Checklist
SOC 2 Readiness Checklist
SOC 2 Readiness Checklist
120-point gap analysis covering all five Trust Services Criteria — print, tick, share with your auditor.
Get checklistBattle-tested checklists, policies and spreadsheets you can fork today — built from hundreds of real audits and security programs.
12 resources
Checklist
120-point gap analysis covering all five Trust Services Criteria — print, tick, share with your auditor.
Get checklistTemplate
Pre-filled Annex A control register — duplicate, justify inclusions/exclusions and ship to your auditor.
Get templateTemplate
Structured Risk Analysis spreadsheet aligned to the OCR audit protocol with likelihood/impact scoring built in.
Get templateTemplate
Article 28-compliant DPA you can send to processors — clauses for sub-processors, transfers and audit rights.
Get templateChecklist
India’s Digital Personal Data Protection Act mapped to operational tasks — consent, notice, retention and SDF status.
Get checklistChecklist
All 12 PCI DSS requirements broken into actionable evidence asks for SAQ-D and Level 1 merchants.
Get checklistTemplate
Heat-map driven risk register with treatment plans, owners and review dates — ready for your next risk committee.
Get templateTemplate
A practical 60-question vendor due diligence questionnaire mapped to SOC 2, ISO 27001 and CIS controls.
Get templatePolicy Pack
Audit-ready policies — Access Control, Change Mgmt, Incident Response, BCP/DR, Secure SDLC and more.
Get policy packPlaybook
Hour-by-hour playbook for the first 72 hours of a ransomware incident — with RACI and comms templates.
Get playbookChecklist
Hardening checklist for AWS Org, IAM, S3, EC2, RDS, VPC, GuardDuty & SecurityHub — mapped to CIS & SOC 2.
Get checklistTemplate
STRIDE-based threat-model template engineers use during design review — abuse cases, mitigations, sign-off.
Get templateNo resources match your search.
Tell us what you’re working on and we’ll send back the right kit, template or expert call.
Talk to an advisor