At a glance
- Client: Global network provider (carrier-scale footprint)
- Scope: SOC 2 Type 2 (Security, Availability, Confidentiality, Privacy attributes with emphasis on operations)
Problem
The organisation had strong engineering but inconsistent operational proof across access reviews, change control, vendor management, and incident processes. Prior audits created distraction and last-minute evidence hunts.
Approach
- Control design & mapping
- Mapped TSC to existing practices; clarified policy → procedure → evidence.
- Operational uplift
- Implemented update rings, rollback, and change approvals; formalised access recertification and SoD.
- Vendor & incident
- Standardised vendor DD, SLA/attestation tracking; established incident playbooks and exercises.
- Evidence automation
- Automated exportable samples (logs, approvals, tickets, vendor records) to a repeatable evidence register.
Outcome
- Clean SOC 2 Type 2 opinions across the 12-month period
- Predictable, low-friction evidence cycles; improved engineering focus
Key Results
- 65% faster time-to-evidence for samples (40+ categories)
- 18 legacy findings closed
- Mature vendor and incident cadences
What we delivered
- Control design and operating procedures
- Evidence register with scheduled exports
- Audit support, sample prep, and walkthroughs