← Back to Blog

SOC 2 Identity Requirements: A Practical Guide

By IdentityFirst Ltd | January 2026

SOC 2 has become the de facto security certification for B2B companies. If you're selling to enterprises, you'll likely face SOC 2 requirements from customers and prospects. Here's what identity-related controls you need to implement.

Understanding SOC 2

SOC 2 (Service Organization Control 2) is an audit standard developed by the American Institute of CPAs (AICPA). It reports on a service organisation's controls relevant to security, availability, processing integrity, confidentiality, or privacy.

SOC 2 Trust Service Criteria

SOC 2 is built around five Trust Service Criteria:

  1. Security - The system is protected against unauthorized access (both physical and logical)
  2. Availability - The system is available for operation and use as committed or agreed
  3. Processing integrity - System processing is complete, valid, accurate, timely, and authorized
  4. Confidentiality - Information designated as confidential is protected as committed or agreed
  5. Privacy - Personal information is collected, used, retained, disclosed, and disposed of appropriately

Most organisations pursue SOC 2 for the Security criteria, which is the most relevant for identity.

Type I vs Type II

Most enterprises require Type II for due diligence.

Identity-related SOC 2 requirements

Access Control (CC6.1)

This is the core identity-related criteria:

Logical access controls:

User registration and authorization:

What this means in practice:

Access Enforcement (CC6.2)

Controls must be in place to enforce access decisions:

Authorization mechanisms:

Segregation of duties:

Access Removal (CC6.3)

When access is no longer needed:

Timely removal:

What auditors look for:

System Credentials (CC6.4)

Managing system identities:

Credential management:

Service account management:

Multi-Factor Authentication (CC6.6)

For systems with sensitive data:

MFA implementation:

Monitoring (CC7.2)

Detecting anomalous activity:

Anomaly detection:

What this means:

Common SOC 2 identity gaps

Incomplete user directories

Often missing:

Manual provisioning

Common issues:

Poor access reviews

Frequent findings:

Weak credential policies

Common problems:

Insufficient logging

Often missing:

Preparing for SOC 2

12 months before audit

  1. Define scope: Which systems, services, and data are in scope?
  2. Select trust service criteria: Which criteria are you addressing?
  3. Gap analysis: Compare current controls to SOC 2 requirements
  4. Remediation plan: Address identified gaps

6 months before audit

  1. Implement controls: Deploy technical and procedural controls
  2. Document procedures: Write operational procedures for all controls
  3. Train staff: Ensure everyone knows their responsibilities
  4. Begin monitoring: Start collecting evidence of control operation

3 months before audit

  1. Test controls: Run tests of control effectiveness
  2. Address findings: Remediate any control failures
  3. Prepare documentation: Organise evidence for auditors
  4. Select auditor: Engage your SOC 2 audit firm

1 month before audit

  1. Final review: Ensure all documentation is complete
  2. Evidence collection: Compile all required evidence
  3. Auditor coordination: Confirm logistics with audit firm
  4. Kick-off: Begin the audit process

Key identity controls to implement

User lifecycle management

Provisioning:

Changes:

Deprovisioning:

Access certification

Quarterly reviews:

Annual certification:

Credential management

Password policy:

MFA requirements:

Service accounts:

Logging and monitoring

Event logging:

Log review:

Retention:

Evidence you'll need

Auditors will request evidence of control operation:

Access management

Credential management

Monitoring

Policies

Working with auditors

Selecting an auditor

During the audit

After the audit

Maintaining SOC 2 compliance

SOC 2 isn't a one-time achievement—it requires ongoing attention:

Continuous monitoring

Periodic activities

Continuous improvement

Conclusion

SOC 2 compliance is achievable for organisations of all sizes. The key is implementing proper identity controls, documenting your processes, and maintaining evidence of control operation.

Start early, stay consistent, and remember: SOC 2 is about demonstrating that you have controls in place to protect customer data. Good identity management is the foundation of that protection.