FeatureSignals

SOC 2 Controls Matrix

Last updated: April 2026

This document maps SOC 2 Trust Service Criteria to technical controls. A formal SOC 2 Type II audit is on our roadmap.

CC6 — Logical and Physical Access

CriteriaControlImplementation
CC6.1Logical accessJWT authentication, API key authentication
CC6.2Access provisioningRBAC (owner/admin/developer/viewer), SSO/SCIM
CC6.3Access removalTeam member removal, API key revocation
CC6.5AuthenticationMFA (TOTP), SSO (SAML/OIDC), password policies
CC6.6Access controlsIP allowlisting, rate limiting
CC6.7Information protectionTLS 1.3, AES-256 at rest, bcrypt passwords

CC7 — System Operations

CriteriaControlImplementation
CC7.1MonitoringStructured logging, metrics, health checks
CC7.3Security eventsAudit log with IP/user agent, integrity hashing
CC7.4Incident responseIncident response plan, on-call procedures
CC7.5RecoveryBackup procedures, disaster recovery runbook

CC8 — Change Management

CriteriaControlImplementation
CC8.1Change managementGit-based workflow, PR reviews, CI/CD
CC8.2Change testingAutomated test suite (80%+ coverage), staging environment

Next Steps