Your comprehensive reference guide to all SOC 2 controls across the five Trust Service Criteria, with detailed descriptions, implementation guidance, and practical examples.
The entity demonstrates a commitment to integrity and ethical values through the establishment and enforcement of a code of conduct.
The board of directors or equivalent governing body demonstrates independence and exercises oversight of system design and operation.
Management establishes structures, reporting lines, and appropriate authorities to achieve the entity's objectives.
The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.
The entity holds individuals accountable for their responsibilities in the context of the entity's objectives.
The entity implements logical access controls to restrict access to systems, applications, and data to authorized users.
Prior to issuing system credentials and granting system access, the entity establishes that the user is authorized.
The entity modifies or removes access in a timely manner for users whose system access is no longer authorized.
The entity restricts the transmission of data and credentials to authorized users and systems.
The entity restricts physical access to facilities and protected information assets to authorized personnel.
The entity manages systems to meet operational requirements through system quality processes.
The entity uses detection tools and configuration management to prevent, detect, and correct processing deviations.
The entity evaluates security events to determine whether they could impact system security and responds appropriately.
The entity implements recovery procedures for recovery from system failures to meet system availability objectives.
Total Controls
Security Controls
Trust Service Criteria
Control Categories