Skip to main content

SOC 2 Type II Compliance

ASCEND is designed to meet SOC 2 Type II requirements across all five Trust Service Criteria. The platform's 12-layer defense-in-depth architecture provides comprehensive coverage of the Common Criteria (CC) controls.

Trust Service Criteria Coverage

CriteriaStatusEvidence
Security (CC)CompliantAccess controls, encryption, monitoring
Availability (A)Compliant99.9% SLA, redundancy, DR
Processing Integrity (PI)CompliantValidation, audit trails
Confidentiality (C)CompliantEncryption, access controls
Privacy (P)CompliantData handling, consent management

Common Criteria (CC) Controls

CC6 - Logical and Physical Access Controls

CC6.1 - Logical Access Security

Requirement: The entity implements logical access security software, infrastructure, and architectures over protected information assets.

Ascend Implementation:

ControlImplementationEvidence
AuthenticationJWT RS256 tokens with MFAAuth logs, token validation
AuthorizationRole-based access control (RBAC)Policy engine, role mappings
Session ManagementSecure session handlingSession timeout, invalidation
API SecurityAPI key authenticationKey hashing, rotation policies

Code Reference:

# dependencies.py - Multi-tenant access control
async def get_organization_filter(
current_user: User = Depends(get_current_user),
db: Session = Depends(get_db)
) -> int:
"""
SOC 2 CC6.1: Returns organization_id for tenant isolation.
All queries MUST use this for data segregation.
"""
if current_user.organization_id is None:
raise HTTPException(status_code=403, detail="User has no organization")
return current_user.organization_id

Audit Evidence:

  • Authentication event logs
  • Failed login attempt tracking
  • Session activity records
  • API key usage logs

CC6.2 - Access Provisioning

Requirement: The entity restricts access to protected information assets.

Ascend Implementation:

ControlImplementationEvidence
User ProvisioningAdmin-controlled user creationUser creation audit logs
Role AssignmentExplicit role grantsRole assignment records
Access ReviewPeriodic access reviewsReview completion reports
DeprovisioningImmediate access revocationDeprovisioning timestamps

Agent Registration Controls:

{
"agent_id": "customer-service-agent",
"status": "draft",
"requires_approval": true,
"approved_by": "admin@company.com",
"approved_at": "2025-01-15T10:30:00Z",
"allowed_action_types": ["email_send", "ticket_create"],
"blocked_resources": ["/admin/*", "/pii/*"]
}

CC6.3 - Access Removal

Requirement: The entity removes access when no longer required.

Ascend Implementation:

ControlImplementationEvidence
User DeactivationImmediate Cognito disableDeactivation logs
Session TerminationForce logout on deactivationSession invalidation records
API Key RevocationImmediate key invalidationRevocation timestamps
Agent SuspensionImmediate action blockingSuspension audit trail

CC7 - System Operations

CC7.1 - Detection of Anomalies

Requirement: The entity detects anomalies and evaluates them for security events.

Ascend Implementation:

ControlImplementationEvidence
Anomaly DetectionML-powered pattern analysisDetection alerts
Threshold MonitoringConfigurable thresholdsThreshold breach logs
Real-time AlertingImmediate notificationsAlert delivery records
Trend AnalysisHistorical pattern comparisonTrend reports

Detection Capabilities:

{
"anomaly_detection": {
"enabled": true,
"sensitivity": "high",
"baseline_period_days": 14,
"detection_types": [
"volume_spike",
"unusual_timing",
"new_resource_access",
"risk_score_deviation"
]
}
}

CC7.2 - Monitoring System Components

Requirement: The entity monitors system components and the operation of those components for anomalies.

Ascend Implementation:

ControlImplementationEvidence
System HealthCloudWatch monitoringHealth dashboards
Performance MetricsReal-time metrics collectionPerformance logs
Error TrackingCentralized error loggingError reports
Capacity MonitoringResource utilization trackingCapacity alerts

Metrics Tracked:

  • CPU utilization
  • Memory usage
  • API response times
  • Database connections
  • Error rates
  • Request throughput

Availability (A) Controls

A1.1 - Availability Commitments

Requirement: The entity maintains availability commitments.

Ascend SLA:

MetricTargetMeasurement
Uptime99.9%Monthly calculation
RTO4 hoursRecovery time objective
RPO1 hourRecovery point objective
Response Time< 200msP95 API latency

A1.2 - Availability Monitoring

Requirement: The entity monitors availability.

Ascend Implementation:

ControlImplementationEvidence
Health ChecksContinuous endpoint monitoringHealth check logs
AlertingPagerDuty integrationAlert records
Status PagePublic status dashboardStatus history
Incident ResponseDocumented runbooksIncident reports

Processing Integrity (PI) Controls

PI1.1 - Processing Accuracy

Requirement: The entity ensures processing integrity.

Ascend Implementation:

ControlImplementationEvidence
Input ValidationServer-side validationValidation logs
Data IntegrityChecksums and hashesIntegrity verification
Transaction LoggingComplete audit trailTransaction records
Error HandlingGraceful error managementError logs

Unified Metrics Engine (SEC-066):

# Ensures consistent metric calculations across all endpoints
class UnifiedMetricsEngine:
"""
SOC 2 PI-1: Single source of truth for all metrics.
Prevents inconsistencies between dashboard components.
"""
def calculate(self, period_hours: int) -> MetricSnapshot:
# All metrics calculated from single query
# Results cached and validated
# Audit trail for every calculation
pass

PI1.2 - Processing Completeness

Requirement: The entity ensures complete processing.

Ascend Implementation:

ControlImplementationEvidence
Action TrackingEnd-to-end action loggingAction records
Pipeline Verification7-step pipeline validationPipeline logs
Completion ConfirmationStatus confirmationStatus records
ReconciliationPeriodic data reconciliationReconciliation reports

Confidentiality (C) Controls

C1.1 - Confidential Information Protection

Requirement: The entity protects confidential information.

Ascend Implementation:

ControlImplementationEvidence
Encryption at RestAES-256-GCMKMS configuration
Encryption in TransitTLS 1.3Certificate records
Data ClassificationAutomatic classificationClassification tags
Access LoggingAll access loggedAccess logs

C1.2 - Confidential Information Disposal

Requirement: The entity disposes of confidential information.

Ascend Implementation:

ControlImplementationEvidence
Data RetentionConfigurable retention periodsRetention policies
Secure DeletionCryptographic erasureDeletion logs
Backup PurgingAutomated backup expirationPurge records
Audit Trail Retention7-year retentionRetention verification

Privacy (P) Controls

P1.1 - Privacy Notice

Requirement: The entity provides notice regarding privacy practices.

Ascend Implementation:

ControlImplementationEvidence
Privacy PolicyPublished privacy policyPolicy document
Data Collection NoticeClear data usage disclosureNotice records
Consent ManagementExplicit consent collectionConsent logs
Policy UpdatesVersion-controlled updatesUpdate history

Audit Evidence Collection

Continuous Evidence Generation

ASCEND automatically generates audit evidence:

{
"evidence_type": "access_control",
"timestamp": "2025-01-15T14:30:00Z",
"control": "CC6.1",
"event": {
"type": "user_authentication",
"user_id": "user@company.com",
"method": "jwt_mfa",
"result": "success",
"ip_address": "10.0.1.50"
},
"attestation": {
"generated_by": "ascend_audit_engine",
"integrity_hash": "sha256:abc123..."
}
}

Evidence Export

# Export SOC 2 evidence package
curl -X POST "https://pilot.owkai.app/api/compliance/export/soc2" \
-H "X-API-Key: your_api_key" \
-H "Content-Type: application/json" \
-d '{
"period_start": "2025-01-01",
"period_end": "2025-01-31",
"controls": ["CC6.1", "CC6.2", "CC7.1", "CC7.2"],
"format": "pdf"
}'

Response:

{
"export_id": "exp_20250115_soc2_a1b2c3d4",
"status": "generating",
"estimated_completion": "2025-01-15T14:35:00Z",
"download_url": "https://pilot.owkai.app/api/compliance/exports/exp_20250115_soc2_a1b2c3d4"
}

Control Mapping Reference

Action Type to SOC 2 Control Mapping

Action TypePrimary ControlSecondary Controls
database_readCC6.1CC7.2, C1.1
database_writeCC6.1PI1.1, AU-9
database_deleteCC6.1CC7.1, CM-3
file_readCC6.1C1.1, AU-2
file_writeCC6.1PI1.1, CC7.2
user_createCC6.2IA-4, AU-2
user_deleteCC6.3AU-2, CC7.1
config_changeCC7.2CM-3, AU-9
data_exportC1.1CC6.1, SI-12
api_callCC6.1CC7.2, AU-2

Auditor Resources

Documentation Package

DocumentDescriptionAccess
System DescriptionArchitecture overviewOn request
Control MatrixDetailed control mappingsOn request
Evidence PackageGenerated audit evidenceAPI export
Penetration TestAnnual pentest resultsOn request
Vulnerability ScansContinuous scan resultsOn request

Contact

For SOC 2 audit inquiries:


12-Layer Architecture Mapping

Security LayerSOC 2 ControlEvidence Generated
Layer 1: Rate LimitingCC7.1Rate limit events, blocked requests
Layer 2: Prompt SecurityCC6.1Prompt injection detection logs
Layer 3: Code AnalysisCC6.1Code vulnerability findings
Layer 4: Action GovernanceCC7.1Action decisions, risk scores
Layer 5: JWT AuthenticationCC6.1Authentication events, token validation
Layer 6: API Key AuthCC6.1API key usage logs
Layer 7: RBACCC6.2, CC6.3Permission checks, role assignments
Layer 8: BYOK EncryptionCC6.7Encryption operations, key usage
Layer 9: Audit LoggingCC7.1Immutable audit trail
Layer 10: Input ValidationCC6.1Validation failures
Layer 11: Secrets ManagementCC6.7Secret access logs
Layer 12: Security HeadersCC6.1Header configurations

Fail-Secure Compliance

All security controls implement fail-secure behavior per SOC 2 CC7.1:

LayerFailure ModeSOC 2 Alignment
AuthenticationDENY on failureCC6.1 - Prevent unauthorized access
AuthorizationDENY on errorCC6.2 - Enforce least privilege
Audit LoggingBLOCK operationCC7.1 - Maintain compliance trail
EncryptionFAIL operationCC6.7 - Protect data integrity

SOC 2 Type II report available upon request with NDA.