Files
claude-skills-reference/ra-qm-team/soc2-compliance/references/trust_service_criteria.md
Reza Rezvani 87f3a007c9 feat(engineering,ra-qm): add secrets-vault-manager, sql-database-assistant, gcp-cloud-architect, soc2-compliance
secrets-vault-manager (403-line SKILL.md, 3 scripts, 3 references):
- HashiCorp Vault, AWS SM, Azure KV, GCP SM integration
- Secret rotation, dynamic secrets, audit logging, emergency procedures

sql-database-assistant (457-line SKILL.md, 3 scripts, 3 references):
- Query optimization, migration generation, schema exploration
- Multi-DB support (PostgreSQL, MySQL, SQLite, SQL Server)
- ORM patterns (Prisma, Drizzle, TypeORM, SQLAlchemy)

gcp-cloud-architect (418-line SKILL.md, 3 scripts, 3 references):
- 6-step workflow mirroring aws-solution-architect for GCP
- Cloud Run, GKE, BigQuery, Cloud Functions, cost optimization
- Completes cloud trifecta (AWS + Azure + GCP)

soc2-compliance (417-line SKILL.md, 3 scripts, 3 references):
- SOC 2 Type I & II preparation, Trust Service Criteria mapping
- Control matrix generation, evidence tracking, gap analysis
- First SOC 2 skill in ra-qm-team (joins GDPR, ISO 27001, ISO 13485)

All 12 scripts pass --help. Docs generated, mkdocs.yml nav updated.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-25 14:05:11 +01:00

17 KiB

SOC 2 Trust Service Criteria Reference

Comprehensive reference for all five AICPA Trust Service Criteria (TSC) categories. Each criterion includes its objective, sub-criteria, typical controls, and evidence examples.


1. Security (Common Criteria) — Required

The Security category is mandatory for every SOC 2 engagement. It maps to the 17 COSO 2013 internal control principles organized into nine groups (CC1-CC9).

CC1 — Control Environment

Establishes the foundation for all other components of internal control.

Criterion Objective Typical Controls Evidence
CC1.1 Demonstrate commitment to integrity and ethical values Code of conduct, ethics hotline, background checks Signed code of conduct, hotline reports, screening records
CC1.2 Board exercises oversight of internal control Independent board/committee, regular reporting Board meeting minutes, committee charters, oversight reports
CC1.3 Management establishes structure and reporting lines Organizational charts, role definitions, RACI matrices Org charts, job descriptions, authority matrices
CC1.4 Commitment to attract, develop, and retain competent individuals Training programs, competency assessments, career development Training completion records, skills assessments, HR policies
CC1.5 Hold individuals accountable for internal control responsibilities Performance evaluations, disciplinary procedures Performance review records, accountability documentation

CC2 — Communication and Information

Ensures relevant, quality information flows internally and externally.

Criterion Objective Typical Controls Evidence
CC2.1 Obtain and generate relevant quality information Data classification, information quality standards Classification policy, data quality reports
CC2.2 Internally communicate information and responsibilities Internal newsletters, policy distribution, security awareness Communication logs, training materials, acknowledgment records
CC2.3 Communicate with external parties Customer notifications, vendor communications, incident notices External communication policy, notification records, status pages

CC3 — Risk Assessment

Identifies and assesses risks that may prevent achievement of objectives.

Criterion Objective Typical Controls Evidence
CC3.1 Specify objectives to identify and assess risks Risk management framework, risk appetite statement Risk methodology document, risk appetite approval
CC3.2 Identify and analyze risks Risk assessments, threat modeling, vulnerability analysis Risk register, threat models, assessment reports
CC3.3 Consider potential for fraud Fraud risk assessment, segregation of duties Fraud risk report, SoD matrix, anti-fraud controls
CC3.4 Identify and assess changes impacting internal control Change impact analysis, environmental scanning Change assessments, business impact analyses

CC4 — Monitoring Activities

Ongoing evaluations to verify internal controls are present and functioning.

Criterion Objective Typical Controls Evidence
CC4.1 Select and perform ongoing and separate evaluations Continuous monitoring, internal audits, control testing Monitoring dashboards, audit reports, testing results
CC4.2 Evaluate and communicate deficiencies Deficiency tracking, remediation management, management reporting Deficiency logs, remediation plans, management reports

CC5 — Control Activities

Policies and procedures that ensure management directives are carried out.

Criterion Objective Typical Controls Evidence
CC5.1 Select and develop control activities that mitigate risks Risk-based control selection, control design documentation Control matrix, risk treatment plans
CC5.2 Select and develop technology controls IT general controls, automated controls, technology governance ITGC documentation, technology policies, automated control configs
CC5.3 Deploy control activities through policies and procedures Policy library, procedure documentation, acknowledgment tracking Policy repository, version history, signed acknowledgments

CC6 — Logical and Physical Access Controls

Restrict logical and physical access to information assets.

Criterion Objective Typical Controls Evidence
CC6.1 Logical access security over protected assets IAM platform, SSO, MFA enforcement IAM configuration, SSO settings, MFA enrollment reports
CC6.2 Access provisioning based on role and need Role-based access, provisioning workflows, approval chains Provisioning tickets, role matrix, approval records
CC6.3 Access removal on termination or role change Offboarding checklists, automated deprovisioning Deprovisioning tickets, termination checklists, access removal logs
CC6.4 Periodic access reviews Quarterly user access reviews, entitlement validation Access review reports, entitlement listings, sign-off records
CC6.5 Physical access restrictions Badge systems, visitor management, secure areas Badge access logs, visitor logs, physical access policies
CC6.6 Encryption of data in transit and at rest TLS enforcement, disk encryption, key management TLS configuration, encryption settings, key rotation records
CC6.7 Data transmission and movement restrictions DLP tools, network segmentation, firewall rules DLP configuration, network diagrams, firewall rule sets
CC6.8 Prevention/detection of unauthorized software Endpoint protection, application whitelisting, malware scanning EDR configuration, whitelist policies, scan reports

CC7 — System Operations

Detect and mitigate security events and anomalies.

Criterion Objective Typical Controls Evidence
CC7.1 Vulnerability identification and management Vulnerability scanning, patch management, remediation SLAs Scan reports, patch records, SLA compliance metrics
CC7.2 Monitor for anomalies and security events SIEM, IDS/IPS, behavioral analytics SIEM dashboards, alert rules, detection logs
CC7.3 Security event evaluation and classification Incident classification criteria, triage procedures Classification matrix, triage logs, escalation records
CC7.4 Incident response execution Incident response plan, response team, communication procedures IR plan, incident tickets, communication records
CC7.5 Incident recovery and lessons learned Recovery procedures, post-incident reviews, plan updates Recovery records, postmortem reports, plan revision history

CC8 — Change Management

Authorize, design, develop, test, and implement changes to infrastructure and software.

Criterion Objective Typical Controls Evidence
CC8.1 Change authorization, testing, and approval Change management process, approval workflows, testing requirements Change tickets, approval records, test results, deployment logs

CC9 — Risk Mitigation

Manage risks associated with business disruption, vendors, and partners.

Criterion Objective Typical Controls Evidence
CC9.1 Vendor and business partner risk management Vendor assessment program, third-party risk management Vendor risk assessments, vendor register, vendor SOC reports
CC9.2 Risk mitigation through transfer mechanisms Cyber insurance, contractual protections Insurance certificates, contract provisions

2. Availability (A1) — Optional

Addresses system uptime, performance, and recoverability commitments.

Criterion Objective Typical Controls Evidence
A1.1 Capacity and performance management Auto-scaling, resource monitoring, capacity planning Capacity dashboards, scaling policies, resource utilization trends
A1.2 Recovery operations Backup procedures, DR planning, BCP documentation Backup logs, DR plan, BCP documentation, recovery procedures
A1.3 Recovery testing DR drills, failover tests, RTO/RPO validation DR test reports, failover results, RTO/RPO measurements

When to Include Availability

  • Your customers depend on your service uptime
  • You have SLAs with financial penalties for downtime
  • Your service is in the critical path of customer operations
  • You provide infrastructure or platform services

Key Metrics

Metric Description Typical Target
RTO Recovery Time Objective — max acceptable downtime 1-4 hours
RPO Recovery Point Objective — max acceptable data loss 1-24 hours
SLA Service Level Agreement — uptime commitment 99.9%-99.99%
MTTR Mean Time to Recovery — average recovery duration < 1 hour

3. Confidentiality (C1) — Optional

Protects information designated as confidential throughout its lifecycle.

Criterion Objective Typical Controls Evidence
C1.1 Identification of confidential information Data classification scheme, confidential data inventory Classification policy, data inventory, labeling standards
C1.2 Protection of confidential information Encryption, access restrictions, DLP, secure transmission Encryption configs, ACLs, DLP rules, secure transfer logs
C1.3 Disposal of confidential information Secure deletion, media sanitization, retention enforcement Disposal procedures, sanitization certificates, deletion logs

When to Include Confidentiality

  • You handle trade secrets or proprietary business information
  • Contracts require confidentiality assurance
  • You process data classified above "public" in your classification scheme
  • Customers share confidential data for processing

Data Classification Levels

Level Description Handling Requirements
Public No restrictions No special controls
Internal Business use only Access controls, basic encryption
Confidential Restricted access Strong encryption, DLP, access reviews
Highly Confidential Strictly controlled Strongest encryption, MFA, audit logging, need-to-know

4. Processing Integrity (PI1) — Optional

Ensures system processing is complete, valid, accurate, timely, and authorized.

Criterion Objective Typical Controls Evidence
PI1.1 Processing accuracy Input validation, data integrity checks, output verification Validation rules, integrity check logs, reconciliation reports
PI1.2 Processing completeness Transaction monitoring, completeness checks, reconciliation Transaction logs, batch processing reports, reconciliation records
PI1.3 Processing timeliness SLA monitoring, batch job scheduling, processing alerts SLA reports, job schedules, processing time metrics
PI1.4 Processing authorization Authorization controls, segregation of duties, approval workflows Authorization matrix, SoD analysis, approval records

When to Include Processing Integrity

  • You perform financial calculations or transactions
  • Data accuracy is critical to customer operations
  • You provide analytics or reporting that drives business decisions
  • Regulatory requirements demand processing accuracy (e.g., healthcare, finance)

Validation Checkpoints

Stage Validation Method
Input Data format, range, completeness Automated validation rules
Processing Calculation accuracy, transformation correctness Unit tests, reconciliation
Output Report accuracy, data completeness Cross-checks, manual review, checksums
Transfer Transmission integrity, completeness Hash verification, acknowledgment protocols

5. Privacy (P1-P8) — Optional

Governs the collection, use, retention, disclosure, and disposal of personal information. Closely aligns with GDPR, CCPA, and other privacy regulations.

Criterion Objective Typical Controls Evidence
P1.1 Notice — inform data subjects about data practices Privacy policy, collection notices, purpose statements Published privacy policy, collection banners, purpose documentation
P2.1 Choice and consent — provide opt-in/opt-out mechanisms Consent management, preference centers, granular consent Consent records, preference logs, opt-out mechanisms
P3.1 Collection — collect only necessary personal information Data minimization, lawful basis documentation, purpose specification Collection audits, lawful basis records, data flow diagrams
P4.1 Use, retention, and disposal — limit use and enforce retention Purpose limitation, retention schedules, automated deletion Use restriction controls, retention policies, deletion logs
P4.2 Disposal — secure disposal when no longer needed Secure deletion, media sanitization Disposal certificates, sanitization records
P5.1 Access — provide data subjects access to their data DSAR processing, data portability, access portals DSAR logs, response timelines, export capabilities
P5.2 Correction — allow data subjects to correct their data Correction request processing, data update mechanisms Correction logs, update records
P6.1 Disclosure — control third-party data sharing Data sharing agreements, third-party inventory, DPAs DPAs, sharing agreements, third-party register
P6.2 Notification — notify of breaches affecting personal data Breach notification procedures, regulatory reporting Breach response plan, notification records, reporting logs
P7.1 Quality — maintain accurate personal information Data quality checks, accuracy verification, correction mechanisms Quality reports, accuracy audits, correction records
P8.1 Monitoring — monitor privacy program effectiveness Privacy audits, compliance reviews, complaint tracking Audit reports, compliance dashboards, complaint logs

When to Include Privacy

  • You process personal information (PII) of end users or customers
  • You operate in jurisdictions with privacy regulations (GDPR, CCPA, LGPD)
  • Customers request privacy assurance as part of vendor assessment
  • Your service involves health, financial, or other sensitive personal data

Privacy Criteria Overlap with GDPR

SOC 2 Privacy GDPR Article Alignment
P1 (Notice) Art. 13-14 Direct — transparency requirements
P2 (Consent) Art. 6-7 Direct — lawful basis and consent
P3 (Collection) Art. 5(1)(b-c) Direct — purpose limitation, minimization
P4 (Retention) Art. 5(1)(e) Direct — storage limitation
P5 (Access) Art. 15-16 Direct — data subject rights
P6 (Disclosure) Art. 33-34 Direct — breach notification
P7 (Quality) Art. 5(1)(d) Direct — accuracy principle
P8 (Monitoring) Art. 5(2) Direct — accountability principle

TSC Selection Guide

Question If Yes, Include
Do you store/process customer data? Security (required)
Do customers depend on your uptime? Availability
Do you handle confidential business data? Confidentiality
Is data accuracy critical to your service? Processing Integrity
Do you process personal information? Privacy

Common Combinations

Company Type Typical TSC Selection
SaaS platform Security + Availability
Data analytics Security + Processing Integrity + Confidentiality
Healthcare SaaS Security + Availability + Privacy + Confidentiality
Financial services Security + Availability + Processing Integrity + Confidentiality
Infrastructure/PaaS Security + Availability
HR/Payroll SaaS Security + Availability + Privacy

Mapping to Other Frameworks

SOC 2 Criteria ISO 27001 NIST CSF HIPAA PCI DSS
CC1 (Control Environment) A.5 (Policies) ID.GV Administrative Safeguards Req 12
CC2 (Communication) A.5.1 (Policies) ID.GV Administrative Safeguards Req 12
CC3 (Risk Assessment) A.8.2 (Risk) ID.RA Risk Analysis Req 12.2
CC4 (Monitoring) A.8.34 (Monitoring) DE.CM Audit Controls Req 10
CC5 (Control Activities) A.5-A.8 PR All Safeguards Multiple
CC6 (Logical/Physical Access) A.5.15, A.7 PR.AC Access Controls Req 7-9
CC7 (System Operations) A.8.8, A.8.15 DE, RS Technical Safeguards Req 5-6, 11
CC8 (Change Management) A.8.32 PR.IP Change Management Req 6.4
CC9 (Risk Mitigation) A.5.19-5.22 ID.SC Business Associate Agreements Req 12.8
A1 (Availability) A.8.13-14 PR.IP Contingency Plan Req 12.10
C1 (Confidentiality) A.5.13-14, A.8.10-12 PR.DS Access Controls Req 3-4
PI1 (Processing Integrity) A.8.24-25 PR.DS Integrity Controls Req 6.5
P1-P8 (Privacy) A.5.34 (Privacy) PR.PT Privacy Rule N/A