Cross-Sector

SOC 2: Processing Integrity

Controls ensuring processing is complete, accurate, timely, valid, and authorized.

Back to SOC 2 categories

Controls and Detailed Requirements

8 of 8 controls
PI1.1Define Processing Integrity Commitments

Document commitments for completeness, validity, accuracy, timeliness, and authorization of processing activities across relevant services.

PI1.2Input Validation and Authorization

Implement controls that validate input data quality and enforce authorization checks before processing to prevent invalid, incomplete, or unauthorized transactions.

PI1.3Processing Accuracy Controls

Design workflow checkpoints, reconciliation rules, and exception handling to ensure processing logic executes accurately and consistently across environments.

PI1.4Processing Completeness Controls

Use sequencing, reconciliation, and completeness checks to verify all intended transactions are processed exactly once with no unapproved omissions.

PI1.5Output Completeness and Integrity

Verify that system outputs are complete, tamper-resistant, and delivered only to approved recipients, with logging that supports traceability and auditability.

PI1.6Error Detection and Correction

Automatically detect processing failures, queue exceptions for review, and document remediation steps to correct impacted records without data loss.

PI1.7Change Validation for Processing Logic

Test application and workflow changes against processing requirements before release to prevent logic defects that could compromise transaction integrity.

PI1.8Monitoring and Reporting of Processing Metrics

Monitor key integrity metrics and exception trends, and provide management reporting that supports timely corrective action when integrity thresholds are not met.