You are on page 1of 2

SOC 2 Compliance Checklist

The SOC 2 audit is based on a set of criteria that are used in evaluating controls relevant to the security,
availability, processing integrity, confidentiality, or privacy of a system.

What system components are evaluated during a SOC 2 audit?

• Infrastructure (physical, IT, or other hardware such as mobile devices)

• Software (application programs and IT system software that supports application


programs, such as OS and utilities)

• People (all personnel involved in the use of the system)

• Processes (all automated and manual procedures)

• Data (transmission streams, files, databases, tables, and output used or processed by a system)

What are your auditors looking for?

• Fairness of the presentation of a description of a service organization’s system relevant to one


or more of the Trust Services Criteria

• Design and operating effectiveness of a service organization’s controls over a system relevant to
one or more of the Trust Services Criteria

What are the Trust Services Criteria?

Security Availability Confidentiality

Processing Integrity Privacy


Compliance Checklist
Do you have a defined organizational Is access to data, software, functions, and
structure? other IT resources limited to authorized
personnel based on roles?
Designate authorized employees to
develop and implement policies and Restrict physical access to sensitive locations
procedures to authorized personnel only.

What are your background screening Have you implemented an access control
procedures? system and implemented monitoring to
identify intrusions?
Do you have established workforce conduct
standards? Develop and test incident response
procedures
Do your clients and employees understand
their role in using your system or service? Is software, hardware, and infrastructure
updated regularly as necessary?
Are system changes effectively
communicated to the appropriate personnel Do you have a change management process
in a timely manner? to address deficiencies in controls?

Perform a Risk Assessment What are your backup and recovery policies?

Have you identified potential threats to How are you addressing environmental risks?
the system?
Has your disaster recovery plan been tested
Have you analyzed the significance of and documented?
the risks associated with each threat?
How are you ensuring data is being
What are your mitigation strategies for processed, stored, and maintained
those risks? accurately and timely?

Perform regular vendor management How are you protecting confidential


assessments information against unauthorized access,
use, and disclosure?
Develop policies and procedures that
address all controls Do you have a fully documented data
retention policy?
Annual policy and procedure review

Do you have physical and logical access


controls in place?

You might also like