SOC 2 · Trust Services Criteria · AICPA
SOC 2 Type II on AWS — From Procurement Block to Signed Audit
Enterprise procurement asks for SOC 2 Type II in two minutes and waits six months for it. We build the AWS-native control set, evidence pipeline, and CPA-firm-ready package so the audit window is the only thing on the critical path.
Scope: Any service organization that processes customer data — typical for B2B SaaS, fintech, healthtech, and enterprise platforms.
Part of the AWS Security & Compliance hub .
Who needs this
Teams that typically engage on SOC 2 Type II on AWS
Series B+ startups expanding into Fortune 500 deals
Platform companies that have a SOC 2 Type I and now need Type II for renewal
Multi-product companies adding new SaaS lines under an existing SOC 2 report
Shared Responsibility
AWS Shared Responsibility for SOC 2 Type II on AWS
What AWS does, what you do, and where the line moves under this specific framework.
AWS owns
- AWS publishes its own SOC 1, SOC 2, and SOC 3 reports through AWS Artifact — covering AWS infrastructure controls
- AWS-side controls (physical security, hypervisor, host OS, managed-service operations) inherit into your SOC 2 via the Carve-Out Method (most common) or Inclusive Method
- AWS attests annually under AICPA Trust Services Criteria — your auditor accepts the AWS SOC 2 report as evidence for inherited controls
Joint
- Change management — AWS provides CloudFormation/CodePipeline; you define the SDLC
- Vendor management — AWS provides Artifact; you maintain the third-party register
- Backup and recovery — AWS provides Backup; you define RPO/RTO and test
You own
- CC1 Control environment — board oversight, code of conduct, organizational structure
- CC2 Communication and information — internal communication, customer notifications
- CC3 Risk assessment — annual risk register, threat modelling, fraud risk
- CC4 Monitoring activities — Security Hub findings review, internal audit, deficiency tracking
- CC5 Control activities — IAM policies, code review, segregation of duties
- CC6 Logical and physical access controls — IAM Identity Center, MFA, least privilege
- CC7 System operations — vulnerability management (Inspector v2), incident response, change management
- CC8 Change management — CodePipeline approval gates, IaC peer review, deployment audit trail
- CC9 Risk mitigation — vendor risk, business continuity, insurance
Control-by-control AWS implementation
Each control mapped to the AWS service that satisfies it
Excerpts from the full control matrix we deliver in the engagement. Not exhaustive — your audit scope drives the final mapping.
CC6 — Logical and Physical Access Controls
CC6 is the largest single category in SOC 2 audits and where most SaaS companies fail their first attempt. AWS-native services map cleanly when configured.
Logical access security software, infrastructure, and architectures
Federated workforce SSO via Okta/Entra ID; SCPs as preventive guardrails; Access Analyzer findings auto-remediated.
Authorize, modify, or remove access
SCIM provisioning from IdP — leavers removed within 24 hours of HR offboarding event; CloudTrail proves the timeline.
Logical access security measures
MFA required on every console session; phishing-resistant FIDO2 keys recommended for break-glass accounts.
Restrict the transmission of information
No regulated data over public internet between AWS services; egress filtering via Network Firewall.
Prevention of unauthorized or malicious software
Agentless malware scanning on EBS; container image and Lambda code scanning; signed deployments.
CC7 — System Operations
CC7 covers detection, monitoring, and incident response — AWS-native is strong here.
Detect and monitor system components
Security Hub aggregates findings; Config conformance pack tracks SOC 2-relevant rules; alerting via EventBridge.
Monitor for and detect anomalies
Behavioral threat detection across the AWS estate; anomalies fed into incident response runbook.
Evaluate security events and respond
Pre-built runbooks for credential exfiltration, S3 public exposure, IAM privilege escalation; documented in evidence package.
Respond to identified security incidents
Detective for forensic graph; CloudTrail Lake for SQL queries over historical events; Security Lake for OCSF normalization.
Recover from identified security incidents
Quarterly DR testing documented; backup vault locks prevent ransomware encryption of backups.
Evidence pipeline
How SOC 2 Type II on AWS evidence flows continuously
Audit Manager closed to new customers on 30 April 2026. Our pipeline is what we now ship.
AWS Config conformance pack — SOC 2
AWS-published Operational Best Practices for AICPA SOC 2 conformance pack. Deploy Org-wide via StackSets.
Security Hub Essentials
AWS Foundational Security Best Practices standard — most SOC 2 CC controls have a 1:1 finding mapping.
CloudTrail Lake
Auditable event store with SQL queries — observation-period evidence for the Type II audit window.
GRC tool integration
Vanta, Drata, or Secureframe wired to AWS read-only — control evidence dashboard your CPA firm logs into directly.
Engagement timeline
What you get, week by week
Date-bound engagement, not an open-ended retainer. Deliverables are itemised in the SOW.
- TSC scope decision — Security only, or Security + Availability + Confidentiality (most common SaaS scope)
- Control gap matrix mapped to CC1–CC9
- Inherited-control mapping to AWS SOC 2 (Carve-Out Method)
- AWS-native control deployment (Security Hub, Config, GuardDuty, IAM Identity Center)
- Policy library — Information Security, Access Control, Change Management, Incident Response, Business Continuity, Vendor Management
- GRC tool wired to AWS — Vanta/Drata/Secureframe collecting evidence
- Continuous control operation — typically 6 months for first Type II, 12 months for renewals
- Quarterly internal audit and findings register
- Evidence sampling for the CPA firm — pulled directly from GRC tool
- CPA firm fieldwork — typically 4–6 weeks
- Management response to any deficiencies
- Final SOC 2 Type II report — distributable under NDA to your enterprise prospects
Related guides
Deep-dive guides on SOC 2 Type II on AWS
From inside paid engagements — same patterns, more depth.
How to Achieve SOC 2 Type II Compliance on AWS (2026 Checklist)
SOC 2 Type II certification proves your controls are effective over 6-12 months. This guide covers the compliance roadmap, AWS security controls, documentation requirements, and audit preparation for 2026 certification.
AWS IAM Best Practices: Least Privilege Access Control
Least privilege is a slogan. Working IAM at production scale is a different problem. Roles vs users, permission boundaries, SCPs, identity federation, and the access-control patterns that keep teams fast without leaving keys lying around.
How to Set Up AWS Security Hub for Compliance Monitoring
AWS Security Hub aggregates security findings from 200+ sources (GuardDuty, Config, IAM Access Analyzer, Inspector). This guide covers setup, compliance standards (PCI-DSS, CIS, NIST), automated remediation, and building a compliance dashboard without hiring a SOC team.
Related frameworks
Frameworks that overlap with this one
Multi-framework scope is the norm. Most teams certify on two or three at once.
HIPAA on AWS
PHI architecture, BAA boundaries, HIPAA-eligible services, §164.312 technical safeguards, and audit-ready evidence — for healthcare platforms, telehealth, and digital-health startups.
ISO 27001:2022 on AWS
Annex A.5–A.8 implementation, ISMS scoping, climate-change context (Amendment 1:2024), notified-body audit prep — for SaaS expanding to EU/APAC and regulated B2B vendors.
FAQ
Frequently asked questions about SOC 2 Type II on AWS
The questions buyers ask before signing — assessor type, timeline, cost, and AWS-specific scope.
Type I vs Type II — which do we need?
How long does the first SOC 2 Type II actually take?
Which Trust Services Criteria do we include?
How much does the SOC 2 Type II cost on AWS?
Can we use Vanta/Drata/Secureframe instead of a consultant?
Does AWS SOC 2 mean we are SOC 2-compliant?
Book a Free SOC 2 Readiness Assessment
2-week read-only assessment mapped to the AICPA Trust Services Criteria. We tell you the realistic Type II timeline, scope decision, and CPA-firm options for your stage.
