Skip to main content

SOC 2 Readiness Control

Access Control

Who can access production systems and customer data, and how you enforce authentication and approvals.

Why auditors care

SSO, MFA, and role-based access

Demonstrate clear ownership, evidence, and cadence to show this control operates consistently.

What to implement

  • Assign an owner and set a review cadence.
  • Document the policy, procedure, and escalation path.
  • Track exceptions with remediation dates.

Evidence auditors expect

  • Dated records of reviews or approvals.
  • Screenshots/exports showing configurations and coverage.
  • Tickets proving remediation or follow-up.

Common mistakes

  • Unowned control with no cadence.
  • Evidence not tied to who/when/what changed.
  • No process for exceptions or emergency changes.

FAQ

Why auditors care

Access defines your blast radius. Auditors look for SSO, MFA, role-based access, and timely offboarding.

Common gaps

Local accounts without MFA, shared admin credentials, and slow offboarding workflows.