Complete List of SOC 2 Controls

Your comprehensive reference guide to all SOC 2 controls across the five Trust Service Criteria, with detailed descriptions, implementation guidance, and practical examples.

100+ Controls Searchable Reference Implementation Examples Detailed Descriptions

Security Controls (CC)

Control Environment (CC1)

CC1.1 Preventive Medium
Code of Conduct and Ethics

The entity demonstrates a commitment to integrity and ethical values through the establishment and enforcement of a code of conduct.

Implementation Examples:
  • Written code of conduct addressing conflicts of interest, ethical behavior, and compliance
  • Annual code of conduct acknowledgment and training for all employees
  • Disciplinary procedures for code violations
  • Anonymous reporting mechanisms for ethical concerns
CC1.2 Preventive Low
Board Independence and Oversight

The board of directors or equivalent governing body demonstrates independence and exercises oversight of system design and operation.

Implementation Examples:
  • Independent board members or audit committee oversight
  • Regular board meetings addressing security and risk topics
  • Board charter defining security oversight responsibilities
  • Executive reporting on security matters to the board
CC1.3 Preventive Medium
Organizational Structure and Authority

Management establishes structures, reporting lines, and appropriate authorities to achieve the entity's objectives.

Implementation Examples:
  • Organizational charts with clear reporting relationships
  • Job descriptions defining roles and responsibilities
  • Delegation of authority policies and procedures
  • Regular review and update of organizational structure
CC1.4 Preventive Medium
Commitment to Competence

The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives.

Implementation Examples:
  • Competency requirements in job descriptions
  • Skills assessment and training programs
  • Performance evaluation and development planning
  • Succession planning for key positions
CC1.5 Preventive Low
Accountability and Enforcement

The entity holds individuals accountable for their responsibilities in the context of the entity's objectives.

Implementation Examples:
  • Performance metrics tied to security objectives
  • Regular performance reviews and feedback
  • Recognition and incentive programs
  • Disciplinary procedures for non-compliance

Logical and Physical Access Controls (CC6)

CC6.1 Preventive High
Logical Access - User Identification and Authentication

The entity implements logical access controls to restrict access to systems, applications, and data to authorized users.

Implementation Examples:
  • Multi-factor authentication for all system access
  • Strong password policies and enforcement
  • Single sign-on (SSO) implementation
  • Account lockout after failed login attempts
  • Regular password rotation requirements
CC6.2 Preventive High
Logical Access - New User Setup

Prior to issuing system credentials and granting system access, the entity establishes that the user is authorized.

Implementation Examples:
  • Formal access request and approval process
  • Manager authorization for system access
  • Role-based access control (RBAC) implementation
  • Documented access provisioning procedures
  • Verification of employment status before access
CC6.3 Detective Medium
Logical Access - Modification and Removal

The entity modifies or removes access in a timely manner for users whose system access is no longer authorized.

Implementation Examples:
  • Automated deprovisioning upon termination
  • Regular access reviews and certifications
  • Timely access modification for role changes
  • Monitoring of inactive user accounts
  • HR integration for status changes
CC6.7 Preventive High
Transmission of Data and Credentials

The entity restricts the transmission of data and credentials to authorized users and systems.

Implementation Examples:
  • Encryption of data in transit (TLS/SSL)
  • Secure file transfer protocols (SFTP, HTTPS)
  • VPN for remote access
  • Certificate management and validation
  • Network segmentation and firewalls
CC6.8 Preventive Medium
Physical Access Controls

The entity restricts physical access to facilities and protected information assets to authorized personnel.

Implementation Examples:
  • Badge access control systems
  • Visitor management and escort procedures
  • Security cameras and monitoring
  • Secure disposal of confidential information
  • Environmental protection (fire, flood, climate)

System Operations (CC7)

CC7.1 Detective High
System Operations - System Quality

The entity manages systems to meet operational requirements through system quality processes.

Implementation Examples:
  • System performance monitoring and alerting
  • Capacity planning and management
  • Service level agreement monitoring
  • System availability tracking and reporting
  • Problem management and resolution procedures
CC7.2 Detective High
System Monitoring - Detection of Incidents

The entity uses detection tools and configuration management to prevent, detect, and correct processing deviations.

Implementation Examples:
  • Security Information and Event Management (SIEM)
  • Intrusion detection and prevention systems
  • Log monitoring and analysis
  • Vulnerability scanning and assessment
  • Configuration management and drift detection
CC7.3 Corrective Medium
System Operations - Response to Incidents

The entity evaluates security events to determine whether they could impact system security and responds appropriately.

Implementation Examples:
  • Incident response plan and procedures
  • Security incident escalation process
  • Incident classification and prioritization
  • Post-incident review and lessons learned
  • Communication procedures for incidents
CC7.4 Corrective Medium
System Operations - Recovery and Continuity

The entity implements recovery procedures for recovery from system failures to meet system availability objectives.

Implementation Examples:
  • Data backup and recovery procedures
  • Business continuity and disaster recovery plans
  • Recovery time and point objectives (RTO/RPO)
  • Regular backup testing and validation
  • Alternative processing site arrangements

SOC 2 Controls Summary

99+

Total Controls

58

Security Controls

5

Trust Service Criteria

8

Control Categories