiencies (CC5.3.1).
Communicates deficiencies to parties responsible for corrective action (CC5.3.2).
Communicates deficiencies to senior management and the board of directors (CC5.3.3).
Communicates deficiencies to external parties, as appropriate (CC5.3.4).
Monitors corrective action (CC5.3.5).
Considers the impact of deficiencies on the system objectives (CC5.3.6).
The entity implements control activities related to security to meet the entity's objectives.
The entity implements control activities related to security (CC6).
Logical access security is implemented over protected information assets (CC6.1).
Restricts logical access to authorized users (CC6.1.1).
Establishes, modifies, and removes user access (CC6.1.2).
Uses authentication methods (CC6.1.3).
Manages and controls privileged access (CC6.1.4).
Implements controls over access to data and software (CC6.1.5).
Reviews user access rights (CC6.1.6).
Segregates duties and controls access to programs and data (CC6.1.7).
Restricts physical access to assets (CC6.1.8).
Controls physical access to facilities and data centers (CC6.1.9).
Monitors and controls physical access (CC6.1.10).
Changes to infrastructure, data, software, and configuration are authorized, developed, tested, approved, and implemented (CC6.2).
Authorizes changes (CC6.2.1).
Develops and tests changes (CC6.2.2).
Approves and implements changes (CC6.2.3).
Controls are in place over the risk management process (CC6.3).
Identifies risks (CC6.3.1).
Analyzes risks (CC6.3.2).
Responds to risks (CC6.3.3).
Data is protected during transmission and at rest (CC6.4).
Protects data during transmission (CC6.4.1).
Protects data at rest (CC6.4.2).
Controls data backup and recovery (CC6.4.3).
System components are configured and maintained (CC6.5).
Configures system components (CC6.5.1).
Maintains system components (CC6.5.2).
Processes are in place to prevent, detect, and respond to threats (CC6.6).
Prevents threats (CC6.6.1).
Detects threats (CC6.6.2).
Responds to threats (CC6.6.3).
Manages vulnerabilities (CC6.6.4).
Controls are in place to identify and respond to security events (CC6.7).
Identifies security events (CC6.7.1).
Analyzes security events (CC6.7.2).
Responds to security events (CC6.7.3).
Communicates security events (CC6.7.4).
Controls are in place over the entity's network and computing devices (CC6.8).
Controls network security (CC6.8.1).
Controls endpoint security (CC6.8.2).
Controls mobile device security (CC6.8.3).
Controls configuration management (CC6.8.4).
Controls patch management (CC6.8.5).
The entity implements control activities related to availability to meet the entity's objectives.
The entity implements control activities related to availability (CC7).
The entity maintains, monitors, and evaluates infrastructure and software (CC7.1).
Maintains infrastructure (CC7.1.1).
Monitors infrastructure (CC7.1.2).
Evaluates infrastructure (CC7.1.3).
Maintains software (CC7.1.4).
Monitors and evaluates software (CC7.1.5).
The entity develops and maintains a disaster recovery plan (CC7.2).
Develops the disaster recovery plan (CC7.2.1).
Maintains the disaster recovery plan (CC7.2.2).
Tests the disaster recovery plan (CC7.2.3).
Updates the disaster recovery plan (CC7.2.4).
The entity provides controls to restrict access to physical assets (CC7.3).
Restricts physical access to assets (CC7.3.1).
Controls physical access to facilities and data centers (CC7.3.2).
Monitors and controls physical access (CC7.3.3).
Controls environmental factors (CC7.3.4).
Controls power protection (CC7.3.5).
The entity identifies and assesses risks to availability (CC7.4).
Identifies risks to availability (CC7.4.1).
Assesses risks to availability (CC7.4.2).
Considers risks related to system components (CC7.4.3).
Considers risks related to the use of technology (CC7.4.4).
Considers risks related to the physical environment (CC7.4.5).
Considers risks related to personnel (CC7.4.6).
Considers risks related to external service providers (CC7.4.7).
Considers the risk of data compromise (CC7.4.8).
Considers the risk of failure in availability (CC7.4.9).
Considers the risk of erroneous processing (CC7.4.10).
Considers the risk of noncompliance (CC7.4.11).
Considers the impact of risks on objectives (CC7.4.12).
Specifies how risks should be managed (CC7.4.13).
The entity develops and maintains a business continuity plan (CC7.5).
Develops the business continuity plan (CC7.5.1).
Maintains the business continuity plan (CC7.5.2).
Tests the business continuity plan (CC7.5.3).
Updates the business continuity plan (CC7.5.4).
Communicates the business continuity plan (CC7.5.5).
Controls business continuity for external service providers (CC7.5.6).
The entity implements control activities related to processing integrity to meet the entity's objectives.
The entity implements control activities related to processing integrity (CC8).
The entity designs and implements controls over accuracy, completeness, and authorization of processing (CC8.1).
Designs and implements controls over processing for accuracy (CC8.1.1).
Designs and implements controls over processing for completeness (CC8.1.2).
Designs and implements controls over processing for authorization (CC8.1.3).
Establishes input validation controls (CC8.1.4).
Establishes controls over output processing (CC8.1.5).
Establishes controls over data integrity (CC8.1.6).
Establishes controls over data retention and destruction (CC8.1.7).
Establishes controls over interfaces and data conversion (CC8.1.8).
Establishes controls over system processing (CC8.1.9).
Establishes controls over manual processing (CC8.1.10).
Designs and implements controls to restrict access (CC8.1.11).
Establishes controls over the integrity of configuration settings (CC8.1.12).
Establishes controls over data entry (CC8.1.13).
Establishes controls over data conversion and migration (CC8.1.14).
Establishes controls over interfaces (CC8.1.15).
The entity implements control activities related to confidentiality to meet the entity's objectives.
The entity implements control activities related to confidentiality (CC9).
The entity identifies and protects confidential information (CC9.1).
Identifies confidential information (CC9.1.1).
Protects confidential information (CC9.1.2).
The entity implements controls to meet confidentiality commitments and requirements (CC9.2).
Restricts access to confidential information (CC9.2.1).
Protects confidential information during transmission (CC9.2.2).
Protects confidential information at rest (CC9.2.3).
Controls the use of confidential information (CC9.2.4).
Controls the removal of confidential information from the entity's custody (CC9.2.5).
Controls the destruction of confidential information (CC9.2.6).
Controls the disclosure of confidential information (CC9.2.7).
Communicates confidentiality commitments and requirements (CC9.2.8).
Monitors compliance with confidentiality commitments (CC9.2.9).
Responds to breaches of confidentiality (CC9.2.10).
Considers risks to confidentiality (CC9.2.11).
Implements controls for the disposal of confidential information (CC9.2.12).
The entity manages the risks associated with assets.
The entity manages the risks associated with assets.
User entity implements logical access security to restrict access (A1.1).
User entity restricts logical access (A1.1.1).
User entity establishes, modifies, and removes user access (A1.1.2).
User entity uses authentication methods (A1.1.3).
User entity implements physical access security to restrict access (A1.2).
User entity restricts physical access to assets (A1.2.1).
User entity controls physical access to facilities and data centers (A1.2.2).
User entity monitors and controls physical access (A1.2.3).
User entity controls environmental factors (A1.2.4).
User entity controls power protection (A1.2.5).
User entity controls physical access to workstations and mobile devices (A1.2.6).
User entity controls access to physical assets not in data centers (A1.2.7).
User entity controls physical media storage (A1.2.8).
User entity controls physical media transfer (A1.2.9).
User entity controls physical media disposal (A1.2.10).
User entity controls software and data updates (A1.3).
User entity controls software updates (A1.3.1).
User entity controls data updates (A1.3.2).
The entity controls data flows and data access.
User entity protects confidential information during transmission (C1.1).
User entity uses encryption for data in transit (C1.1.1).
User entity controls external media (C1.1.2).
User entity protects confidential information at rest (C1.2).
User entity uses encryption for data at rest (C1.2.1).
User entity controls access to cryptographic keys (C1.2.2).
The entity implements control activities related to processing integrity (PI1).
User entity ensures data is accurately and completely processed (PI1.1).
User entity reviews and reconciles data (PI1.1.1).
User entity performs periodic testing of process controls (PI1.1.2).
User entity ensures the authorization of processing (PI1.2).
User entity approves and authorizes transactions (PI1.2.1).
User entity defines and communicates authorization levels (PI1.2.2).
User entity implements controls over authorization (PI1.2.3).
User entity ensures the completeness and accuracy of data (PI1.3).
User entity monitors data completeness (PI1.3.1).
User entity monitors data accuracy (PI1.3.2).
User entity reconciles data (PI1.3.3).
User entity validates data integrity (PI1.3.4).
User entity manages data retention and disposal (PI1.3.5).
User entity implements controls over input processing (PI1.4).
User entity establishes input validation controls (PI1.4.1).
User entity monitors input data (PI1.4.2).
User entity controls data entry (PI1.4.3).
User entity controls data conversion and migration (PI1.4.4).
User entity implements controls over output processing (PI1.5).
User entity controls output processing (PI1.5.1).
User entity reviews and validates output (PI1.5.2).
User entity controls the distribution of output (PI1.5.3).
User entity controls the retention and disposal of output (PI1.5.4).
The entity implements control activities related to privacy to meet the entity's objectives.
The entity implements control activities related to privacy.
The entity identifies and manages privacy risks (P1.1).
Identifies risks related to privacy (P1.1.1).
Assesses risks related to privacy (P1.1.2).
Considers the impact of risks on privacy objectives (P1.1.3).
Specifies how privacy risks should be managed (P1.1.4).
The entity collects personal data in accordance with its privacy commitments (P2.1).
Collects personal data in accordance with commitments (P2.1.1).
Obtains consent for collection (P2.1.2).
Collects minimum necessary data (P2.1.3).
Provides notice about collection (P2.1.4).
Controls data entry (P2.1.5).
Controls data conversion and migration (P2.1.6).
The entity uses, retains, and disposes of personal data in accordance with its privacy commitments (P3.1).
Uses personal data in accordance with commitments (P3.1.1).
Retains personal data in accordance with commitments (P3.1.2).
Disposes of personal data in accordance with commitments (P3.1.3).
Controls data destruction (P3.1.4).
The entity ensures data quality to meet privacy commitments (P3.2).
Ensures data quality for its intended use (P3.2.1).
Implements controls over data accuracy and completeness (P3.2.2).
The entity discloses personal data in accordance with its privacy commitments (P4.1).
Discloses personal data in accordance with commitments (P4.1.1).
The entity provides notice of its privacy practices (P4.2).
Provides notice of privacy practices (P4.2.1).
Updates and revises privacy notice (P4.2.2).
The entity provides choices regarding the collection, use, and disclosure of personal data (P4.3).
Provides choices regarding collection (P4.3.1).
Provides choices regarding use (P4.3.2).
Provides choices regarding disclosure (P4.3.3).
The entity provides data subjects with access to their personal data (P5.1).
Provides access to personal data (P5.1.1).
Allows for correction and amendment (P5.1.2).
Provides notice of access and correction policies (P5.1.3).
Establishes controls over access and correction requests (P5.1.4).
The entity monitors privacy compliance (P5.2).
Monitors privacy compliance (P5.2.1).
Assesses and addresses privacy deficiencies (P5.2.2).
Communicates privacy deficiencies (P5.2.3).
The entity implements control activities related to security over personal data (P6.1).
Controls logical access to personal data (P6.1.1).
Controls physical access to personal data (P6.1.2).
Controls data at rest and in transit (P6.1.3).
Controls system configuration and maintenance (P6.1.4).
The entity implements control activities related to availability over personal data (P6.2).
Maintains, monitors, and evaluates infrastructure and software (P6.2.1).
The entity implements control activities related to processing integrity over personal data (P6.3).
Controls accuracy, completeness, and authorization of processing (P6.3.1).
The entity implements control activities related to confidentiality over personal data (P6.4).
Identifies and protects personal data (P6.4.1).
Controls access, use, and removal of personal data (P6.4.2).
The entity implements control activities related to privacy notice and choice (P6.5).
Provides notice of privacy practices (P6.5.1).
Provides choices regarding personal data (P6.5.2).
The entity implements control activities related to personal data access and correction (P6.6).
Provides access to personal data (P6.6.1).
Allows for correction and amendment (P6.6.2).
Provides notice of access and correction policies (P6.6.3).
Establishes controls over access and correction requests (P6.6.4).
The entity implements control activities related to monitoring and enforcement (P6.7).
Monitors privacy compliance (P6.7.1).
Assesses and addresses privacy deficiencies (P6.7.2).
The entity identifies and manages privacy risks related to external service providers (P7.1).
Identifies and assesses privacy risks related to external service providers (P7.1.1).
Specifies privacy requirements for external service providers (P7.1.2).
The entity monitors privacy compliance by external service providers (P8.1).
Monitors privacy compliance by external service providers (P8.1.1).
Assesses and addresses privacy deficiencies by external service providers (P8.1.2).
Communicates privacy deficiencies to external service providers (P8.1.3).
Communicates privacy deficiencies to senior management and the board (P8.1.4).
Monitors corrective action by external service providers (P8.1.5).
Considers the impact of deficiencies on privacy objectives (P8.1.6).