
Introduction
If you are a B2B SaaS company selling to enterprise customers, SOC 2 Type II is not optional—it is the table stakes for doing business. It is the badge of honor that proves you aren't just "moving fast and breaking things" with their sensitive data.
But staring at the AICPA Trust Services Criteria (TSC) can feel like reading hieroglyphics.
Specifically, Common Criteria 6 (CC6): Logical and Physical Access Controls is where most engineering teams stumble. It requires you to prove—with evidence—that only the right people have access to your systems, and that you can kick them out instantly when they leave.
This guide focuses purely on the Authentication and Access Control aspects of SOC 2 Type II.
The Trust Services Criteria (TSC) for Auth
SOC 2 covers five "Trust Principles," but Security is the only mandatory one. Within Security, CC6 deals with how you lock the front door.
Your auditor will ask for screenshots, logs, and tickets proving you follow your own rules. "Trust, but verify" is the name of the game.
Logical Access (CC6.1): The Big Requirement
Criterion CC6.1: "The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to the extent commensurate with the entity’s objectives."
Translation: Do you have a password policy, and does it actually work?
The Password Policy Checklist for SOC 2
To satisfy CC6.1, your policy usually needs:
- Minimum Length: 8 chars is the floor; 12+ is preferred.
- Complexity: Complexity rules are fading (thanks to NIST), but you need to justify your choice.
- MFA: Mandatory for accessing the production environment (AWS/GCP/Azure) and source code (GitHub/GitLab).
- Encryption: Data at rest (databases) and in transit (TLS 1.2+) must be encrypted.
The Quarterly Access Review Ritual
This is the most tedious part of SOC 2 compliance, but it's critical.
Requirement: You must periodically review who has access to what. Frequency: Typically Quarterly.
How to do it:
- Export a list of all users from your critical systems (Cloud Provider, Database, GitHub, Admin Panel).
- The Meeting: The CTO or Security Lead reviews the list line-by-line.
- Action: Remove anyone who changed roles or doesn't need access anymore.
- Evidence: Save the spreadsheet, the meeting notes, and the Jira tickets for any removals. The auditor will ask for "Q3 2024 Access Review evidence."
Offboarding: The Auditor's Favorite Trap
The easiest way to get a "finding" (a black mark) on your report is messy offboarding.
Scenario: An employee leaves on Friday. HR knows. But their AWS access isn't revoked until Tuesday. The Result: Exception noted in your report.
The 24-Hour Rule
Most auditors expect access to be revoked within 24 hours (or 1 business day) of termination.
Best Practice: Automate this via an Identity Provider (IdP) like Okta or Rippling. When HR terminates a user in the directory, they instantly lose access to AWS, Slack, GitHub, and Jira simultaneously.
Quick Tips
- Implement Single Sign-On (SSO). It reduces your attack surface to one set of credentials per user and makes offboarding instant.
- Use "Role-Based Access Control" (RBAC). Give permissions to the "Senior Engineer" role, not to "Dave". When Dave leaves, the role stays secure.
- Document "Exceptions." If someone needs temporary admin access, log the approval and the revocation.
Common Questions Answered
Can developers have access to Production data?
Ideally, no. SOC 2 pushes for "Separation of Duties." Developers write code; CI/CD pipelines deploy it. If a dev needs to debug Prod, they should use temporary, audited access credentials.
Do we need to background check employees?
Yes (CC1.1). Part of access control is knowing who you are giving keys to. Background checks are a standard control auditors look for before access is granted.
What about contractors?
They need the same level of scrutiny. Their access should be limited, time-bound, and reviewed quarterly just like full-time staff.
Conclusion
SOC 2 Type II is a marathon, not a sprint. It forces you to mature your processes.
By implementing MFA everywhere, automating offboarding, and rigorously performing your Quarterly Access Reviews, you turn access control from a chaotic mess into a well-oiled machine. And that doesn't just get you a compliance badge—it builds a company that large enterprises can trust.
DynamicPassGen Security Team
Security Research & Education
Our security team stays current with the latest password standards, authentication methods, and cybersecurity best practices to provide accurate, actionable guidance for users and organizations. We analyze emerging threats, study real-world breaches, and translate complex security concepts into practical advice you can implement immediately.
