SOC 2 Trust Services Criteria: The Complete CC1-CC9 Reference Guide

Reviewed by Ali Aleali, CISSP, CCSP · Last reviewed March 18, 2026

If you are preparing for a SOC 2 audit and trying to understand what CC1.1, CC1.4, or CC6.2 actually mean, you are not alone. The AICPA's Trust Services Criteria document runs 39 pages of formal language rooted in the COSO internal control framework, and translating that into practical security controls takes experience that most teams do not have in-house.

This guide provides the official AICPA definitions for every Common Criteria series (CC1 through CC9), explains what each one means in practice, and covers how the five Trust Services Categories determine your audit scope. It is designed as a reference you can return to during audit prep, control mapping, and evidence collection.

How the Trust Services Criteria Are Organized

The SOC 2 Trust Services Criteria are built on two layers:

Common Criteria (CC1-CC9) apply to every SOC 2 engagement. They are derived from the 17 principles of the COSO Internal Control - Integrated Framework (2013), with supplemental criteria added by the AICPA for technology-specific areas like logical access, system operations, and change management. The nine CC series cover:

  • CC1: Control Environment
  • CC2: Communication and Information
  • CC3: Risk Assessment
  • CC4: Monitoring Activities
  • CC5: Control Activities
  • CC6: Logical and Physical Access Controls
  • CC7: System Operations
  • CC8: Change Management
  • CC9: Risk Mitigation

Category-Specific Criteria apply only when you include additional Trust Services Categories beyond Security. These are the A series (Availability), PI series (Processing Integrity), C series (Confidentiality), and P series (Privacy).

The Security category consists solely of the Common Criteria. For any other category you include, your audit covers both the Common Criteria and that category's specific criteria.

For a deeper dive into choosing which categories to include, see our SOC 2 scoping guide and our breakdown of the five Trust Services Categories.

SERIES CC1

Control Environment

COSO Principles 1-5 · The foundation: integrity, oversight, accountability, competence, and enforcement.

1.1

Commitment to Integrity and Ethical Values

The entity demonstrates a commitment to integrity and ethical values. This covers tone at the top, establishing standards of conduct, evaluating adherence, and addressing deviations. Your auditor is looking for a code of conduct or acceptable use policy, evidence that employees acknowledge it (typically during onboarding), and a mechanism for reporting violations. For companies with contractors and vendor staff, those individuals need to be covered by the same standards.

Typical Evidence

Code of conduct Employee acknowledgments Violation reporting Contractor standards
1.2

Board Independence and Oversight

The board demonstrates independence from management and exercises oversight of internal controls. This includes establishing oversight responsibilities, applying relevant expertise, and operating independently. For companies without a traditional board, this is where auditors look at advisory board meeting minutes, investor board updates, or documented oversight structures. The key is demonstrating that someone independent from day-to-day operations reviews security and compliance posture periodically.

Typical Evidence

Advisory board minutes Independent oversight Investor board updates
1.3

Management Structures and Reporting Lines

Management establishes structures, reporting lines, and appropriate authorities in the pursuit of objectives. This covers organizational design, delegation of authority, and segregation of duties. The AICPA supplemental criteria add that management must consider external parties and security-specific requirements when defining these structures.

Typical Evidence

Org chart Role definitions Authority levels Duty segregation
1.4

Commitment to Competence

The entity demonstrates a commitment to attract, develop, and retain competent individuals. This covers hiring practices, competency evaluation, training, and succession planning. Background checks, job descriptions with security responsibilities, security awareness training programs (with completion records), and evidence that technical competency is evaluated. The supplemental points of focus specifically call out considering the technical competency and background of contractors and vendor employees.

Typical Evidence

Background checks Security training Contractor competency Succession planning
1.5

Accountability for Internal Control

The entity holds individuals accountable for their internal control responsibilities. This covers performance measures, incentive structures, and corrective actions. Documented accountability mechanisms, such as security responsibilities in job descriptions, performance reviews that include security duties, and a process for addressing non-compliance.

Typical Evidence

Performance measures Security in job descriptions Corrective action process
SERIES CC2

Communication and Information

COSO Principles 13-15 · How the organization obtains, generates, and communicates information to support internal controls.

2.1

Information Quality

The entity obtains or generates relevant, quality information to support internal controls. In practice: evidence that you capture the data needed for security decisions (logs, vulnerability data, threat intelligence). This is where security logging and monitoring architecture becomes directly relevant to SOC 2 evidence.

Typical Evidence

Security logs Threat intelligence feeds Vulnerability data
2.2

Internal Communication

The entity communicates objectives and responsibilities for internal control to personnel. In practice: security awareness training, documented system boundaries, and a process for employees to report security incidents.

Typical Evidence

Security awareness training System boundary docs Incident reporting process
2.3

External Communication

The entity communicates with external parties regarding matters affecting internal controls. In practice: trust centers, external incident notification procedures, and communicating security objectives to vendors and partners.

Typical Evidence

Trust center Incident notification procedures Vendor communications
SERIES CC3

Risk Assessment

COSO Principles 6-9 · Where the organization identifies and analyzes risks.

3.1

Objective Clarity

The entity specifies objectives with sufficient clarity to enable risk identification. In practice: documented security objectives and risk appetite, with sub-objectives for each TSC category in scope.

Typical Evidence

Security objectives Risk appetite statement TSC sub-objectives
3.2

Risk Identification and Analysis

The entity identifies and analyzes risks to determine how they should be managed. The supplemental criteria require inventorying information assets, assessing threats and vulnerabilities (including from vendors), and determining risk treatment. This is not a one-time exercise.

Typical Evidence

Asset inventory Risk assessment Vendor risk analysis
3.3

Fraud Risk Assessment

The entity considers fraud potential, including insider threats, unauthorized data access, and manipulation of systems. The supplemental criteria add IT-specific fraud risks like privileged access abuse and unauthorized code changes.

Typical Evidence

Fraud risk scenarios Insider threat assessment Access abuse evaluation
3.4

Change Assessment

The entity assesses changes that could impact internal controls, including changes in technology, vendors, leadership, and regulatory environment.

Typical Evidence

Change impact assessments Vendor change reviews Technology change log
SERIES CC4

Monitoring Activities

COSO Principles 16-17 · How the organization evaluates whether controls are working.

4.1

Ongoing and Separate Evaluations

The entity performs continuous monitoring and periodic evaluations. The AICPA supplemental criteria explicitly list penetration testing, ISO certifications, and internal audits as examples.

Typical Evidence

Penetration test reports Internal audits GRC platform checks
4.2

Deficiency Communication

The entity communicates control deficiencies to responsible parties and tracks corrective action. This connects directly to your ticketing, SLA, and incident response processes.

Typical Evidence

Deficiency tickets Remediation tracking Corrective action records
SERIES CC5

Control Activities

COSO Principles 10-12 · Where the organization selects and deploys controls.

5.1

Control Selection and Development

The entity selects controls that mitigate risks identified in CC3. The AICPA expects a mix of manual and automated controls, preventive and detective, with explicit attention to segregation of duties. Controls should be risk-based, not framework-mandated.

Typical Evidence

Risk-to-control mapping Control mix documentation Segregation of duties matrix
5.2

Technology General Controls

The entity develops controls over technology infrastructure, security management, and technology acquisition and maintenance.

Typical Evidence

Infrastructure hardening docs Technology access controls Acquisition procedures
5.3

Policy Deployment

The entity deploys controls through policies and procedures. Auditors look for policy documents, acknowledgments, and evidence of policy-driven activity (access reviews on schedule, incidents responded to per procedure, changes following the documented process).

Typical Evidence

Policy documents Policy acknowledgments Procedure execution evidence
SERIES CC6

Logical and Physical Access Controls

AICPA Supplemental · Often the most evidence-intensive area of a SOC 2 audit.

6.1

Security Software, Infrastructure, and Architectures

The entity implements logical access security software, infrastructure, and architectures to protect information assets. Points of focus include asset inventory, restricting logical access, authentication, network segmentation, encryption, and key management. SSO/IdP configuration, MFA enforcement, network segmentation, encryption at rest and in transit, firewall rules, and an inventory of information assets. This is the broadest CC6 criterion and typically maps to the largest number of controls.

Typical Evidence

SSO/IdP configuration MFA enforcement Network segmentation Encryption Asset inventory
6.2

User Registration and Authorization

The entity registers and authorizes new users before issuing system credentials, and removes access when no longer authorized. Points of focus include credential management, access removal, and periodic access reviews. Onboarding and offboarding procedures with evidence (tickets, automated provisioning logs), and periodic access reviews. SOC 2 CC6.2 expects access reviews to happen on a defined cadence, not just when someone remembers. This is one of the criteria where teams consistently struggle because the process exists but the evidence trail does not.

Typical Evidence

Onboarding procedures Offboarding procedures Periodic access reviews Provisioning logs
6.3

Role-Based Access and Least Privilege

The entity authorizes, modifies, or removes access based on roles, responsibilities, and the concepts of least privilege and segregation of duties. RBAC implementation, documented role definitions, periodic reviews of access roles and rules, and evidence that access changes follow an authorization process. When someone changes teams or responsibilities, their access should be reviewed and adjusted.

Typical Evidence

RBAC implementation Role definitions Access change authorization
6.4

Physical Access Restrictions

The entity restricts physical access to facilities, data center facilities, backup media storage, and other sensitive locations. For cloud-native companies, this often maps to cloud provider SOC 2 reports (CSOCs) covering data center physical security. For companies with on-premises infrastructure, this requires visitor logs, badge access systems, security cameras, and documented access authorization processes.

Typical Evidence

Cloud provider SOC 2 (CSOCs) Visitor logs Badge access Security cameras
6.5

Asset Disposal

The entity discontinues logical and physical protections over assets only after the ability to read or recover data has been diminished and is no longer required. Data sanitization procedures for decommissioned hardware and storage media. Documented processes for identifying assets for disposal and rendering data unreadable before release.

Typical Evidence

Data sanitization records Asset disposal procedures
6.6

Boundary Protection

The entity implements logical access security measures to protect against threats from sources outside its system boundaries. Points of focus include restricting access channels, protecting credentials in transit, MFA for external access, and boundary protection systems (firewalls, IDS). Firewall configurations, intrusion detection/prevention systems, VPN or zero-trust access for remote connections, and MFA for external-facing systems. This is the perimeter defense criterion.

Typical Evidence

Firewall configurations IDS/IPS VPN/zero-trust access MFA for external access
6.7

Data Transmission Controls

The entity restricts the transmission, movement, and removal of information. Points of focus include DLP, encryption in transit, removable media controls, and mobile device management. TLS/encryption for data in transit, DLP policies (if applicable), controls over USB devices and removable media, and MDM for company devices. The scope of this criterion depends heavily on your data flows and what your customers have committed to in their agreements.

Typical Evidence

TLS/encryption in transit DLP policies Removable media controls MDM
6.8

Malware Prevention

The entity implements controls to prevent, detect, and act upon unauthorized or malicious software. Points of focus include restricting software installation, change detection, antivirus/anti-malware, and scanning external assets. Endpoint protection (EDR/antivirus), application whitelisting or installation restrictions, software change detection, and procedures for scanning assets received from external sources.

Typical Evidence

EDR/antivirus Software installation restrictions Change detection
SERIES CC7

System Operations

AICPA Supplemental · Vulnerability management, security monitoring, incident detection, incident response, and recovery.

7.1

Vulnerability and Configuration Management

The entity uses detection and monitoring procedures to identify configuration changes that introduce vulnerabilities and susceptibilities to newly discovered vulnerabilities. Points of focus include configuration standards, infrastructure monitoring, change detection, vulnerability scanning, and detection of unauthorized components. Regular vulnerability scans, defined configuration baselines, file integrity monitoring, and a process for detecting unauthorized changes. This is where your vulnerability management program lives within the SOC 2 framework.

Typical Evidence

Vulnerability scan reports Configuration baselines File integrity monitoring
7.2

Security Event Monitoring

The entity monitors system components for anomalies indicative of malicious acts, natural disasters, and errors. Points of focus include detection policies and tools, anomaly analysis filters, and monitoring detection tool effectiveness. SIEM or log aggregation, alerting rules, and a process for analyzing anomalies to determine whether they represent security events. The AICPA expects detection measures designed to identify compromise attempts, unauthorized access, credential misuse, and unauthorized hardware or software.

Typical Evidence

SIEM/log aggregation Alerting rules Anomaly analysis
7.3

Security Event Evaluation

The entity evaluates security events to determine whether they could or have resulted in a failure to meet objectives (security incidents). A triage process for evaluating detected events: classifying severity, determining impact, and deciding response actions. For Privacy-scoped audits, this includes assessing the impact on personal information and determining whether personal data was disclosed.

Typical Evidence

Event triage process Severity classification Impact assessment
7.4

Incident Response

The entity responds to identified security incidents by executing a defined incident-response program. Points of focus include assigned roles, containment, threat elimination, restoration, communication protocols, vulnerability remediation, and evaluating response effectiveness. A documented incident response plan with defined roles, containment procedures, communication templates, and post-incident review processes. Auditors want evidence that the plan has been tested (tabletop exercises count) and that real incidents were handled according to the plan.

Typical Evidence

Incident response plan Tabletop exercise results Post-incident reviews
7.5

Incident Recovery

The entity identifies, develops, and implements activities to recover from security incidents. Points of focus include environment restoration, root cause analysis, implementing preventive changes, improving response procedures, and recovery plan testing. Business continuity and disaster recovery procedures, tested periodically. Root cause analysis for incidents with documented corrective actions. The AICPA specifically expects testing scenarios that consider key personnel unavailability and multiple system component failures.

Typical Evidence

DR/BCP procedures DR test results Root cause analyses
SERIES CC8

Change Management

Single criterion · Often the most evidence-intensive area for technology companies.

8.1

Change Management Process

The entity authorizes, designs, develops, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures. This is often the most evidence-intensive criterion for technology companies. For most software teams, it maps directly to the CI/CD pipeline, code review process, and deployment procedures. The AICPA also expects baseline configuration management and a defined process for emergency changes.

Typical Evidence

Pull request workflows Deployment logs Approval records Test results Emergency change process Baseline configurations
SERIES CC9

Risk Mitigation

Single criterion · Business disruption planning, vendor risk, and insurance.

9.1

Business Disruption Risk Mitigation

The entity identifies and develops risk mitigation activities for potential business disruptions. This covers BCP/DR planning, vendor risk management, and insurance (cyber liability, E&O). The AICPA expects documented procedures for responding to and recovering from security events that disrupt operations.

Typical Evidence

BCP/DR plans DR test results Cyber insurance policy Vendor risk assessments

The Five Trust Services Categories

Every SOC 2 report includes Security (the Common Criteria). The other four categories are included based on your commitments to customers:

Category Criteria Series When to Include
Security CC1-CC9 (Common Criteria) Always included
Availability A series Contractual SLAs or public uptime commitments
Processing Integrity PI series Your product processes data customers rely on for business decisions
Confidentiality C series Commitments around data classification, retention, or proprietary data handling
Privacy P series Your organization directly collects personal information from data subjects

For companies pursuing their first SOC 2, Security-only is often the right starting scope. For detailed scoping guidance, see our SOC 2 scoping guide and Trust Services Categories breakdown.

What Auditors Actually Look For

Understanding the criteria definitions is necessary, but it is not sufficient. The gap between knowing what CC6.2 says and producing evidence that satisfies your auditor is where preparation either works or unravels.

Across engagements, the areas where evidence gaps surface repeatedly are:

CC1 and CC5 (policies and procedures)

Policies exist, but they are generic templates that do not reflect how the organization actually operates. A policy that does not match reality is just paperwork. Auditors compare policy language against observed controls and will flag disconnects.

CC6.2 and CC6.3 (access management)

Access reviews are the single most common evidence gap. The review happens informally, but there is no dated artifact, no record of who approved continued access, and no documentation of what changed as a result. Wire evidence capture into your existing access review process on a defined cadence.

CC7 (incident response and monitoring)

The incident response plan exists but has never been tested. Or it was tested, but the tabletop exercise results were not documented. Monitoring architecture is in place, but alerting rules have never been tuned, so the team is either drowning in noise or missing real signals.

CC8.1 (change management)

The CI/CD pipeline is sophisticated, but there is no documented approval process for changes, or emergency changes bypass all controls with no after-the-fact review. Auditors expect evidence that changes are authorized before deployment and that emergency changes are reviewed retroactively.

The pattern across all of these: teams are often doing real security work but cannot prove it. The evidence trail was never designed. Building that evidence architecture, wiring capture into existing workflows rather than creating parallel compliance processes, is what separates programs that stay continuously audit-ready from those that scramble before every cycle.

Implementation Resources

For a full implementation timeline and roadmap, see our automated roadmap to SOC 2 compliance. For automation strategies, see our SOC 2 compliance automation guide.

Build an Effective Security Program That Makes SOC 2 a Byproduct

Find out where your controls stand today.

Frequently Asked Questions

What are SOC 2 CC1.1, CC1.2, and CC1.4?

CC1.1, CC1.2, and CC1.4 are criteria within the Control Environment series of the SOC 2 Trust Services Criteria. CC1.1 addresses organizational commitment to integrity and ethical values, including codes of conduct and standards for employees and contractors. CC1.2 covers board independence and oversight of internal controls. CC1.4 addresses the organization's commitment to attracting, developing, and retaining competent individuals, including hiring practices, background checks, security training programs, and succession planning.

What are the SOC 2 Trust Services Criteria?

The SOC 2 Trust Services Criteria are control criteria established by the AICPA for evaluating the design and operating effectiveness of controls at service organizations. They consist of nine Common Criteria series (CC1 through CC9) that apply to every SOC 2 audit, plus additional criteria specific to each of the five Trust Services Categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy. The Common Criteria are aligned with the 17 principles of the COSO Internal Control framework, with supplemental criteria for technology-specific areas.

What is the difference between Common Criteria and Trust Services Categories?

Common Criteria (CC1-CC9) are the baseline criteria that apply to every SOC 2 engagement. They cover control environment, communication, risk assessment, monitoring, control activities, access controls, operations, change management, and risk mitigation. Trust Services Categories (Security, Availability, Processing Integrity, Confidentiality, Privacy) determine the scope of your audit. Security consists solely of the Common Criteria. Each additional category adds its own category-specific criteria on top of the Common Criteria.

What does CC6.2 require for access reviews?

CC6.2 requires that the entity registers and authorizes new users before issuing system credentials, and removes access when users are no longer authorized. The AICPA points of focus include controlling access credentials based on authorization, removing access when appropriate, and reviewing the appropriateness of access credentials on a periodic basis. In practice, this means documented onboarding and offboarding procedures, timely access revocation, and periodic access reviews with dated evidence showing who was reviewed, who approved continued access, and what changes were made.

How many criteria are in each CC series?

CC1 has 5 criteria (CC1.1-CC1.5), CC2 has 3 criteria (CC2.1-CC2.3), CC3 has 4 criteria (CC3.1-CC3.4), CC4 has 2 criteria (CC4.1-CC4.2), CC5 has 3 criteria (CC5.1-CC5.3), CC6 has 8 criteria (CC6.1-CC6.8), CC7 has 5 criteria (CC7.1-CC7.5), CC8 has 1 criterion (CC8.1), and CC9 has 1 criterion (CC9.1). This totals 32 Common Criteria across the nine series. Additional category-specific criteria apply when Availability, Processing Integrity, Confidentiality, or Privacy are included in scope.

What is CC1.4 commitment to competence?

CC1.4 maps to COSO Principle 4: the entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives. In a SOC 2 context, this means establishing policies and practices around competency expectations, evaluating competence across the organization and outsourced service providers, providing security training programs, considering the background and technical competency of personnel and contractors, and planning for succession of key roles. Auditors look for evidence of background checks, training completion records, job descriptions with security responsibilities, and competency evaluation processes.

Ready to Start Your Compliance Journey?

Get a clear, actionable roadmap with our readiness assessment.

Share this article:

About the Author
Ali Aleali
Ali Aleali, CISSP, CCSP

Co-Founder & Principal Consultant, Truvo Cyber

Former security architect for Bank of Canada and Payments Canada. 20+ years building compliance programs for critical infrastructure.