SOC 2
SOC 2 (System and Organization Controls 2) is an auditing standard developed by the AICPA for service organizations. It evaluates controls relevant to security, availability, processing integrity, confidentiality, and privacy — the Trust Service Criteria (TSC). A SOC 2 Type II report is a standard expectation for any SaaS company or cloud service provider selling to enterprises.
Infracast ships 52 automated rules mapped to the five Trust Service Criteria, focusing on the Security criterion (CC) which is required in all SOC 2 engagements.
Trust Service Criteria Overview
| Criterion | Required | Rules | Description |
|---|---|---|---|
| Security (CC) | ✅ Always | 38 | Protection against unauthorized access |
| Availability (A) | Optional | 6 | System availability per SLA commitments |
| Processing Integrity (PI) | Optional | 3 | Complete, valid, accurate processing |
| Confidentiality (C) | Optional | 3 | Protection of confidential information |
| Privacy (P) | Optional | 2 | Personal information lifecycle management |
Most organizations pursue SOC 2 for the Security criterion plus Availability and Confidentiality for SaaS contexts.
How Infracast Maps Findings to Trust Service Criteria
Security Criterion (CC)
The Security criterion is organized into 9 Common Criteria (CC) categories:
| Category | Description | Automated Rules |
|---|---|---|
| CC1 | Control Environment | 2 |
| CC2 | Communication and Information | 1 |
| CC3 | Risk Assessment | 3 |
| CC4 | Monitoring Activities | 4 |
| CC5 | Control Activities | 5 |
| CC6 | Logical and Physical Access Controls | 14 |
| CC7 | System Operations | 5 |
| CC8 | Change Management | 2 |
| CC9 | Risk Mitigation | 2 |
CC6 — Logical Access (Most Rule-Dense)
CC6 is where most technical infrastructure controls live, and where Infracast provides the most automated coverage:
| Rule ID | TSC Control | Description |
|---|---|---|
SOC2-CC6.1-MFA-ALL-USERS | CC6.1 | MFA required for all user accounts |
SOC2-CC6.1-ROOT-MFA | CC6.1 | Root account MFA enabled |
SOC2-CC6.3-SSH-RESTRICTED | CC6.3 | SSH not open to 0.0.0.0/0 |
SOC2-CC6.3-SG-INGRESS | CC6.3 | Security groups restrict inbound access |
SOC2-CC6.6-S3-PUBLIC-BLOCK | CC6.6 | S3 public access blocked |
SOC2-CC6.7-EBS-ENCRYPTION | CC6.7 | EBS volumes encrypted at rest |
SOC2-CC6.7-RDS-ENCRYPTION | CC6.7 | RDS instances encrypted |
SOC2-CC6.7-TLS-ENFORCED | CC6.7 | Encryption in transit on load balancers |
Control Inheritance
A single infrastructure finding often maps to multiple TSC controls:
Finding: "S3 bucket has public access enabled"
├── CC6.1 — Logical access controls (public = no access control)
├── CC6.6 — Logical access security measures
└── C1.1 — Confidentiality of information
Evidence Collection for Auditors
SOC 2 auditors (CPA firms) require evidence that controls were operating effectively over the audit period (typically 6–12 months for Type II). Infracast provides continuous evidence collection:
What Infracast Collects
| Evidence Type | How Collected | Retention |
|---|---|---|
| Configuration snapshots | Discovery jobs | 12 months |
| Finding history | Audit trail | 24 months |
| Remediation timeline | Change tracking | 24 months |
| Access control states | IAM discovery | 12 months |
Generating an Auditor Evidence Package
POST /api/v1/tenants/{tenantID}/evidence/generate
{
"framework": "soc2",
"period_start": "2023-07-01",
"period_end": "2024-06-30",
"criteria": ["cc6", "cc7", "a1"],
"format": "zip"
}
The package includes:
- Monthly compliance score snapshots for the audit period
- Finding open/close dates (demonstrating timely remediation)
- Configuration evidence at each discovery checkpoint
- Attestation records for manual controls (with approval chains)
Scheduling Continuous Evidence
For SOC 2 Type II, evidence must demonstrate controls operated over time. Schedule weekly collection:
POST /api/v1/tenants/{tenantID}/reports/schedule
{
"type": "evidence-package",
"framework": "soc2",
"frequency": "weekly",
"day": "monday",
"time": "06:00",
"recipients": ["security@company.com"]
}
Start collecting evidence at least 6 months before your SOC 2 audit window. Type II requires a minimum 6-month observation period.
Non-Technical Controls (Attestation-Driven)
Many SOC 2 controls require policies and human processes rather than infrastructure checks:
| Category | Examples | How Assessed |
|---|---|---|
| CC1 — Control Environment | Code of conduct, org structure | Attestation |
| CC2 — Communication | Policy distribution, training | Attestation |
| CC5 — Control Activities | Vendor management, background checks | Attestation |
| CC8 — Change Management | Change approval process | Attestation + automated drift detection |
Use Infracast's questionnaire workflows to collect and track attestations:
# Create SOC 2 CC8 change management questionnaire
POST /api/v1/tenants/{tenantID}/questionnaires/from-template
{
"template_id": "soc2-cc8-change-management",
"title": "Change Management Controls — Q3 2024",
"assignees": ["engineering-lead@company.com"]
}
Availability Criterion (A)
For SaaS companies including availability in scope:
| Rule | TSC | Description |
|---|---|---|
SOC2-A1.1-MULTI-AZ | A1.1 | RDS instances deployed multi-AZ |
SOC2-A1.1-ALB-HEALTH | A1.1 | Load balancers have health checks configured |
SOC2-A1.2-BACKUP-ENABLED | A1.2 | RDS automated backups enabled |
SOC2-A1.2-S3-VERSIONING | A1.2 | S3 versioning enabled for critical buckets |
SOC2-A1.3-RECOVERY-PLAN | A1.3 | Disaster recovery plan (attestation) |
SOC 2 Compliance Score
GET /api/v1/tenants/{tenantID}/compliance/summary?framework=soc2
{
"framework": "soc2",
"score": 91,
"criteria": {
"cc": { "score": 89, "rules": 38, "passing": 34 },
"a": { "score": 100, "rules": 6, "passing": 6 },
"c": { "score": 100, "rules": 3, "passing": 3 }
},
"audit_period_days": 180,
"evidence_snapshots": 26
}
Generating a SOC 2 Readiness Report
Before engaging an auditor, generate a readiness assessment:
POST /api/v1/tenants/{tenantID}/reports/generate
{
"type": "framework",
"framework": "soc2",
"format": "pdf",
"options": {
"report_subtype": "readiness",
"include_remediation": true,
"include_evidence_summary": true
}
}
The readiness report highlights:
- Controls currently failing (must remediate before audit)
- Controls with insufficient evidence history (start collecting now)
- Manual controls needing attestation
- Projected SOC 2 score if current remediations complete
Next Steps
- API: Findings — Query SOC 2 findings by TSC category
- API: Reports — Generate auditor-ready evidence packages
- HIPAA Guide — Often paired with SOC 2 for healthcare SaaS