SOC 2 compliance is based on security, which is a broad norm shared by all five Trust Service Criteria.
The SOC 2 security principles focus on preventing unwanted access to the organization’s assets and data. This principle necessitates the implementation of access restrictions in order to avoid malicious assaults, unlawful data deletion, misuse, unauthorised manipulation, or disclosure of firm data.
Here’s a simple SOC 2 compliance checklist, which includes safety-related controls: