Skip to main content

SOC 2 Compliance

FieldValue
Document IDASCEND-COMP-003
Version2026.04
Last UpdatedApril 2026
AuthorAscend Engineering Team
PublisherOW-KAI Technologies Inc.
ClassificationEnterprise Client Documentation
ComplianceSOC 2 CC6.1/CC6.2, PCI-DSS 7.1/8.3, HIPAA 164.312, NIST 800-53 AC-2/SI-4

Reading Time: 8 minutes | Skill Level: Intermediate

Overview

ASCEND maintains SOC 2 Type II certification, demonstrating ongoing compliance with the AICPA Trust Services Criteria. Our platform provides the controls and evidence needed for your organization's SOC 2 audits.

Shared Responsibility

ASCEND provides technical controls that map to SOC 2 Trust Services Criteria. Customers remain responsible for their compliance program, including organizational controls and auditor engagement.

Trust Services Criteria

Security (CC6)

ControlDescriptionASCEND Implementation
CC6.1Logical access securityRBAC, API key management, MFA
CC6.2Access provisioningJIT provisioning, access reviews
CC6.3Access removalAuto-deprovisioning, offboarding
CC6.6External threatsWAF, DDoS protection, rate limiting
CC6.7Transmission protectionTLS 1.3, certificate pinning
CC6.8Malicious softwareInput validation, code scanning

Availability (A1)

ControlDescriptionASCEND Implementation
A1.1Capacity planningAuto-scaling, load balancing
A1.2Recovery proceduresMulti-region DR, automated backups
A1.3Recovery testingQuarterly DR tests

Confidentiality (C1)

ControlDescriptionASCEND Implementation
C1.1Data classificationAutomatic PII detection
C1.2Data protectionAES-256 encryption

Access Control Evidence

Generate Access Review Report

curl -X POST "https://pilot.owkai.app/api/compliance-export/exports" \
-H "Authorization: Bearer <admin_jwt>" \
-d '{
"framework": "soc2",
"report_type": "access_review",
"period_start": "2025-10-01",
"period_end": "2025-12-31",
"include_sections": [
"user_list",
"role_assignments",
"access_changes",
"terminated_users",
"privilege_escalations"
]
}'

User Access Report

{
"report_type": "access_review",
"period": "2025-Q4",
"summary": {
"total_users": 150,
"active_users": 145,
"new_users": 12,
"removed_users": 7,
"role_changes": 23
},
"users": [
{
"user_id": "user_001",
"email": "admin@company.com",
"role": "admin",
"created_at": "2024-06-15",
"last_login": "2025-12-15T09:00:00Z",
"mfa_enabled": true,
"access_changes": []
}
],
"removed_users": [
{
"user_id": "user_050",
"email": "former@company.com",
"removed_at": "2025-11-20",
"removal_reason": "termination",
"access_removed_within_24h": true
}
]
}

Change Management (CC8)

Configuration Changes

curl "https://pilot.owkai.app/api/audit/changes?category=configuration&days=90" \
-H "Authorization: Bearer <admin_jwt>"

Response:

{
"changes": [
{
"change_id": "chg_001",
"timestamp": "2025-12-10T14:30:00Z",
"change_type": "policy_update",
"changed_by": "admin@company.com",
"description": "Updated risk threshold from 80 to 75",
"before": {"auto_deny_threshold": 80},
"after": {"auto_deny_threshold": 75},
"approval": {
"approved_by": "security@company.com",
"approved_at": "2025-12-10T14:25:00Z"
}
}
]
}

Change Approval Workflow

All significant changes require approval:

┌─────────────┐     ┌─────────────┐     ┌─────────────┐
│ Change │────▶│ Review │────▶│ Deploy │
│ Request │ │ Approve │ │ Monitor │
└─────────────┘ └─────────────┘ └─────────────┘

Monitoring & Logging (CC7)

System Monitoring

curl "https://pilot.owkai.app/api/compliance/monitoring-status" \
-H "Authorization: Bearer <admin_jwt>"

Response:

{
"monitoring_status": "active",
"components": {
"api_monitoring": {"status": "healthy", "latency_p99_ms": 120},
"database_monitoring": {"status": "healthy", "connections": 45},
"security_monitoring": {"status": "healthy", "alerts_24h": 2}
},
"alerting": {
"channels_configured": 3,
"alerts_sent_30d": 15,
"avg_response_time_min": 8
}
}

Audit Log Integrity

curl "https://pilot.owkai.app/api/audit/integrity-check" \
-H "Authorization: Bearer <admin_jwt>" \
-d '{
"period_start": "2025-01-01",
"period_end": "2025-12-31"
}'

Response:

{
"integrity_status": "valid",
"records_checked": 1250000,
"hash_chain_valid": true,
"gaps_detected": 0,
"tampering_detected": false,
"last_verified": "2025-12-15T10:00:00Z"
}

Risk Assessment (CC3)

Risk Management Integration

curl "https://pilot.owkai.app/api/compliance/risk-assessment" \
-H "Authorization: Bearer <admin_jwt>"

Response:

{
"assessment_date": "2025-12-15",
"overall_risk_level": "low",
"categories": {
"access_control": {"risk": "low", "controls": 12, "effective": 12},
"data_protection": {"risk": "low", "controls": 8, "effective": 8},
"availability": {"risk": "low", "controls": 5, "effective": 5},
"change_management": {"risk": "low", "controls": 6, "effective": 6}
},
"open_findings": 0,
"remediation_in_progress": 0
}

Evidence Package

Generate SOC 2 Evidence Package

curl -X POST "https://pilot.owkai.app/api/compliance/evidence-pack" \
-H "Authorization: Bearer <admin_jwt>" \
-d '{
"framework": "soc2",
"audit_period": {
"start": "2025-01-01",
"end": "2025-12-31"
},
"control_categories": [
"CC6",
"CC7",
"CC8",
"A1",
"C1"
],
"include_artifacts": [
"access_reviews",
"change_logs",
"incident_reports",
"monitoring_reports",
"encryption_evidence",
"backup_verification"
]
}'

Evidence Package Contents

soc2_evidence_2025.zip
├── CC6_Access_Control/
│ ├── user_access_list.csv
│ ├── role_definitions.json
│ ├── access_reviews_q1-q4.pdf
│ └── terminated_user_report.csv
├── CC7_System_Operations/
│ ├── monitoring_dashboard_screenshots/
│ ├── alert_history.csv
│ └── incident_response_log.json
├── CC8_Change_Management/
│ ├── change_requests.csv
│ ├── deployment_log.json
│ └── approval_records.pdf
├── A1_Availability/
│ ├── uptime_report.pdf
│ ├── dr_test_results.pdf
│ └── backup_verification.json
└── C1_Confidentiality/
├── encryption_status.json
└── data_classification_policy.pdf

Continuous Compliance

Automated Control Testing

curl -X POST "https://pilot.owkai.app/api/compliance/test-controls" \
-H "Authorization: Bearer <admin_jwt>" \
-d '{
"framework": "soc2",
"controls": ["CC6.1", "CC6.2", "CC7.1"]
}'

Response:

{
"test_results": [
{
"control": "CC6.1",
"status": "pass",
"tests_run": 5,
"tests_passed": 5,
"evidence": ["All users have unique IDs", "MFA enabled for 100%"]
},
{
"control": "CC6.2",
"status": "pass",
"tests_run": 3,
"tests_passed": 3,
"evidence": ["Provisioning requires approval", "Access reviews completed"]
}
]
}

Auditor Portal

Configure Auditor Access

curl -X POST "https://pilot.owkai.app/api/compliance/auditor-access" \
-H "Authorization: Bearer <admin_jwt>" \
-d '{
"auditor_email": "auditor@auditfirm.com",
"audit_firm": "Big Four Audit LLP",
"access_start": "2026-01-15",
"access_end": "2026-02-28",
"permissions": [
"view_audit_logs",
"view_access_controls",
"export_evidence",
"view_configurations"
]
}'

Best Practices

1. Quarterly Reviews

  • Access reviews every quarter
  • Control testing monthly
  • Evidence collection ongoing

2. Continuous Monitoring

  • Real-time alerting for control failures
  • Automated compliance checks
  • Dashboard visibility

3. Documentation

  • Document all exceptions
  • Maintain remediation plans
  • Track control changes

Next Steps


Document Version: 2026.04 | Last Updated: April 2026