SOC Compliance
CapSign infrastructure is designed to support SOC 1, SOC 2, and SOC 3 certification requirements. This guide outlines how our infrastructure components align with SOC controls and what additional steps are needed for certification.
๐ SOC Certification Overview
SOC 1 (Financial Reporting Controls)
Purpose: Controls over financial reporting systems
Audience: Service organizations' management, user entities, and their auditors
Focus: Financial controls, cost tracking, billing accuracy
SOC 2 (Trust Services Criteria)
Purpose: Controls relevant to security, availability, processing integrity, confidentiality, and privacy
Audience: Management, clients, and other specified parties
Focus: Operational security and privacy controls
SOC 3 (General Use Report)
Purpose: General use report suitable for broad distribution
Audience: Anyone (public report)
Focus: High-level summary of SOC 2 controls
๐๏ธ CapSign Infrastructure SOC Alignment
๐ Security Controls (SOC 2)
Access Controls
AWS IAM
CC6.1, CC6.2
Role-based access control, MFA enforcement
GitHub
CC6.1, CC6.3
Branch protection, required reviews, RBAC
EKS RBAC
CC6.1, CC6.2
Kubernetes role-based access control
Terraform State
CC6.1, CC6.7
S3 bucket encryption, DynamoDB locking
Monitoring & Logging
AWS CloudTrail
CC7.1, CC7.2
Complete API audit trail
EKS Logging
CC7.1, CC7.2
Control plane and audit logs
Prometheus
CC7.1, CC7.4
Real-time monitoring and alerting
GitHub Actions
CC7.1, CC7.2
CI/CD pipeline audit logs
Network Security
VPC
CC6.6, CC6.7
Network isolation and segmentation
Security Groups
CC6.6, CC6.1
Firewall rules and access controls
Network Policies
CC6.6, CC6.7
Pod-to-pod communication controls
๐ฐ Financial Controls (SOC 1)
Cost Management
Infracost
F1.1, F1.2
Automated cost estimation and tracking
AWS Cost Explorer
F1.3, F1.4
Cost monitoring and reporting
Terraform State
F1.1, F1.5
Infrastructure change tracking
Change Management
GitHub Actions
F2.1, F2.2
Automated deployment controls
Terraform
F2.1, F2.3
Infrastructure as code versioning
Helm
F2.1, F2.2
Application deployment controls
๐ Privacy & Confidentiality (SOC 2)
Data Protection
S3 Encryption
CC6.7, P1.1
Data at rest encryption
EKS Encryption
CC6.7, P1.1
Secrets and etcd encryption
TLS
CC6.7, P1.1
Data in transit encryption
Secrets Management
GitHub Secrets
CC6.7, P1.1
Encrypted secrets storage
AWS Secrets Manager
CC6.7, P1.1
Dynamic secrets rotation
Kubernetes Secrets
CC6.7, P1.1
Application secrets management
๐ SOC-Compliant Third-Party Services
โ
SOC 2 Type II Certified Vendors
AWS
SOC 1/2/3
Infrastructure platform
Complete infrastructure controls
GitHub
SOC 2 Type II
Source code management
Development lifecycle controls
Infracost
SOC 2 Type II
Cost management
Financial reporting controls
FOSSA
SOC 2 Type II
License compliance
Risk management controls
Slack
SOC 2 Type II
Team communication
Operational controls
๐ Vendor Risk Assessment
All third-party services undergo vendor risk assessment:
SOC 2 certification verification
Security questionnaire completion
Contract review for SOC compliance clauses
Regular certification status monitoring
๐ Audit Evidence Collection
Automated Evidence Collection
Our infrastructure automatically collects SOC audit evidence:
Security Controls Evidence
# Security scan results
- Checkov security findings
- FOSSA vulnerability reports
- GitHub security alerts
- AWS Security Hub findings
# Access control evidence
- IAM policy changes
- GitHub permission changes
- Kubernetes RBAC modifications
- Failed authentication attempts
Operational Controls Evidence
# Change management evidence
- Terraform plan/apply logs
- GitHub Actions workflow logs
- Helm deployment history
- Infrastructure change approvals
# Monitoring evidence
- Prometheus metrics history
- AWS CloudWatch logs
- Application performance data
- Incident response records
Financial Controls Evidence
# Cost management evidence
- Infracost estimation reports
- AWS cost allocation reports
- Budget variance analysis
- Resource utilization metrics
๐ SOC Compliance Checklist
Pre-Certification Preparation
Technical Controls
Administrative Controls
Third-Party Services
Ongoing Compliance
Monthly Tasks
Quarterly Tasks
Annual Tasks
๐ฏ Implementation Timeline
Phase 1: Foundation (Weeks 1-4)
Deploy core infrastructure (AWS, EKS, monitoring)
Enable basic security controls (Checkov, AWS security)
Set up audit logging and evidence collection
Phase 2: Enhanced Controls (Weeks 5-8)
Enable SOC-compliant third-party services (Infracost, FOSSA)
Implement advanced monitoring and alerting
Develop security policies and procedures
Phase 3: Pre-Audit (Weeks 9-12)
Conduct internal SOC readiness assessment
Remediate any identified control gaps
Prepare audit evidence packages
Phase 4: SOC Audit (Weeks 13-16)
Engage with SOC auditor
Provide evidence and demonstrate controls
Address any auditor findings
๐จ Common SOC Pitfalls to Avoid
Technical Pitfalls
โ Incomplete logging - Ensure all systems generate audit logs
โ Weak access controls - Implement least privilege access
โ Manual processes - Automate controls where possible
โ Unencrypted data - Encrypt data at rest and in transit
Administrative Pitfalls
โ Undocumented procedures - Document all critical processes
โ Inconsistent enforcement - Apply controls consistently
โ Inadequate training - Train personnel on SOC requirements
โ Poor vendor management - Monitor vendor compliance status
๐ SOC Certification Support
Internal Team Roles
SOC Program Manager - Overall program coordination
Infrastructure Team - Technical control implementation
Security Team - Security control monitoring
Compliance Team - Policy development and audit coordination
External Support
SOC Auditor - Independent assessment of controls
Legal Counsel - Contract and regulatory guidance
Security Consultants - Specialized technical expertise
๐ Additional Resources
SOC Standards
Compliance Frameworks
๐ฏ Result: Following this guide will position CapSign for successful SOC 1, SOC 2, and SOC 3 certification with a robust, auditable infrastructure platform.
Last updated
Was this helpful?