SOC 2 Type 2 mapping to Secure SDLC Requirements
We started to talk about the SOC2 Type 2 certification and I feel that we neglected it a bit.
I wrote a bit about SDLC, Secure SDLC in particular, but now it is time to bring them together.
SOC 2 Type 2 and Secure SDLC — the big picture
SOC 2 Type 2 evaluates whether controls are operating effectively over time (typically 6–12 months). It is not a point-in-time snapshot.
Your SDLC is not an isolated engineering practice — it feeds directly into several Trust Services Criteria (TSC).
All nine Common Criteria map to the SDLC in some way, but they do so at different layers.
CC1 (Control Environment) is the foundation. It is not about code or process — it is about organizational accountability. The auditor checks that your Secure SDLC has a named owner, that the policy carries formal authority, and that security has a defined role in the development organization. Without this, every other control lacks a governance backbone.
CC2 (Communication) requires that developers know the rules. A Secure SDLC policy that exists but was never distributed or acknowledged does not satisfy this criterion. The auditor looks for training records, policy sign-offs, or equivalent evidence that the people making security decisions in each SDLC phase were aware of their obligations.
CC3 (Risk Assessment) maps directly to the Idea and PoC phases. The criterion requires that risks are identified and analyzed before work begins. A threat model, a risk register entry, or a documented security review of the proposed design all serve as evidence. The auditor wants to see that risk was considered as an input to scope decisions, not evaluated after the fact.
CC4 (Monitoring Activities) requires ongoing evaluation of whether controls are working. In SDLC terms this means SAST, DAST, and SCA scans must run regularly, their results must be reviewed, and findings must be tracked to resolution. Running a scan whose results are never acted on does not satisfy CC4.
CC5 (Control Activities) covers the specific rules that govern how code is written and reviewed. Secure coding standards, mandatory peer review, branch protection, and secrets scanning policies all live here. CC5 is about the guardrails built into the development process itself, not just the approval chain around it.
CC6 (Logical Access) runs across the widest range of SDLC phases. It covers who has access to source code, build pipelines, deployment tools, and production environments — and whether that access is appropriate at each phase. PoC access that was never revoked and production credentials embedded in a repository are both CC6 findings.
CC7 (System Operations) requires that running systems can detect and respond to threats. Its SDLC relevance is that logging, alerting, and incident response readiness must be built into the product before it reaches production. If these are treated as post-launch concerns, CC7 is a gap.
CC8 (Change Management) is the criterion most directly owned by the SDLC. Every code change from PoC through EOL must be authorized, reviewed, and traceable. This criterion generates the highest sample volume in a Type 2 audit — typically 20 to 25 change records — and every sampled item needs a complete evidence chain.
CC9 (Risk Mitigation) addresses third-party and vendor risk. In a software development context this means evaluating open-source libraries, SDKs, and external dependencies before they are adopted. Running a dependency scan satisfies part of this, but CC9 specifically requires that a conscious risk decision was documented — not just that a tool ran.
The practical takeaway is that CC1, CC2, and CC9 are the ones most commonly missing from customers who think their Secure SDLC is well covered.
They focus on CC8 (change management) and CC6 (access) but leave governance, communication, and vendor risk undocumented.
Summary mapping of SOC2 controls to SDLC
| CC | Control Name | Idea | PoC | MVP | Release | EOL | SDLC Intersection / Evidence |
|---|---|---|---|---|---|---|---|
| CC1 | Control environment | ✓ | — | — | — | — | SDLC policy with named owner. Security team has formal authority to block releases. |
| CC2 | Communication | ✓ | ✓ | ✓ | — | — | Secure SDLC policy published and acknowledged. Developer training completion records. |
| CC3 | Risk assessment | ✓ | ✓ | — | — | — | Threat model at Idea phase. Risk register updated before PoC scope is confirmed. |
| CC4 | Monitoring activities | — | — | ✓ | ✓ | — | SAST/DAST results reviewed. Recurring vuln scans in prod. Findings tracked to closure. |
| CC5 | Control activities | ✓ | — | ✓ | ✓ | — | Secure coding standards doc. Code review policy enforced. Branch protection rules active. |
| CC6 | Logical access | — | ✓ | ✓ | ✓ | ✓ | Repo and pipeline access logs. Secrets management reviewed. Prod access revoked at EOL. |
| CC7 | System operations | — | — | ✓ | ✓ | ✓ | Logging enabled pre-release. Alerting configured in prod. Incident runbook referenced. |
| CC8 | Change management | — | ✓ | ✓ | ✓ | ✓ | PR records with approvals. Pipeline gates enforced. EOL change ticket required. |
| CC9 | Risk mitigation | ✓ | ✓ | — | — | — | Third-party libraries assessed. OSS license and security risk reviewed before adoption. |
Practical Checklist — SDLC Evidence by Common Criteria
The post SOC 2 Type 2 mapping to Secure SDLC Requirements first appeared on Sorin Mustaca’s blog.


