SOC 2 Policies and Procedures
Browse SOC 2 Type I/II topics
Policies are where SOC 2 programs set their own ceiling
Policies define what your organization has committed to. Every other SOC 2 control is, in some sense, testing whether you do what you said you would. Weak policies create a weak foundation for the entire program — auditors cannot test adherence to commitments that are not written down, unclear, or inconsistent with practice. Strong policies make the rest of the audit easier because they anchor the conversation in documented expectations.
This is also where many first-time programs overcorrect. Teams buy a template library, rubber-stamp the whole set, and discover during fieldwork that the auditor is testing against policies nobody read. The fix is not more policy — it is fewer, sharper policies that match how the team actually operates.
What SOC 2 expects from policies
The Trust Services Criteria reference policies and procedures throughout, most directly in CC1.4, CC2.2, CC5.1, CC5.3, and CC6.1. Together these require that the entity:
- Establishes structures, reporting lines, authorities, and responsibilities
- Develops and implements controls through policies and procedures
- Communicates policies to internal and external parties as relevant
- Demonstrates commitment to competence, including training on policies
- Restricts access based on documented criteria
Policies must be approved, communicated, followed, and periodically reviewed. Each of those verbs generates evidence.
The baseline SOC 2 policy set
There is no mandated list, but most SOC 2 programs maintain a baseline of policies that map to the Common Criteria and any additional Trust Services Criteria selected.
| Policy | Purpose | Primary Criteria |
|---|---|---|
| Information Security Policy | Defines the overall security program, roles, and authorities | CC1, CC2 |
| Acceptable Use Policy | Governs employee behavior on company systems | CC2.3, CC6 |
| Access Control Policy | Defines provisioning, review, and removal of access | CC6 |
| Change Management Policy | Governs changes to infrastructure, code, and configuration | CC8.1 |
| Incident Response Policy | Defines how security incidents are detected and handled | CC7.3–CC7.5 |
| Vendor Management Policy | Defines how third parties are assessed and monitored | CC9.2 |
| Risk Assessment Policy | Defines how risks are identified, evaluated, and treated | CC3 |
| Business Continuity and DR Policy | Defines recovery objectives and testing | CC9.1, Availability |
| Data Classification Policy | Defines data sensitivity tiers and handling requirements | CC6, Confidentiality |
| HR Security Policy | Covers hiring, training, termination, confidentiality | CC1.4, CC2.3 |
| System Monitoring Policy | Defines logging, alerting, and review obligations | CC7.1, CC7.2 |
| Privacy Policy | Covers handling of personal information (if privacy in scope) | Privacy |
Some organizations split these into more granular documents; others combine them. Either is acceptable if the content is comprehensive and consistent.
Anatomy of a SOC 2-ready policy
Auditors quickly identify thin or template-only policies. A policy that passes scrutiny has consistent structure and real operational content.
Required metadata
Every policy should include:
- Title and version number
- Date of last review
- Owner (role, not name)
- Approver (leadership role)
- Approval date
- Scope of applicability
- Next scheduled review date
Required sections
At minimum, a complete SOC 2 policy covers:
- Purpose — why the policy exists
- Scope — who and what it applies to
- Roles and responsibilities — who does what
- Policy statements — the rules themselves, in directive language
- Procedures or references — how the policy is executed
- Exceptions process — how deviations are approved and tracked
- Enforcement and consequences — what happens if the policy is violated
- Review cadence — when and how the policy is updated
Language that survives audit
- Use "shall" or "must" for required actions; "should" for recommended
- Avoid aspirational language that cannot be tested
- Name the system, team, or artifact by role rather than by product (so policies survive tool changes)
- Reference other policies rather than duplicating content
See evidence collection for how policy adherence becomes auditable.
Version control and approval workflow
Policies must be controlled documents. Auditors typically verify:
- Current version is the approved version
- Historical versions are retained
- Approvals are documented with approver, date, and method
- Changes between versions can be traced
- Distribution to affected parties is evidenced
Practical options range from a policy management tool to a Git repository with signed commits and a documented pull request workflow. What matters is traceability, not the specific tool.
The approval workflow should specify:
- Who can propose changes
- Who reviews before approval
- Who approves (usually leadership for any material change)
- How approval is recorded
- How approved policies are published and communicated
Policies versus procedures versus standards
SOC 2 does not require a specific document hierarchy, but clarity helps.
- Policy — a high-level commitment that rarely changes. "All employees must use multi-factor authentication on company accounts."
- Standard — a specific requirement that supports a policy. "Multi-factor authentication must use either a hardware token or a TOTP app; SMS is not permitted."
- Procedure — the operational steps to implement the policy and standard. "To enroll a hardware token: log in to the identity provider, navigate to security, click add device..."
Auditors may test against any layer. Separating them keeps policies stable while allowing procedures to evolve with operational reality.
How this fits into SOC 2
Policies feed every other SOC 2 control area. Change management, incident response, vendor management, and continuous monitoring all reference policy requirements, and auditors often start a control area by asking to see the policy before testing adherence.
Policies are also central to readiness assessment. A common finding during readiness is that informal practices exist but are not documented. The fix is to write what the team already does — not to invent new procedures — and then evolve the policy as practice matures.
Evidence auditors expect
For each policy, auditors may request:
- Current version of the policy document
- Evidence of approval (signed approval, workflow record, metadata)
- Evidence of last annual review
- Distribution evidence (email, portal acknowledgment, training completion)
- Evidence of adherence across the observation period
For a Type II audit, adherence evidence is the most demanding category. A change management policy is only as strong as the changes that followed it.
Common mistakes
- Template tourism. Teams adopt templates without tailoring. Auditors recognize generic language immediately.
- Policy-practice gap. Written policy diverges from actual practice. Walkthroughs expose this fast.
- Stale reviews. Policies with "last reviewed" dates more than a year old signal neglect.
- Missing approval. No documented sign-off from leadership. A committed policy with no approval trail rarely passes review.
- No communication evidence. Policy exists but employees cannot confirm they have seen it.
Implementation tips
- Start with the baseline set above and resist the urge to create more. Every policy is future audit burden.
- Pair every policy with a procedure or runbook that shows how it is executed. The pair is stronger than either alone.
- Review and re-approve all policies annually on a fixed schedule — for example, every February. Document the cycle.
- Collect policy acknowledgment during employee onboarding and annually thereafter. Acknowledgment is inexpensive evidence.
- Keep an exceptions log. A policy with no exceptions is either perfectly followed or poorly understood; exceptions tell you which.
How episki helps
episki ships with a SOC 2 policy template library — covering the baseline set above — mapped to the Trust Services Criteria, with approval workflow, version history, and acknowledgment tracking built in. Start a free trial or review the SOC 2 framework guide to see how policy management integrates with the rest of the audit program.
Related topics
Related terms
Frequently asked questions
Continue exploring
SOC 2 Audit Process
Framework topic
SOC 2 Availability Criteria
Framework topic
What is SOC 2 Type I/II?
Framework overview
What is Access Control?
Glossary definition
What is an Audit Trail?
Glossary definition
Drata vs Secureframe
Head-to-head comparison
episki vs Drata
See how we compare
Defined Roles in PCI: The Compliance Mistakes That Fly Under the Radar
From the blog