SOC 2: Security (Common Criteria)
Baseline controls for governance, access control, risk management, monitoring, and change operations.
Back to SOC 2 categoriesControls and Detailed Requirements
CC1.1Integrity and Ethical Values
Establish and communicate standards of conduct, ethical expectations, and security-related behaviors so personnel understand acceptable practices and accountability expectations.
CC1.2Board and Oversight Independence
Ensure the board or equivalent governance body provides independent oversight of management's design and operation of controls, including periodic review of security and risk reporting.
CC1.3Organizational Structure and Reporting Lines
Define authority, responsibility, and reporting structures that support effective internal control over security, including segregation of duties and escalation paths.
CC1.4Commitment to Competence
Recruit, train, and retain personnel with sufficient competence for control responsibilities, and align role expectations with security and compliance requirements.
CC1.5Accountability and Performance Measures
Assign control ownership and evaluate performance against security objectives so control operation is measurable, monitored, and enforced.
CC2.1Specify Security Objectives
Define measurable security objectives aligned to service commitments, legal obligations, and business strategy to guide risk assessment and control design.
CC2.2Identify and Analyze Risks
Perform periodic risk assessments to identify threats, vulnerabilities, and impacts, then prioritize treatment activities based on likelihood, severity, and business criticality.
CC2.3Assess Fraud and Misuse Risk
Evaluate potential fraud, misuse, or malicious behavior that could affect systems or data and incorporate preventive and detective controls into the risk response plan.
CC3.1Design of Risk Mitigation Controls
Select and design controls that mitigate identified risks to acceptable levels, considering control precision, frequency, and whether controls are manual, automated, or hybrid.
CC3.2Control Design and Implementation
Implement designed controls through policy, process, and technology, then validate that controls operate as intended before relying on them for assurance.
CC3.3Define Control Policies and Procedures
Document control policies, standards, and procedures with clear ownership and expected evidence so operators can consistently execute required activities.
CC3.4Evaluate Changes Impacting Controls
Assess internal and external changes (technology, organization, regulation, threat landscape) for control impact and update controls promptly to remain effective.
CC4.1Monitor Internal Control Performance
Run ongoing and periodic evaluations of control operation, including automated monitoring and management review, to identify control failures early.
CC4.2Identify and Communicate Deficiencies
Track control deficiencies, determine root causes, assign remediation owners, and escalate unresolved high-risk findings to accountable leadership.
CC4.3Remediate and Validate Corrective Actions
Implement corrective actions for identified gaps and validate remediation effectiveness before closing findings in the control issue register.
CC5.1Control Information Quality
Capture, process, and retain complete and accurate control-relevant information so decision-makers can monitor risk and control status reliably.
CC5.2Logical Access Management
Provision, approve, review, and revoke access according to least privilege and job responsibility, including timely deprovisioning and periodic recertification.
CC5.3Internal Communication of Control Responsibilities
Communicate security expectations, policy changes, and incident obligations internally so personnel can perform assigned control activities consistently.
CC6.1Logical and Physical Access Controls
Restrict logical and physical access to systems and data resources through approved authorization mechanisms and periodic validation of access appropriateness.
CC6.2Authentication and Credential Security
Enforce strong authentication controls, secure credential lifecycle practices, and safeguards for privileged identities and shared accounts.
CC6.3Authorization and Role Enforcement
Authorize access and system actions based on defined roles and approved entitlements, preventing unauthorized activity through technical and procedural constraints.
CC6.4Infrastructure and Endpoint Security
Harden infrastructure and endpoint configurations, deploy protective controls, and monitor security posture to reduce exploitable weaknesses.
CC6.5Data Transmission and Protection
Protect data in transit and at rest through encryption and transmission safeguards, ensuring confidentiality and integrity requirements are consistently applied.
CC6.6System Operations and Monitoring
Operate systems using defined operational procedures, monitor critical events, and respond to anomalies to maintain controlled and secure processing conditions.
CC6.7Change Management Controls
Require formal approval, testing, and controlled deployment of changes with rollback planning to prevent unauthorized or destabilizing modifications.
CC6.8Vulnerability and Threat Management
Identify, assess, and remediate vulnerabilities in a risk-based timeframe while incorporating threat intelligence into defensive and remediation priorities.
CC7.1Security Event Detection
Implement event logging and detection mechanisms that identify potential security incidents across systems, applications, and infrastructure boundaries.
CC7.2Incident Analysis and Triage
Analyze detected events to determine severity, scope, and business impact, and triage incidents for timely containment and response.
CC7.3Incident Response Execution
Execute documented incident response procedures for containment, eradication, and recovery, including role-based coordination and evidence preservation.
CC7.4Incident Communication and Reporting
Communicate incident status and required notifications to internal stakeholders, customers, and regulators based on established notification criteria.
CC7.5Post-Incident Learning and Improvement
Perform root-cause analysis and lessons-learned reviews after incidents, then update controls, playbooks, and training to reduce recurrence risk.
CC8.1Vendor and Business Partner Risk Oversight
Evaluate and monitor third-party vendors and business partners for security and control risk, including onboarding due diligence and ongoing assurance reviews.
CC9.1Risk Mitigation During System Operations
Continuously align control operations to changing risks and commitments, ensuring mitigation activities remain effective as business and technical conditions evolve.