Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
SOC 2 COMPLIANCE · TYPE I & II · TRUST SERVICE CRITERIA · CONTINUOUS MONITORING

SOC 2 compliance built onreal security controls.Not checkbox documentation.

Prepare, validate, and maintain SOC 2 Type I & II attestation with continuous controls monitoring and evidence automation. From initial gap assessment through audit support — with ongoing posture maintenance between cycles.

SOC 2 · AICPA TRUST SERVICE CRITERIA

Enterprise trust starts with SOC 2.

87% of enterprise buyers require SOC 2 attestation before engaging with vendors. SOC 2 Type I validates control design; Type II proves 12+ months of consistent, effective operation across all five Trust Service Criteria — the gold standard for cloud and SaaS vendors.

0%

Enterprise buyers require SOC 2

0+

TSC controls fully implemented

0+

Evidence items collected per month

0%

Audit prep time reduction

CC49

Security

100%

A11

Availability

85%

PI13

Processing Integrity

72%

C7

Confidentiality

68%

P10

Privacy

60%

FIVE PILLARS OF TRUST

Trust Service Criteria. Deep-dive validation.

49controls

CC

Common Criteria (CC)

100% of scope covered

CC1 Control Environment
CC2 Communication & Info
CC3 Risk Assessment
CC4 Monitoring
CC5 Control Activities
CC6 Logical & Physical Access
CC7 System Operations
CC8 Change Management
CC9 Risk Mitigation

KEY REQUIREMENTS

  • Multi-factor authentication enforcement on all privileged accounts
  • Privileged access management (PAM) with session recording
  • Intrusion detection & prevention systems coverage
  • Vulnerability management programme — scan, triage, remediate
  • Incident response plan tested at least annually

AICPA COMMON CRITERIA SERIES

CC Control Library. 49 controls, 9 categories.

The Common Criteria (CC) series is the required core of every SOC 2 engagement. CC6 (Logical Access) carries the largest sample burden — auditors test it most aggressively.

CC6

Logical & Physical Access

8

controls

CC6.1 — Logical access controls and IAM governance

CC6.2 — Authentication mechanisms including MFA

CC6.3 — Privileged access management and just-in-time access

CC6.4 — Physical access controls to data centres

CC6.5 — Account lifecycle (provisioning, modification, termination)

CC6.6 — External access restrictions and remote access controls

CC6.7 — Data transmission encryption standards

CC6.8 — Malicious software detection and prevention

High-focus area: CC6 carries the largest auditor sample sizes. MFA enforcement, PAM, and account lifecycle are examined across 25–40 samples each. Automated evidence collection is essential here.

ATTESTATION LEVELS

Type I vs Type II. Know the difference.

Type I

Point-in-Time

Auditor validates that controls are suitably designed at a single point in time.

Timeline

6–10 weeks

Evidence Period

Single snapshot

Audience

Early-stage / new vendors

Assurance

Design suitability only

AUDIT SCOPE — Type I

  • Control design documented and reviewed
  • Policies & procedures inspected by auditor
  • System description validated per AICPA
  • Suitability-of-design opinion issued
  • No sample-based operational testing
Dimension
Type I
Type II
Purpose
Control design suitability
Design + operating effectiveness
Observation window
Single date snapshot
6–12 month continuous window
Testing methodology
Inspection & inquiry
Sample-based per control (25–40 samples)
Time to complete
6–10 weeks from kickoff
12–20 weeks (post-obs. period)
Enterprise acceptance
Some buyers accept
Required by most enterprise buyers
Repeat cycle
Annual (optional)
Annual (typically required by contracts)

JOURNEY TO ATTESTATION

Compliance lifecycle. 8 phases to Type II.

P1

Scope Definition

W1–2

Define TSC in scope, system boundaries, and service commitments. Document the system description per AICPA guidance. Agree on observation period start date.

Milestone KPIScope doc signed off

ALL PHASES

AUTOMATED EVIDENCE COLLECTION

Evidence engine. 320+ items collected monthly.

COLLECTION PIPELINE

01

Collect

Integrates with 10+ cloud & security platforms. Pulls logs, configs, access records, and change events continuously — no manual triggers.

02

Validate

Each evidence item is mapped to its CC control ID. Automated completeness checks verify format, timestamp, sample size, and auditor readiness.

03

Store

Immutable, tamper-evident evidence vault. Auditor-accessible portal with filtering by TSC, date range, control ID, and exception status.

INTEGRATIONS

AWS

CloudTrail

AZR

Az Monitor

GCP

Audit Logs

OKT

Okta

GIT

GitHub

DDG

Datadog

CRD

CrowdStrike

SNW

Snowflake

JRA

Jira

SEN

Sentinel

LIVE EVIDENCE FEED
UTC · AUTO-CYCLING
PASS
CC6.1IAM quarterly access review completed — 412 accounts verified
14:02:11Z
PASS
CC6.2MFA enforcement scan — 100% coverage across all privileged roles
14:01:58Z
WARN
CC7.2Anomaly detection rule fired — investigated, confirmed false positive
14:01:22Z
PASS
CC8.1Change record #CR-2841 approved, tested, deployed to production
14:00:47Z
PASS
CC9.2Vendor risk assessment — Cloudflare Inc — Risk Level: LOW
14:00:15Z
WARN
CC3.2Risk register review completed — 2 new risks added, 1 closed
13:59:40Z
PASS
CC6.5Offboarding workflow #OFF-182 — account deprovisioned within SLA
13:59:01Z
PASS
A1.2DR failover test executed — RTO: 42 min (target: <4h) — PASSED
13:58:30Z
8 of 320+ daily evidence items shownAll mapped to CC controls

CROSS-STANDARD ALIGNMENT

Control crosswalk. SOC 2 maps to ISO / NIST / PCI.

Already certified ISO 27001 or aligned to NIST CSF? Your existing controls partially satisfy SOC 2 requirements. Here is the exact overlap — and where gaps remain.

Control Family
SOC 2 (CC)
ISO 27001
NIST CSF
PCI DSS v4
Identity & Access
CC6.1–CC6.3
A.9.1–A.9.4
PR.AC-1,4
Req 7, 8
Encryption
CC6.7
A.10.1
PR.DS-1,2
Req 3, 4
Vulnerability Mgmt
CC7.1, CC9.1
A.12.6
DE.CM-8
Req 6, 11
Incident Response
CC7.3–CC7.5
A.16.1
RS.RP-1
Req 12.10
Change Management
CC8.1
A.14.2
PR.IP-3
Req 6.4
Vendor Risk
CC9.2
A.15.1
ID.SC-1
Req 12.8
Logging & Monitoring
CC4.1, CC7.2
A.12.4
DE.AE-1,3
Req 10
SOC 2 (CC)
ISO 27001
NIST CSF
PCI DSS v4

COMMON OBSTACLES → SOLUTIONS

Challenges solved before they happen.

Challenge

Manual evidence sprawl

Before

1,200+ hrs/audit cycle

After

240 hrs (↓80%)

How we achieve it

Automated evidence collection from 10+ integrations — daily aggregation pipeline eliminates manual compiling

Challenge

Control design gaps

Before

15+ issues found at audit

After

0–2 late discoveries

How we achieve it

Pre-audit gap assessment maps every CC control before the auditor engages — no surprises

Challenge

Long audit timelines

Before

16–24 months to Type II

After

9–14 months typical

How we achieve it

Fast-track readiness programme with accelerated implementation and 6-month observation window option

Challenge

Scope creep & cost

Before

$200K–$400K first audit

After

$90K–$180K (↓55%)

How we achieve it

Fixed-scope definition, pre-tested controls, and no last-minute design changes from auditor feedback

WHY SPAKTO

Not consultants. Compliance accelerators.

100%

Type I & II Coverage

Full attestation lifecycle from gap through Type II report

Frequently Asked

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question

Ready for SOC 2 attestation?

Start with a no-obligation readiness assessment. We will identify gaps, design controls, and build your path to Type I & II attestation.

AICPA TSCSecurity (CC)Availability (A)Processing Integrity (PI)Confidentiality (C)Privacy (P)