Skip to content

SOC 2 Trust Services Criteria

SOC 2 is a compliance framework for service organizations (SaaS, cloud, managed services). It establishes Trust Services Criteria (TSC) — five trust principles covering security, availability, processing integrity, confidentiality, and privacy. TruthVouch automates SOC 2 compliance by mapping AI controls to TSC requirements and collecting auditor-ready evidence.

What Is SOC 2?

SOC 2 is a framework developed by the AICPA (American Institute of Certified Public Accountants) for service organizations to demonstrate controls over user data and systems.

The Five Trust Principles

PrincipleFocusApplies to AI
Security (CC)Protect system assets from unauthorized accessYes — all systems
Availability (A)System availability and performanceYes — AI service uptime
Processing Integrity (PI)Data processing is accurate and completeYes — model outputs, decisions
Confidentiality (C)Sensitive data protected from unauthorized disclosureYes — training data, customer data
Privacy (P)Personal data handled per stated policiesYes — data processing in AI systems

Type I vs. Type II

  • Type I — Auditor reviews controls at a point in time (single day)
  • Type II — Auditor reviews controls over 6-12 months, observing sustained compliance

For AI: Type II is standard. Auditors need to see ongoing monitoring, incident response, and control effectiveness over time.

SOC 2 Trust Criteria for AI Systems

Compliance AI maps AI-specific controls to SOC 2 TSC:

Security (CC) Controls

CriterionWhat It MeansAI Application
CC1Entity obtains/generates info on effectiveness of controlsPerformance monitoring of AI systems
CC2Entity defines objectives and responsibilities for internal controlAI governance policy, roles
CC3Entity specifies objectives with sufficient clarityAI system requirements documented
CC4Entity identifies and analyzes risks to objectivesAI risk assessment
CC5Entity selects and develops control activitiesModel testing, monitoring, human review
CC6Entity defines and implements control activitiesImplementing safeguards
CC7Entity defines and implements IT general controlsInfrastructure security, access control
CC8Entity authorizes, designs, develops, configures, documents, tests, and maintains IT systemsChange management for model updates
CC9Entity identifies, captures, and communicates relevant informationIncident reporting, audit logs

Availability (A) Controls

CriterionWhat It MeansAI Application
A1Entity obtains or generates, uses, and communicates relevant dataAI performance metrics, SLA tracking
A2Entity monitors system components for anomaliesModel drift detection, performance monitoring

Processing Integrity (PI) Controls

CriterionWhat It MeansAI Application
PI1Entity obtains/generates, uses, and communicates relevant quality informationModel quality metrics, testing results
PI2Entity monitors system performanceContinuous performance monitoring

Confidentiality (C) Controls

CriterionWhat It MeansAI Application
C1Entity obtains/generates, uses, communicates relevant informationTraining data classification
C2Entity disposes of information to prevent unauthorized accessData deletion procedures

Privacy (P) Controls

CriterionWhat It MeansAI Application
P1Entity provides or makes available privacy noticePolicy on how AI systems use personal data
P2Entity obtains implicit or explicit consentUser consent for AI processing
P3Entity identifies and manages consentTracking consent withdrawals
P4Entity grants identified and authenticated users ability to access, retrieve, and transmit their stored personal informationData subject access requests
P5Entity retains, disposes of, and securely destroys personal informationData retention policies

SOC 2 Audit Process for AI

Pre-Audit (1-2 months before)

  1. Assessment — Compliance AI runs SOC 2 readiness scan

    • Identifies which TSC you are/aren’t meeting
    • Flags gaps in documentation or monitoring
    • Prioritizes remediation
  2. Documentation — Compile evidence:

    • Policies (security, data handling, change management)
    • Procedures (access requests, incident response, training)
    • System descriptions (AI systems, architecture, data flows)
    • Risk assessment results
    • Test/monitoring logs (last 6+ months)
  3. Evidence Collection — Use Compliance AI connectors:

    • Infrastructure logs (AWS, Azure, GCP, Kubernetes)
    • Access logs (GitHub, Okta, Active Directory)
    • Monitoring dashboards (Datadog, CloudWatch, Prometheus)
    • Incident logs (Slack, ServiceNow, incident tracking)
    • Training records (completion attestations)
  4. Management Review — Document evidence organization:

    • Assigned responsible teams for each control
    • Sign-off that controls are in place
    • Commitment to maintaining controls during audit period

Audit (1-2 weeks on-site)

  1. Planning meeting — Auditor understands scope and AI systems
  2. Document review — Auditor reviews all policies, procedures, risk assessments
  3. Tests of design — Does the control structure make sense?
  4. Tests of operating effectiveness — Are controls actually working?
    • Sample test: Auditor picks a log entry from production AI system
    • Traces it through system (access control, data encryption, audit trail)
    • Validates no unauthorized access occurred
  5. Incident response — If incidents occurred, auditor reviews response
  6. Management interviews — Auditor talks to relevant staff
  7. Report generation — Auditor issues opinion

Post-Audit

  • Type II: Certificate valid for 1 year; plan next audit
  • Remediation: If auditor finds control gaps, implement fixes and provide evidence of remediation

AI-Specific SOC 2 Focus Areas

Auditors increasingly focus on these AI-specific areas:

1. Model Training Data & Quality

What auditor checks:

  • Where does training data come from?
  • Is training data biased or poor quality?
  • How is data quality validated?
  • Is biased data detected and remediated?

Evidence:

  • Data sourcing documentation
  • Bias testing results
  • Quality metrics (completeness, accuracy)
  • Retraining frequency

TruthVouch support: Automated bias testing reports, data quality dashboards

2. Model Performance Monitoring

What auditor checks:

  • Is model performance tracked post-deployment?
  • What triggers retraining or model rollback?
  • Do alerts fire when performance degrades?
  • Is degradation investigated and documented?

Evidence:

  • Performance dashboards (accuracy, latency, recall)
  • Monitoring configuration
  • Alert logs
  • Incident response records

TruthVouch support: Auto-connects to monitoring tools (Datadog, Prometheus, CloudWatch)

3. Audit Trail & Logging

What auditor checks:

  • Are all system accesses logged?
  • Can you trace a model decision back to inputs?
  • Is the audit log immutable (hash-chained)?
  • Is the log retained per policy?

Evidence:

  • Sample audit trail export
  • Hash verification (showing tamper-proof)
  • Log retention policy
  • Log deletion procedures

TruthVouch support: Hash-chained audit trails, WORM (Write-Once-Read-Many) export

4. Change Management

What auditor checks:

  • How are model updates tested?
  • Is there a rollback procedure?
  • Are model changes tracked?
  • Do only authorized people approve changes?

Evidence:

  • Change log (who changed what, when)
  • Test results for each change
  • Approval records
  • Rollback procedures documented

TruthVouch support: Change management workflow, approval tracking

5. Access Control

What auditor checks:

  • Who can access model code, training data, production outputs?
  • Are access levels reviewed annually?
  • Is access revoked when staff leave?
  • Are multi-factor authentication and strong passwords enforced?

Evidence:

  • Access control policy
  • Current access list (who has what permissions)
  • Annual review attestation
  • Access removal records
  • MFA configuration

TruthVouch support: Integration with IAM systems (Okta, Azure AD)

Typical SOC 2 Timeline

PhaseDurationEffort
Assessment & Remediation2-3 months100-200 hours
Evidence Collection & Documentation2 months50-100 hours
Pre-Audit2 weeks20-40 hours
Audit (Type II)6-12 months + 1-2 weeks on-site40-60 hours (interviews)
Post-Audit Remediation2-4 weeks20-40 hours
Total6-15 months250-450 hours

Comparing SOC 2 to ISO 27001

AspectSOC 2ISO 27001
ScopeService organizations (SaaS)Any organization
Structure5 trust principles14 control groups (92 controls)
CertificationOpinion audit (no “cert” badge)Certification available
FocusService user protectionInformation security
AdoptionStandard for SaaS; US-centricGlobal; often used with SOC 2

Best practice: Many organizations do ISO 27001 first (more comprehensive), then SOC 2 audit (validates ISO 27001 effectiveness).

Next Steps