Quick Navigate
01. Scope & Prep 02. Infrastructure 03. Policies 04. Evidence 05. Auditor 06. Limitations
0%
LoxeAI · Pre-Audit Checklist

SOC 2 Type I
for AWS-Native Teams

For lean, 1–30 person AWS-Native teams getting their first SOC 2. Everything you need to know & more about getting ready for SOC 2 compliance.

The short version

SOC 2 Type I is a point-in-time snapshot. An auditor shows up, looks at your controls, and says "yes, these are designed correctly." You're not proving they've worked for months. Just that they exist and make sense right now. With the right prep: $8–15K at a startup-friendly firm, 6–10 weeks elapsed. Most teams pay double and take twice as long because they walk in unprepared. This checklist is the prep.

Read these first
SOC 2
A security audit framework from the AICPA (the U.S. CPA standards body). It asks: does your company handle customer data responsibly? Not a government regulation. More like a trust signal that enterprise buyers have standardized on. When your customer's legal team asks for your "SOC 2 report," this is what they mean.
Type I vs Type II
Type I: a photograph. "Your controls look correctly designed as of [date]." Fast, cheaper ($8–15K), unblocks most deals. Type II: a security camera recording. "Your controls actually worked consistently for 6–12 months." Enterprise buyers eventually want this. Type I comes first. Start here.
Trust Services Criteria
The five areas SOC 2 covers: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Security is the only mandatory one. The others depend on what your product does. For most lean AWS SaaS teams, Security alone is sufficient for Type I.
Common Criteria
The nine series (CC1–CC9) of specific criteria that make up the Security TSC. Each series contains multiple individual criteria (CC6.1, CC6.2, etc.). Your auditor evaluates each one. When you see "CC6.1" in this doc, that's one specific criterion inside the CC6 series.
Controls
The security practices your auditor evaluates. MFA enabled? CloudTrail on? Access reviews happening? Each one is a "control." Every control needs an owner (a named person on your team) and evidence that it works. Both matter.
Evidence
Documentation that proves your controls are real. API responses, config exports, policy docs, access review records. The painful part isn't the controls. It's proving they exist. AWS makes this automatable. Most teams don't bother, which is why audits drag.
Control gap
Somewhere SOC 2 requires something you don't have yet. MFA not everywhere? Gap. No incident response plan? Gap. Find and close these before you engage an auditor. Not at $300/hour while they're waiting.
0 of 32 items checked
01 Scope it before you build anything

These decisions determine how much work the next few months are. Get them wrong and you'll overbuild. Most teams skip this and regret it.

02 Know your AWS infrastructure's actual state

SOC 2 isn't just about having policies. Your infrastructure has to actually match what your policies say. For AWS teams, this is both the biggest risk and the most automatable part of the process.

What's automatable here: The controls in this section map directly to AWS APIs — IAM, CloudTrail, S3, VPC, GuardDuty, SecurityHub, Config, and more. The open-source Evidence Tracer runs these automatically, maps findings to controls, and gives you a gap report in about 5 minutes. The table below shows what each check actually is if you want to do it manually.

What's being checked What the auditor looks at Evidence source
Who can access what (CC6.1)MFA on all IAM users, no root access keys, password policy, least-privilege rolesAPI scannable
How access gets granted (CC6.2)Onboarding/offboarding process, SSO config, access key age per your policyAPI scannable
Network perimeter (CC6.6)VPC config, security groups (no 0.0.0.0/0 on sensitive ports), WAF if applicableAPI scannable
Data in transit (CC6.7)TLS enforcement, transmission controls, secure data movement policiesPartial
Encryption at rest (CC6.1/CC6.6)S3 encryption, KMS key rotation, RDS encryption, no public S3 bucketsAPI scannable
Config tracking (CC7.1)AWS Config enabled, delivery channels active, config rules runningAPI scannable
Audit logging (CC7.2)CloudTrail on in all regions, log file validation on, management events loggedAPI scannable
Threat detection (CC7.3)GuardDuty enabled, CloudWatch alarms for critical events, SNS configuredAPI scannable
Incident handling (CC7.4)SecurityHub enabled, findings reviewed, incident response plan existsPartial
Change tracking (CC8.1)CloudTrail logging API calls, Config tracking changes, Lambda inventoryAPI scannable
Vendor risk (CC9.2)Critical vendor list, confirmation vendors are SOC 2 compliant, review processManual
Backups and recovery (A1.2)RDS automated backups with retention policy, S3 versioning on critical bucketsAPI scannable
Governance, HR, training (CC1–CC4)Org structure, risk assessments, security training records, background checksManual
03 Write the policies

SOC 2 requires written policies for basically everything. They don't need to be long. They need to be real — meaning your team follows them and your infrastructure actually matches them.

The part most people miss: Use AI to draft every policy in a day. The auditor doesn't care if Claude wrote the first draft. They care that (a) you reviewed and approved it, (b) your team knows it exists, and (c) your actual practices match what it says. A policy that claims 90-day key rotation when you haven't rotated keys in 2 years isn't compliance. It's a paper trail for negligence.

04 Collect and organize your evidence

For Type I, you need point-in-time evidence proving your controls are real as of the audit date. This step takes the most calendar time. Budget 40–60 hours if you're doing it manually.

What a well-organized evidence folder looks like
evidence/
  +-- CC6.1-access-controls/
  |   +-- iam-credential-report-2025-05-21.json
  |   +-- mfa-status-all-users-2025-05-21.json
  |   +-- root-account-mfa-check.json
  +-- CC7.2-audit-logging/
  |   +-- cloudtrail-describe-trails-all-regions.json
  |   +-- cloudtrail-log-file-validation-status.json
  +-- CC7.3-threat-detection/
  |   +-- guardduty-detector-status-all-regions.json
  +-- CC8.1-change-management/
      +-- github-branch-protection-rules.json
What an auditor finding looks like — so you know what you're avoiding
Finding: Multi-Factor Authentication Not Enabled — IAM User "deploy-bot"
During our procedures, we identified that IAM user "deploy-bot" does not have multi-factor authentication enabled as of the audit date. This condition is inconsistent with the organization's Access Control Policy, which requires MFA on all IAM users with programmatic and console access. We consider this a control deficiency with respect to CC6.1 (Logical and Physical Access Controls). Management has not demonstrated that compensating controls exist to address the risk. We recommend remediation prior to any Type II engagement.
github.com/adog0822/AWS-Evidence-Layer

Open-source AWS evidence scanner. Runs the API calls above, maps findings to the criteria in this checklist, timestamps and SHA-256 hashes every response. Read the code before running it in your account.

05 Pick an auditor and do a readiness assessment

Only licensed CPA firms accredited by the AICPA can issue SOC 2 reports. Who you pick affects timeline and cost significantly.

06 What Type I doesn't cover

Most compliance guides skip this. Type I is not a comprehensive security certification. Knowing what it doesn't prove is as important as knowing what it does.

What your Type I report tells a customer: "As of [date], this company had security controls that were appropriately designed." It doesn't say they worked, worked consistently, or that there haven't been incidents since. Enterprise security teams know this, which is why they eventually ask for Type II.

The six-step version

  1. Scope it: Security TSC only. Define your system boundary. Assign control owners. Confirm you actually need Type I.
  2. Know your AWS state: Find the gaps before the auditor does. IAM, CloudTrail, GuardDuty, S3, VPC.
  3. Write the policies: Eight core documents. AI-drafted is fine. They have to match reality.
  4. Collect evidence: Organized by criterion, timestamped, API-native where possible. Not a folder of screenshots.
  5. Pick the right auditor: Startup-friendly CPA firm. Readiness assessment first. Show up with organized evidence. Budget for a pen test.
  6. Know the limits: Type I is a photograph. It covers the technical layer, not everything. Compliance is a floor, not a ceiling.