Skip to content

SOC 2 Type II

Achieve and maintain SOC 2 Type II compliance with CyberOrigen.

Overview

SOC 2 (Service Organization Control 2) is an auditing framework for service providers storing customer data. It evaluates controls based on five Trust Services Criteria.

Trust Services Criteria

Security (Required)

The Common Criteria - required for all SOC 2 audits:

CategoryDescription
CC1Control Environment
CC2Communication & Information
CC3Risk Assessment
CC4Monitoring Activities
CC5Control Activities
CC6Logical & Physical Access
CC7System Operations
CC8Change Management
CC9Risk Mitigation

Availability (Optional)

For services with uptime commitments:

  • A1.1: Capacity planning
  • A1.2: Environmental protections
  • A1.3: Recovery procedures

Processing Integrity (Optional)

For accurate data processing:

  • PI1.1-PI1.5: Input/output accuracy

Confidentiality (Optional)

For sensitive data protection:

  • C1.1-C1.2: Data classification and disposal

Privacy (Optional)

For personal information handling:

  • P1-P8: Privacy principles

Getting Started

1. Enable Framework

  1. Go to GRCFrameworks
  2. Click Enroll on SOC 2 Type II
  3. Select applicable criteria
  4. Click Enable

2. Baseline Assessment

  1. Run a compliance scan
  2. Review gap analysis
  3. Prioritize remediation

3. Implement Controls

Use CyberOrigen's control library:

  1. Go to GRCControl Library
  2. Filter by SOC 2
  3. Update implementation status
  4. Assign control owners

Key Controls

CC6 - Logical Access

Most commonly tested controls:

ControlRequirementCyberOrigen Feature
CC6.1Access controlsScan for access issues
CC6.2User registrationAccess review reports
CC6.6Access reviewAutomated access audits
CC6.7EncryptionTLS/encryption scanning

CC7 - System Operations

ControlRequirementCyberOrigen Feature
CC7.1Vulnerability managementContinuous scanning
CC7.2Incident responseRemediation workflow
CC7.4Backup/restoreConfiguration checks

Evidence Collection

Automated Evidence

CyberOrigen automatically generates:

  • Vulnerability scan reports
  • Access configuration checks
  • Encryption verification
  • Patch status reports

Manual Evidence

Upload these documents:

  • Policies and procedures
  • Board meeting minutes
  • Training records
  • Incident logs

Evidence Mapping

  1. Go to GRCEvidence
  2. Upload or link evidence
  3. Map to relevant controls
  4. Track collection status

Audit Preparation

Pre-Audit Checklist

3 Months Before:

  • [ ] All controls implemented
  • [ ] Evidence collection complete
  • [ ] Internal testing done
  • [ ] Gaps remediated

1 Month Before:

  • [ ] Evidence reviewed
  • [ ] Owners assigned
  • [ ] Auditor access configured

Auditor Access

Professional Feature

Auditor Portal requires Professional or Enterprise plan.

Grant auditor read-only access:

  1. Go to GRCAudit Engagements
  2. Create engagement
  3. Invite auditor
  4. Set access permissions

Report Builder

Generate audit-ready packages:

  1. Go to GRCReport Builder
  2. Select SOC 2 framework
  3. Choose report type
  4. Export PDF

Continuous Compliance

After certification, maintain compliance:

  • Weekly vulnerability scans
  • Quarterly access reviews
  • Annual policy reviews
  • Continuous evidence collection

Monitoring

CyberOrigen tracks:

  • Control status changes
  • Evidence expiration
  • Compliance score trends
  • Finding remediation

Alerts

Configure alerts for:

  • Compliance score drops
  • Control failures
  • Evidence expiration
  • Audit period reminders

Common Gaps

ControlCommon IssueSolution
CC6.1No MFAEnable MFA everywhere
CC6.6No access reviewsSchedule quarterly reviews
CC7.1Unpatched systemsAutomated patching
CC8.1No change controlFormal change process

Resources

Agentic AI-Powered Security & Compliance