Truvara is in Beta.
5 min read

Compliance Evidence Collection Checklist (SOC 2 / ISO 27001 dual)

Compliance Evidence Collection Checklist (SOC 2 / ISO 27001 dual)

Purpose & Scope:
This checklist structures evidence collection for SOC 2 Type II and ISO 27001 audits by mapping Trust Services Criteria and Annex A controls to specific artifacts. It ensures auditors receive complete, timely, and properly formatted evidence, reducing back-and-forth during audit fieldwork.

Instructions:
The evidence owner (typically the compliance officer or control owner) completes this checklist during each evidence collection cycle. Update the "Value" column with the actual evidence location or status before each audit request. Review and refresh evidence per the frequency indicated in the "Freshness Requirement" column.

Evidence Collection Template

#Control IDControl DescriptionEvidence RequiredFile Naming ConventionFreshness RequirementUpload LocationGuidanceValue
1CC1.1 / A.5.1Establishment of information security policiesApproved Information Security Policy documentpolicy_info-security_v[version]_[yyyy].pdfReviewed annually; version must be currentevidence/policies/Link to the latest board‑approved policy. Include version number and approval date.[Policy Document URL]
2CC1.2 / A.6.1Internal organization roles and responsibilitiesOrganizational chart showing security rolesorg-chart_security-[yyyy]-[mm].pdfUpdated quarterly or upon reorganizationevidence/organizational/Highlight roles with security accountability (e.g., CISO, IT manager).[Org Chart URL]
3CC2.1 / A.9.1User access provisioning processAccess provisioning workflow diagram + sample ticketaccess-provisioning_[system]_v[version].drawio<br>access-ticket-sample_[system]_[yyyy]-[mm]-[dd].pdfDiagram reviewed annually; sample ticket from last 30 daysevidence/access-control/Provide end‑to‑end process from request to revocation. Include separation of duties.[Workflow Diagram] <br> [Sample Ticket]
4CC2.2 / A.9.2User access review documentationAccess review reports for privileged/user accountsaccess-review_[system]_[yyyy]-[mm].xlsxConducted quarterly; report from most recent reviewevidence/access-control/Include reviewer name, date, account list, and action taken (retain/modify/remove).[Access Review Report]
5CC3.1 / A.12.1Change management procedureChange management policy + sample RFCchange-mgmt-policy_v[version].pdf<br>rfc-sample_[yyyy]-[mm]-[dd].pdfPolicy reviewed annually; RFC from last 30 daysevidence/change-management/Show how changes are requested, approved, tested, and documented.[Policy] <br> [Sample RFC]
6CC4.1 / A.12.4Logging and monitoring setupCentralized logging configuration + sample alertlogging-config_[system].yaml<br>alert-sample_[yyyy]-[mm]-[dd].txtConfiguration reviewed quarterly; alert from last 30 daysevidence/monitoring/Demonstrate collection of security‑relevant events (auth, firewall, AV).[Config File] <br> [Sample Alert]
7CC5.1 / A.12.6Vulnerability management processVulnerability scan report + remediation trackervuln-scan_[asset-type]_[yyyy]-[mm].pdf<br>remediation-tracker_[yyyy]-[mm].xlsxScans conducted monthly; tracker updated weeklyevidence/vulnerability/Include scan scope, severity ratings, remediation due dates, and status.[Scan Report] <br> [Tracker]
8CC6.1 / A.14.2Secure development lifecycleSDLC policy + threat model samplesdlc-policy_v[version].pdf<br>threat-model-sample_[feature]_[yyyy]-[mm].drawioPolicy reviewed annually; threat model from last major releaseevidence/application-security/Show how security is integrated into design, development, and testing phases.[Policy] <br> [Threat Model]
9CC7.1 / A.16.1Incident response procedureIR plan + tabletop exercise reportincident-response-plan_v[version].pdf<br>ir-tabletop-[scenario]_[yyyy]-[mm].pdfPlan reviewed annually; exercise conducted semi‑annuallyevidence/incident-response/Include roles, communication plan, and lessons learned from tests.[IR Plan] <br> [Tabletop Report]
10CC8.1 / A.18.2Compliance with legal requirementsRegulatory compliance matrixregulatory-matrix_[jurisdiction]_[yyyy].xlsxUpdated upon regulatory change or annuallyevidence/legal-compliance/Map applicable laws/regulations to controls and evidence of compliance.[Compliance Matrix]

Version: 1.0
Review Cycle: Quarterly (or as frameworks update)
Owner: Compliance Officer

Key Takeaways

  • Assign Clear Ownership: Designate a single evidence owner for each control to avoid gaps and duplication.
  • Use Consistent Naming: Follow the file‑naming conventions exactly; auditors love predictable, searchable files.
  • Mind Freshness: Track the “Freshness Requirement” column vigilantly—most items need quarterly or annual updates, so set calendar reminders.
  • Centralize Storage: Keep all artifacts in the prescribed evidence/ folders; a single shared drive or DLP‑protected repository works best.
  • Document Review Process: Record who reviewed each artifact and when, then attach that sign‑off to the “Value” field.
  • Run a Mock Review: Before the official audit, have an internal reviewer walk through the checklist to catch missing or outdated evidence.

Conclusion

A well‑maintained evidence collection checklist bridges the gap between your security controls and the auditor’s expectations. By mapping each SOC 2 and ISO 27001 requirement to a concrete artifact, you reduce the back‑and‑forth that typically drags audit timelines. Keep the checklist current, store files consistently, and revisit it each quarter—or whenever a framework update lands. Doing so not only smooths the audit process but also reinforces a culture of continuous compliance throughout the organization.

Next Steps:

  1. Schedule a quarterly review meeting with all control owners to verify that each “Value” entry reflects the latest evidence.
  2. Conduct a mock audit at least one month before the official audit window to surface any gaps early.
  3. Update the checklist whenever a new control is added or an existing standard is revised, and communicate those changes to the entire compliance team.

By treating this checklist as a living document rather than a static form, you’ll keep audits on track, minimize surprise requests, and demonstrate to stakeholders that security is an ongoing priority.