Ensure SOC 2 compliance

Cortex enables streamlined SOC 2 compliance by eliminating manual, spreadsheet-based tracking and connecting real time system data to control verification.

To improve consistency across your compliance tracking:

Create a SOC 2 Scorecard

Prerequisites

Before using this Scorecard template:

Step 1: Create the Scorecard and configure its basic settings

You can create a Scorecard in the Cortex UI, or you can add it to your workspace via GitOps or the Cortex API.

Create Scorecard in the Cortex UI

  1. On the Scorecards page in your workspace, click Create Scorecard.

  2. On the SOC-2 Compliance template, click Use.

  3. Configure basic settings, including the Scorecard's name, unique identifier, description, and more.

Step 2: Review and modify rules

Cortex's templated rules are based on common industry standards:

Level 1: Foundational Security
  • On-call is set oncall != null

  • Service has ownership ownership != null

  • TLS is enabled custom("tls_enabled") == true

  • Branch protection is set on default branch git.branchProtection("main") != null

  • PR approval is required to merge git.numOfRequiredApprovals() > 0

Level 2: Operational Compliance
  • Data retention policy linked links("document").filter((link) => link.name.matches("data-retention*")).length > 0

  • Vulnerability scan passing (medium & high) snyk.numOfIssues(severity=["HIGH", "CRITICAL", "MEDIUM"]) <= 0

  • Unit testing in place git.workflowRuns().filter((run) => run.name.matchesIn("Unit Test")).length > 0

Level 3: Advanced SOC 2 Maturity
  • Pen test linked links("pen-test").length > 0

  • Service included in Risk Assessment in last year custom("last_risk_assessment_date").fromNow() > duration("P1Y")

  • Vulnerability scan passing (low, medium, & high) snyk.numOfIssues(severity=["HIGH", "CRITICAL", "MEDIUM", "LOW"]) <= 0

You can reorder, delete, and edit rules, add more rules to a level, and assign more points to a rule to signify its importance. Behind each rule is a Cortex Query Language (CQL) query; you can edit the existing CQL or write your own queries to further refine your rules.

Create a SOC 2 Initiative

Follow the steps below to create an Initiative:

Create a SOC 2 Initiative

To motivate change by a certain deadline, you can create an Initiative:

  1. While viewing your SOC 2 Compliance Scorecard, click Create Initiative in the upper right.

  2. Configure the Initiative fields, including a descriptive name so your team members understand the purpose of the Initiative. For example, Ensure data retention policy is linked for all services.

    • Make sure to enable notifications so users are notified if an entity they own is failing the Initiative's goal.

  3. Save the Initiative.

After the Initiative is published, entity owners will be notified if their entity is not meeting the goal.

Learn more about creating Initiatives in the docs.

Measuring success

To understand progress of your Scorecard:

  • Ask Cortex MCP, "How is my SOC 2 Scorecard doing?" The MCP will respond with information on the entities that are failing rules and suggested next steps.

  • Review reports: The Bird's Eye report gives insight into how entities are performing against the Scorecard by visualizing the data as a heat map:

    The bird's eye report shows Scorecard progress as a heatmap.

You can also review your Engineering Intelligence metrics for impact on key engineering metrics, such as:

  • MTTR: With best practices in place, such as on-call rotation and ownership, you should see faster incident response.

  • Deployment frequency: Improved governance reduces rework and manual gates. Once baselines are set, you may see deployment frequency increasing.

Last updated

Was this helpful?