FeatureSignals

SOC 2 Controls Matrix

Last updated: April 2026

This matrix maps SOC 2 Trust Service Criteria — security, availability, and confidentiality — to the specific features, processes, and technical controls implemented in FeatureSignals. A formal SOC 2 Type II audit is on our roadmap.

Status: Controls Implemented — Audit Planned

All controls listed below are implemented and operational. The formal SOC 2 Type II audit engagement is on the product roadmap. This matrix serves as readiness documentation for the audit process.

Common Criteria — Security (CC1–CC9)

CC6 — Logical and Physical Access Controls

CriteriaControl ObjectiveFeatureSignals Implementation
CC6.1Logical access securityJWT authentication (1h TTL), API key auth (SHA-256 hashed), TLS 1.3
CC6.2User access provisioningRBAC with four roles (owner/admin/developer/viewer), SSO/SCIM provisioning
CC6.3Access removalImmediate member removal, API key revocation, session invalidation
CC6.4Physical accessCloud provider physical security (Hetzner ISO 27001 data centers)
CC6.5Authentication mechanismsMFA (TOTP), SSO (SAML/OIDC), bcrypt password hashing (cost 12)
CC6.6External access pointsIP allowlisting (Enterprise), rate limiting, WAF rules
CC6.7Information transmissionTLS 1.3 in transit, AES-256 at rest, HSTS enforcement
CC6.8Malicious softwareContainerized deployment, read-only filesystem, vulnerability scanning

CC7 — System Operations

CriteriaControl ObjectiveFeatureSignals Implementation
CC7.1Detection & monitoringStructured JSON logging (slog), SigNoz observability, health checks, metrics
CC7.2Security monitoringAudit log with actor/IP/timestamp, SHA-256 integrity chain hashing
CC7.3Security incident evaluationIncident response plan, on-call rotation, 15-min P0 acknowledgment
CC7.4Incident responseDefined severity levels (P0–P4), runbooks, post-mortem process
CC7.5Recovery plansAutomated backups, disaster recovery runbook, RPO <24h, RTO <30min

Availability Criteria (A1)

CriteriaControl ObjectiveFeatureSignals Implementation
A1.1Capacity managementConnection pool tuning (20–50 conns), horizontal scaling, load testing
A1.2Environmental protectionsHetzner data center redundancy, UPS, generator backup, fire suppression
A1.3Recovery testingQuarterly DR testing, backup verification, restore procedure validation

Confidentiality Criteria (C1)

CriteriaControl ObjectiveFeatureSignals Implementation
C1.1Confidential information identificationData classification: PII, PHI, secrets, credentials — all encrypted at rest
C1.2Confidential information disposalGDPR-compliant erasure, 30-day grace period, permanent purge on day 31

CC8 — Change Management

CriteriaControl ObjectiveFeatureSignals Implementation
CC8.1Change management processGit-based workflow, mandatory PR reviews, branch protection rules, CI/CD pipeline
CC8.2Authorized changesCode owners, required approvers, signed commits, immutable release tags
CC8.3Change testing80%+ test coverage, table-driven tests, staging environment, canary deployments

CC3 — Risk Assessment

CriteriaControl ObjectiveFeatureSignals Implementation
CC3.1Risk identificationThreat modeling, dependency scanning (govulncheck, npm audit), security review process
CC3.2Risk mitigationDefense-in-depth architecture, least privilege, deny-by-default security posture
CC3.3Vendor risk managementSub-processor assessment, vendor security review, data processing agreements

CC4 — Monitoring Activities

CriteriaControl ObjectiveFeatureSignals Implementation
CC4.1Ongoing monitoringSigNoz dashboards, Prometheus metrics, alerting on anomaly detection
CC4.2Control evaluationAutomated control testing, quarterly access review, configuration drift detection

Next Steps