Skip to content

SOC 2 Compliance Dashboard

Service Organization Control 2

Scope: Service organizations | Framework: AICPA TSC | Domain: Security

Overview

SOC 2 is an auditing framework based on the Trust Services Criteria (TSC) developed by the AICPA. It evaluates an organization's controls related to security, availability, processing integrity, confidentiality, and privacy.

Controls

SOC2-C001: Security (Common Criteria)

  • Requirement: Controls to protect against unauthorized access
  • Automated: Yes
  • Evidence: Access logs, security monitoring

SOC2-C002: Availability

  • Requirement: System availability commitments and performance monitoring
  • Automated: Yes
  • Evidence: Uptime reports, SLA tracking

SOC2-C003: Processing Integrity

  • Requirement: System processing is complete, valid, accurate, and timely
  • Automated: Yes
  • Evidence: Data validation reports, processing logs

SOC2-C004: Confidentiality

  • Requirement: Information designated as confidential is protected
  • Automated: Yes
  • Evidence: Classification audit, encryption status

Compliance Gates

Gate Control Ref Requirement Status
SOC2-G001 SOC2-C001 Security monitoring operational 24/7
SOC2-G002 SOC2-C002 SLA uptime target met
SOC2-G003 SOC2-C003 Data validation rules active

Metrics

Metric Target Source Trend
System uptime 99.9% monitoring_system Stable
Security incident count 0 critical/month incident_tracker Improving
Audit finding closure rate 100% within 90 days audit_tracker Improving
  1. Prepare for annual SOC 2 Type II audit
  2. Review and update control descriptions
  3. Close open audit findings within remediation timeline