Page 1 of 5

SOC 2 Readiness Assessment

Part 1 of 3 — Access & Data Protection

These questions assess your core security infrastructure — who can access what, and how you protect data.

Which of these require MFA at your company today?

q1_mfa [0]
A
B
C
D

How often do you formally review who has access to customer data?

q2_access [0]
A
B
C
D

Is customer data encrypted at rest and in transit?

q3_encrypt [0]
A
B
C
D

Do you maintain an inventory of every third-party vendor that accesses customer data?

q4_vendor [0]
A
B
C
D

Are critical system logs (authentication, data access, production changes) centralized and retained?

q5_logging [0]
A
B
C
D