SOC 2 secure controls in 2025
For organisations handling sensitive customer data, SOC 2 compliance remains the gold standard for demonstrating security controls. But the landscape is shifting rapidly. New threats, evolving regulations, and emerging technologies like AI are driving significant updates to both the SOC 2 framework and the supporting control frameworks that map to it.
Understanding the SOC 2 Framework
The SOC 2 framework was developed by the American Institute of Certified Public Accountants (AICPA) to provide assurance about a service provider's cybersecurity controls. According to Sprinto, it's a voluntary compliance standard designed to protect sensitive customer data collected and processed by service organisations.
The framework is built on five Trust Services Criteria (TSC):
- Security (required) - Protection against unauthorized access
- Availability - Systems are operational and usable as committed
- Confidentiality - Information designated as confidential is protected
- Processing Integrity - System processing is complete, accurate, and authorized
- Privacy - Personal information is collected, used, and retained appropriately
While only Security is mandatory, most organisations pursuing SOC 2 include multiple criteria based on their business model and customer expectations.
Key SOC 2 Updates for 2024-2025
Increased Auditor Scrutiny
Forvis Mazars reports that auditors are expected to intensify their scrutiny of inherent risk areas, leading to more meticulous examination of potential vulnerabilities. This means:
- More detailed evidence requirements for control effectiveness
- Greater focus on actual implementation versus documented policies
- Deeper testing of technical controls, not just process controls
Zero Trust Integration
OCD Tech highlights that changes in SOC 2 compliance for 2025 include updates related to Zero Trust architecture. Organisations can no longer rely on perimeter-based security models. Auditors are increasingly expecting to see:
- Identity verification at every access point
- Microsegmentation of networks
- Continuous authentication and authorisation
- Least-privilege access models
AI and Automation Considerations
As AI becomes embedded in business processes, SOC 2 audits are evolving to address:
- AI governance frameworks and model risk management
- Automated control monitoring and its reliability
- Data handling in AI training pipelines
- Bias and fairness considerations for AI-driven decisions
The Secure Controls Framework (SCF): 2024-2025 Updates
The Secure Controls Framework is an open-source meta-framework that maps controls across multiple compliance standards, including SOC 2/TSC. It's become an essential tool for organisations managing multiple compliance requirements.
Version 2024.1: STRM Integration
This release introduced Set Theory Relationship Mapping (STRM) per NIST IR 8477, providing:
- More precise mapping between control frameworks
- Better identification of control gaps
- Improved efficiency in multi-framework compliance
Version 2024.2: Major Enhancements
This moderate update brought several significant changes:
PPTDF Applicability Tagging
Controls are now tagged based on People, Processes, Technology, Data & Facilities applicability. This helps organisations:
- Assign controls to the right teams
- Identify which controls require technical implementation versus policy changes
- Plan remediation efforts more effectively
MSP/MSSP Secure Practices Baseline (SCF-M)
Perhaps the most significant addition is the SCF-M sub-control set, designed to help organisations perform Cybersecurity Supply Chain Risk Management (C-SCRM) assessments of their Managed Service Providers (MSP) and Managed Security Service Providers (MSSP).
This reflects the growing recognition that supply chain security is critical. Your security posture is only as strong as your weakest vendor.
Version 2025.1.1: Global Privacy Expansion
The latest release added support for the India Digital Personal Data Protection Act (DPDPA), continuing the SCF's expansion to cover global privacy regulations.
Practical Implications for Security Teams
1. Continuous Compliance Is Now Expected
The traditional "point-in-time" approach to SOC 2 is giving way to continuous monitoring. Bright Defense notes that organisations need systems that can demonstrate ongoing compliance, not just compliance at audit time.
Recommendations:
- Implement automated control monitoring
- Maintain continuous evidence collection
- Conduct regular internal assessments between audits
2. Supply Chain Risk Management Is Non-Negotiable
With the SCF-M baseline now available, there's no excuse for not assessing your service providers. Key questions to ask:
- Do your MSPs/MSSPs have their own SOC 2 reports?
- How do you monitor vendor security posture continuously?
- What's your process for vendor security incidents?
3. AI Governance Needs Attention Now
If you're using AI in your operations - and most organisations are, whether they realise it or not - you need governance frameworks in place. This includes:
- Documenting AI use cases and risk assessments
- Establishing model validation and monitoring procedures
- Defining acceptable use policies
- Creating incident response procedures for AI failures
4. Zero Trust Isn't Optional
Sprinto's SOC 2 updates guide emphasizes that Zero Trust principles are becoming baseline expectations. Start with:
- Identity and access management modernisation
- Network segmentation projects
- Continuous verification mechanisms
Looking Ahead
The trajectory is clear: SOC 2 compliance is becoming more rigorous, more continuous, and more comprehensive. Organisations that treat compliance as a checkbox exercise will struggle. Those that build security into their DNA - using frameworks like SCF to create coherent, mappable control environments - will thrive.
The good news? Better tools and frameworks are available to help. The challenge is commitment: investing in the people, processes, and technology to make compliance a continuous practice rather than an annual scramble.
Ready to Strengthen Your Compliance Posture?
Navigating SOC 2, ISO 27001, or GDPR requirements can be complex. My IT Compliance services help organisations build sustainable compliance programmes - from gap analysis through audit preparation.
Get in touch to discuss your compliance challenges and how we can work together.
Share this post
Daniel J Glover
IT Leader with experience spanning IT management, compliance, development, automation, AI, and project management. I write about technology, leadership, and building better systems.
Let's Work Together
Need expert IT consulting? Let's discuss how I can help your organisation.
Get in Touch