Select Page

Download The “SOC 2 Controls List” XLS

Download the full list of SOC 2 internal control requirements. Controls list includes the latest AICPA 2017 Trust Services Criteria (TSC) and connected COSO standards.

View the list of control requirements when preparing for SOC 2 Type I and SOC 2 Type II audits.

Download The “SOC 2 Controls List” XLS

 


    soc 2 controls xls

    SOC 2 Controls List

    Organizations working to obtain a SOC 2 Type I or SOC 2 Type II report must implement all necessary internal controls and go through an independent SOC 2 audit with an AICPA approved audit firm to receive a report.

    To prepare for a SOC 2 audit, teams can download our latest SOC 2 controls list. Dash has created an Excel document listing all SOC 2 controls, including all necessary trust services criteria and integrated COSO framework controls. Teams may consider using this document as a starting point for determining security program gaps and working towards SOC 2 readiness.

    Learn About SOC 2 Internal Control Requirements

    TSC are comprised of nine sub-categories of controls:

    Control environment (CC1)

    Communication and information (CC2)

    Risk assessment (CC3)

    Monitoring of controls (CC4)

    Control activities related to the design and implementation of controls (CC5)

    Logical and physical access controls (CC6)

    System operations (CC7)

    Change management (CC8)

    Risk mitigation (CC9)

    Trust Service Criteria (TSC) Requirements

    For SOC 2 audits, service organizations are evaluated against one or more trust services criteria (TSC) previously known as trust services principles (TSP). The five criteria are Security, Availability, Processing Integrity, Confidentiality, and Privacy.

    Teams must show evidence and control effectiveness for all internal controls for all evaluated criteria. Included in this controls list is TSC related control requirements for all nine categories. Teams can use this SOC 2 control list to plan, implement, and maintain SOC 2 service criteria and better prepare for a SOC 2 audit.

    Trust Service Criteria (TSC) Requirements

    For SOC 2 audits, service organizations are evaluated against one or more trust services criteria (TSC) previously known as trust services principles (TSP). The five criteria are Security, Availability, Processing Integrity, Confidentiality, and Privacy.

    Teams must show evidence and control effectiveness for all internal controls for all evaluated criteria. Included in this controls list is TSC related control requirements for all nine categories. Teams can use this SOC 2 control list to plan, implement, and maintain SOC 2 service criteria and better prepare for a SOC 2 audit.

    TSC are comprised of nine sub-categories of controls:

    Control environment (CC1)

    Communication and information (CC2)

    Risk assessment (CC3)

    Monitoring of controls (CC4)

    Control activities related to the design and implementation of controls (CC5)

    Logical and physical access controls (CC6)

    System operations (CC7)

    Change management (CC8)

    Risk mitigation (CC9)

    Be Ready For A SOC 2 Audit

    Learn about all SOC 2 security controls and audit requirements

    hello@dashsdk.com
    267-567-3552
    hello@dashsdk.com267-567-3552