SOC 2 People Controls: The HR Work That Keeps the Auditor Happy
What SOC 2 actually asks of HR — access provisioning, background checks, training, terminations, separation of duties — and the evidence the auditor wants to…
On this page▾
- SOC 2 is a security audit, but ~30% of its controls live in HR systems.
- The control isn't the policy — it's the evidence the policy was followed every time.
- Provisioning, access reviews, background checks, security training, and offboarding are the big five HR-owned controls.
- Automate the evidence trail — manual screenshots are how companies fail SOC 2.
- Most SOC 2 findings are HR process gaps, not technology gaps.
SOC 2 is a security and operational trust audit issued under the AICPA framework. Buyers ask for it; vendors deliver it. What HR teams sometimes miss is that nearly a third of SOC 2 controls live in their territory — and most audit findings are not technology failures, they are HR process failures.
What SOC 2 really is
SOC 2 evaluates a company's controls against five 'Trust Services Criteria': security, availability, processing integrity, confidentiality, and privacy. Type I asks 'is the control designed well?' Type II asks 'did you operate it consistently over 6–12 months?' Type II is what most buyers want, and it's where HR's evidence discipline becomes decisive.
The HR-owned controls
- 1Joiner — access provisioningAccess granted based on role, approved by manager, provisioned within SLA, evidence of approval and timing retained.
- 2Mover — access changes on role changeWhen someone moves teams or gets promoted, access is re-reviewed. The old access doesn't quietly persist.
- 3Leaver — termination access removalAll access removed within a defined SLA (typically same-day for critical systems). Logged and reviewable.
- 4Background checksDocumented background check before access to production data. Scope appropriate to role and jurisdiction.
- 5Security trainingMandatory onboarding security training + annual refresher. Completion tracked per person.
What evidence the auditor wants
| Control claim | Evidence the auditor wants |
|---|---|
| Access is granted on approval | Ticket per access grant, with approver, timestamp, and granted scope |
| Access is removed on termination | Termination ticket linked to deprovisioning log; same-day timestamps |
| Background checks happen | Sample of recent hires with completed check on file before start date |
| Security training is annual | Completion log for every employee, refreshed annually |
| Quarterly access reviews | Quarterly export of access lists with manager sign-off |
Common SOC 2 HR failures
- Access reviews done in spreadsheets, signed off via email — auditor can't reconstruct timeline.
- Termination tickets created, but access lingers in less-monitored systems (analytics, marketing tools).
- Background checks happen but evidence isn't centrally stored — auditor can't sample.
- Security training run, but completion not enforced — exceptions multiply quietly.
- Contractor onboarding skipping checks 'because they're not full-time'. SOC 2 doesn't distinguish.
SOC 2 is not about whether you do the right thing. It is about whether you can prove you did the right thing every time. Build the evidence trail in the system, not in screenshots.
Read next
All playbooksThe principles, the legal bases for HR processing, the high-risk activities, and the discipline that keeps an HR function clean under GDPR, UK-GDPR, and the…
The documentation discipline that protects employees, managers, and the company in equal measure. What to write, when, in what system — and what never to put…
What an HRIS actually is, the build/buy/suite trade-off, the integration costs that ambush every decision, and a 30-day selection plan.