SOC 2 Type II Readiness Assessment
CODITECT Biosciences Quality Management System Platform
Document Control
Metadata
| Field | Value |
|---|---|
| Document ID | CODITECT-BIO-SOC2-RA-001 |
| Version | 1.0.0 |
| Status | Active |
| Effective Date | 2026-02-16 |
| Classification | Internal - Confidential |
| Owner | Chief Information Security Officer (CISO) + VP Engineering |
| Review Cycle | Quarterly (next review: 2026-05-16) |
| Audience | Board of Directors, Executive Leadership, Investors, Audit Committee |
Approval History
| Role | Name | Signature | Date |
|---|---|---|---|
| Chief Executive Officer | [Pending] | [Digital Signature] | YYYY-MM-DD |
| Chief Information Security Officer | [Pending] | [Digital Signature] | YYYY-MM-DD |
| VP Engineering | [Pending] | [Digital Signature] | YYYY-MM-DD |
| VP Quality Assurance | [Pending] | [Digital Signature] | YYYY-MM-DD |
| General Counsel | [Pending] | [Digital Signature] | YYYY-MM-DD |
Revision History
| Version | Date | Author | Changes | Approval Status |
|---|---|---|---|---|
| 1.0.0 | 2026-02-16 | CISO Office | Initial readiness assessment | Draft |
Distribution List
- Board of Directors
- Executive Leadership Team
- Audit Committee
- Compliance and Regulatory Affairs
- Information Security Team
- Quality Assurance Team
- Investor Relations (summary only)
- External Audit Partners (post-approval)
Executive Summary
Purpose
This SOC 2 Type II Readiness Assessment provides the Board of Directors, Executive Leadership, and Audit Committee with a comprehensive evaluation of CODITECT BIO-QMS platform's current compliance posture relative to the AICPA Trust Service Criteria (TSC). The assessment identifies gaps, quantifies remediation effort, and establishes a Type I and Type II audit roadmap with milestone dates and budget estimates.
Key Findings (Executive-Level Summary)
Overall Readiness: 68% (Moderate-High)
| Category | Status | Completion | Critical Gaps |
|---|---|---|---|
| Security (CC6, A1) | 🟢 Strong | 85% | None |
| Availability (A1) | 🟡 Moderate | 72% | Disaster recovery testing, capacity planning |
| Processing Integrity (PI1) | 🟢 Strong | 90% | None (leverages FDA Part 11 validation) |
| Confidentiality (C1) | 🟢 Strong | 88% | Data classification policy, DLP |
| Privacy (P1-P8) | 🟡 Moderate | 45% | Privacy program, consent management, DSAR automation |
| Common Criteria (CC1-CC5) | 🟡 Moderate | 65% | Risk assessment framework, change management formalization |
Investment Required:
- Type I Readiness (Q3 2026): $85K - $120K (gap closure + internal audit prep)
- Type I Audit (Q4 2026): $45K - $75K (CPA firm fees)
- Type II Observation Period (6 months): $30K - $50K (ongoing evidence collection)
- Type II Audit (Q2 2027): $65K - $95K (CPA firm fees)
- Total 12-Month Investment: $225K - $340K
Key Strengths:
- FDA 21 CFR Part 11 validation complete — Provides ~80% of Processing Integrity (PI1) controls
- HIPAA Security Rule compliance complete — Provides ~75% of Confidentiality (C1) and Security (A1) controls
- Cryptographic foundation mature — ECDSA P-256, AES-256-GCM, HSM integration, certificate chain architecture
- Audit trail system robust — Immutable hash-chain audit logs with cryptographic integrity verification
- Multi-tenancy isolation strong — Per-tenant encryption keys, database-level isolation, crypto-shredding on deletion
Critical Path to Type I (Q3 2026 Target):
-
P0 (Must fix before Type I audit):
- Formalize risk assessment framework (SSAE 18 compliant)
- Implement change management policy with CAB approval workflow
- Document system description for CPA auditor
- Privacy program establishment (if Privacy criterion in scope)
-
P1 (Should fix before Type I audit):
- Disaster recovery plan + tabletop test
- Vendor risk management program
- Security awareness training for all staff
- Evidence collection automation
Recommended Audit Firm Selection:
- Big 4 Option: Deloitte, PwC, EY, KPMG ($75K Type I, $95K Type II)
- Pros: Brand recognition for investor/customer trust, deep healthcare expertise
- Cons: Higher cost, longer engagement cycle
- Specialized Option: A-LIGN, Schellman, KirkpatrickPrice ($45K Type I, $65K Type II)
- Pros: SOC 2 specialization, faster turnaround, pragmatic approach
- Cons: Less brand recognition
Recommendation: Pursue specialized firm (A-LIGN or Schellman) for Type I to accelerate time-to-market, then reassess for Type II based on investor/customer requirements.
Timeline Summary
| Milestone | Target Date | Dependencies | Critical Path |
|---|---|---|---|
| Gap Closure Complete | 2026-06-30 | D.4.1-D.4.3, D.5.1-D.5.4 | ✅ |
| Internal Readiness Audit | 2026-07-15 | Gap closure, mock audit by CISO | ✅ |
| Type I Audit Fieldwork | 2026-08-01 to 2026-08-15 | Auditor engagement, system freeze | ✅ |
| Type I Report Issued | 2026-09-15 | Audit completion, management responses | ✅ |
| Type II Observation Period | 2026-09-16 to 2027-03-15 | 6 months operating effectiveness | ✅ |
| Type II Audit Fieldwork | 2027-03-16 to 2027-04-15 | Type II scope, evidence package | ✅ |
| Type II Report Issued | 2027-05-15 | Audit completion, final report | ✅ |
1. SOC 2 Framework Overview
1.1 Trust Service Criteria Hierarchy
The 2017 Trust Service Criteria (TSC) consist of:
Common Criteria (CC1-CC9) — Apply to ALL SOC 2 engagements:
- CC1: Control Environment
- CC2: Communication and Information
- CC3: Risk Assessment
- CC4: Monitoring Activities
- CC5: Control Activities
- CC6: Logical and Physical Access Controls
- CC7: System Operations
- CC8: Change Management
- CC9: Risk Mitigation
Category-Specific Criteria — Selected based on service commitments:
- Security (A1): 17 criteria — protection against unauthorized access
- Availability (A1): 5 criteria — system operational and usable as committed
- Processing Integrity (PI1): 3 criteria — processing complete, valid, accurate, timely, authorized
- Confidentiality (C1): 3 criteria — confidential information protected as committed
- Privacy (P1-P8): 54 criteria — personal information lifecycle management
1.2 Type I vs Type II Audits
| Aspect | Type I | Type II |
|---|---|---|
| Focus | Control design effectiveness | Control operating effectiveness |
| Timeline | Point-in-time (single date) | 6-12 month observation period |
| Testing | Walkthrough of controls | Sampling of control execution |
| Report Value | Demonstrates "we have controls" | Demonstrates "controls work consistently" |
| Duration | 2-4 weeks fieldwork | 3-6 weeks fieldwork |
| Cost | $45K-$75K | $65K-$95K |
| Customer Preference | Acceptable for early-stage | Preferred by enterprise customers |
Recommendation: Pursue Type I in Q3 2026 to accelerate GTM, then Type II in Q2 2027 for enterprise sales.
1.3 BIO-QMS Scope Definition
Recommended Scope for Initial SOC 2 Engagement:
In Scope:
- Security (A1): MANDATORY — All SaaS platforms must include Security
- Availability (A1): RECOMMENDED — 99.9% uptime SLA commitment
- Processing Integrity (PI1): RECOMMENDED — Core QMS validation workflows
- Confidentiality (C1): RECOMMENDED — PHI and proprietary data handling
Out of Scope (Defer to Future):
- Privacy (P1-P8): DEFER — Only if explicit privacy commitments to customers; significant lift (54 criteria)
Rationale: Security + Availability + Processing Integrity + Confidentiality provides comprehensive coverage for healthcare SaaS without the 6-9 month delay that Privacy criteria would introduce.
2. Current State Assessment
2.1 Common Criteria (CC1-CC9) Maturity
CC1: Control Environment
Status: 🟡 Partial (55%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC1.1: Commitment to integrity and ethics | Partial | Code of Conduct exists (if org has one) | Formalize ethics policy, annual attestation |
| CC1.2: Board oversight | Partial | No formal Audit Committee yet | Establish Audit Committee or designate board oversight |
| CC1.3: Management structure and authorities | Implemented | Org chart, role definitions | None |
| CC1.4: Commitment to competence | Partial | Job descriptions exist | Define technical competency matrix, training requirements |
| CC1.5: Accountability and performance measures | Gap | No formal KPI framework | Define security/compliance KPIs, quarterly reviews |
Remediation Required:
- CC1.1: Draft and approve Code of Business Conduct and Ethics ($5K legal review, 2 weeks)
- CC1.2: Establish Audit Committee charter or Board resolution delegating oversight (1 week)
- CC1.4: Document technical competency matrix for security/engineering roles (1 week)
- CC1.5: Define compliance KPI dashboard (integrate with D.5.3 Compliance Dashboard) (2 weeks)
Effort: 2 weeks FTE + $5K legal fees
CC2: Communication and Information
Status: 🟡 Partial (70%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC2.1: Quality information | Implemented | JIRA, Slack, documentation repositories | None |
| CC2.2: Internal communication | Implemented | Slack channels, all-hands, sprint planning | Formalize security incident communication protocol |
| CC2.3: External communication | Partial | Customer support ticketing | Service status page, breach notification procedures |
Remediation Required:
- CC2.2: Document security incident communication plan (internal escalation tree) (1 week)
- CC2.3: Implement status page (statuspage.io or similar, $29/month) + breach notification workflow (2 weeks)
Effort: 3 weeks FTE + $29/month SaaS
CC3: Risk Assessment
Status: 🔴 Gap (35%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC3.1: Risk identification | Partial | Ad-hoc threat modeling | Formalize enterprise risk assessment process (SSAE 18 compliant) |
| CC3.2: Risk analysis and prioritization | Gap | No formal risk register | Create and maintain risk register with likelihood/impact scoring |
| CC3.3: Risk response | Partial | Security controls exist | Document risk treatment decisions (accept/mitigate/transfer/avoid) |
| CC3.4: Fraud risk assessment | Gap | No formal fraud risk assessment | Conduct fraud risk assessment (insider threat, payment fraud, identity fraud) |
Remediation Required (P0 - Critical):
- CC3.1: Implement annual risk assessment process per SSAE 18 (3 weeks, engage consultant $15K)
- CC3.2: Create risk register in GRC tool or spreadsheet (1 week)
- CC3.3: Document risk treatment plan for top 20 risks (2 weeks)
- CC3.4: Conduct fraud risk assessment workshop (1 day, $5K consultant)
Effort: 6 weeks FTE + $20K consulting fees
Note: This is the SINGLE BIGGEST GAP for SOC 2 readiness. CC3 is heavily scrutinized by auditors.
CC4: Monitoring Activities
Status: 🟡 Partial (60%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC4.1: Ongoing and separate evaluations | Partial | GCP Security Command Center, Dependabot | Formalize quarterly control testing schedule |
| CC4.2: Evaluation and communication of deficiencies | Partial | JIRA for security bugs | Formalize deficiency escalation and remediation tracking |
Remediation Required:
- CC4.1: Create quarterly internal control testing schedule (D.4.2 monitoring integration) (1 week)
- CC4.2: Implement security deficiency tracking workflow in JIRA with SLA (1 week)
Effort: 2 weeks FTE
CC5: Control Activities
Status: 🟢 Strong (80%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC5.1: Selection and development of controls | Implemented | Security architecture, encryption, access controls | Document control selection rationale |
| CC5.2: Technology general controls | Implemented | IAM, MFA, encryption, audit logging | None |
| CC5.3: Policies and procedures | Partial | Security policies exist | Consolidate into formal policy library with version control |
Remediation Required:
- CC5.1: Document control selection rationale for each TSC criterion (2 weeks)
- CC5.3: Organize policy library with annual review schedule (1 week)
Effort: 3 weeks FTE
CC6: Logical and Physical Access Controls
Status: 🟢 Strong (85%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC6.1: Logical access controls | Implemented | Google Workspace SSO, MFA, RBAC | None (leverages D.3.1 HIPAA access controls) |
| CC6.2: Privilege escalation | Implemented | Sudo logging, break-glass procedures | None |
| CC6.3: Removal of access | Implemented | Offboarding checklist | Automate access removal via HR system integration |
| CC6.4: Physical access controls | N/A | Cloud-only SaaS | Verify GCP datacenter SOC 2 reports |
| CC6.5: Data at rest protection | Implemented | AES-256-GCM, per-tenant keys, HSM | None (D.1 cryptographic controls) |
| CC6.6: Data in transit protection | Implemented | TLS 1.3, HSTS, certificate pinning | None (D.1 cryptographic controls) |
| CC6.7: Data disposal | Partial | Crypto-shredding on tenant deletion | Document retention policy, secure deletion procedures |
Remediation Required:
- CC6.3: Implement HR system webhook to auto-revoke access on termination (1 week)
- CC6.4: Obtain GCP SOC 2 reports and map controls to BIO-QMS (1 week)
- CC6.7: Formalize data retention and deletion policy (1 week, $5K legal review)
Effort: 3 weeks FTE + $5K legal fees
CC7: System Operations
Status: 🟡 Partial (72%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC7.1: Detection of system failures | Implemented | GCP monitoring, Prometheus, Grafana | None |
| CC7.2: Response to system failures | Partial | On-call rotation, runbooks | Formalize incident response plan, conduct tabletop test |
| CC7.3: System capacity management | Gap | No formal capacity planning | Implement capacity planning process (CPU, memory, storage forecasts) |
| CC7.4: System backups | Implemented | GCS snapshots, PITR for databases | Test backup restoration quarterly |
| CC7.5: Vulnerability management | Implemented | Dependabot, Trivy, quarterly scans | None |
Remediation Required:
- CC7.2: Document incident response plan (IRP) with roles, escalation tree, tabletop test (2 weeks)
- CC7.3: Implement capacity planning dashboard (CPU/mem/storage growth trends, 6-month forecast) (2 weeks)
- CC7.4: Schedule quarterly backup restoration tests (1 day per quarter)
Effort: 4 weeks FTE + ongoing quarterly testing
CC8: Change Management
Status: 🟡 Partial (65%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC8.1: Authorization of changes | Partial | GitHub PR approvals | Formalize Change Advisory Board (CAB) for production changes |
| CC8.2: System development lifecycle | Implemented | Sprint planning, code review, CI/CD | None |
| CC8.3: Infrastructure and software maintenance | Implemented | Dependabot, OS patching, Kubernetes version upgrades | None |
| CC8.4: Segregation of duties | Implemented | Developers cannot deploy to production | None |
Remediation Required (P0):
- CC8.1: Establish Change Advisory Board (CAB) with weekly meetings, change request template, approval workflow (2 weeks)
- CAB Members: VP Engineering (chair), CISO, SRE Lead, QA Lead
- Approval Thresholds: Standard (auto-approve), Normal (CAB approval), Emergency (post-implementation review)
Effort: 2 weeks FTE
CC9: Risk Mitigation
Status: 🟡 Partial (70%)
| Control | Current State | Evidence | Gap |
|---|---|---|---|
| CC9.1: Identification of risk of business disruption | Partial | Disaster recovery plan exists (partial) | Complete DR plan, test failover quarterly |
| CC9.2: Mitigation of risk of business disruption | Gap | No tested DR runbook | Conduct DR tabletop test, document RTO/RPO |
| CC9.3: Vendor risk management | Partial | Vendor contracts reviewed by legal | Formalize third-party risk assessment process |
Remediation Required:
- CC9.1: Complete disaster recovery plan with RTO (4 hours) and RPO (1 hour) targets (2 weeks)
- CC9.2: Conduct DR tabletop exercise with SRE team (1 day)
- CC9.3: Implement vendor risk assessment questionnaire (SIG Lite or custom) (1 week)
Effort: 3 weeks FTE + 1 day DR test
2.2 Security Criterion (A1) Maturity
Status: 🟢 Strong (85%)
| TSC Point | Description | Current State | Evidence | Gap |
|---|---|---|---|---|
| A1.1 | Unauthorized access prevented | Implemented | RBAC, MFA, SSO, network segmentation | None |
| A1.2 | Logical access controls | Implemented | D.3.1 HIPAA access controls | None |
| A1.3 | Data loss prevention | Partial | TLS, encryption at rest | Implement DLP tools for PHI exfiltration prevention |
| A1.4 | Intrusion detection | Partial | GCP Security Command Center | Deploy HIDS/NIDS (Falco or Wazuh) |
Remediation Required:
- A1.3: Evaluate DLP solutions (Google DLP API or Nightfall AI) and implement PHI detection rules (3 weeks, $500/month SaaS)
- A1.4: Deploy Falco for runtime threat detection on GKE (2 weeks)
Effort: 5 weeks FTE + $500/month SaaS
Strengths:
- Leverages complete HIPAA Security Rule implementation (D.3)
- Cryptographic controls mature (D.1)
- Multi-factor authentication enforced
- Per-tenant data isolation with crypto-shredding
2.3 Availability Criterion (A1) Maturity
Status: 🟡 Moderate (72%)
| TSC Point | Description | Current State | Evidence | Gap |
|---|---|---|---|---|
| A1.1 | Availability commitments | Partial | 99.9% SLA documented | Measure and report uptime monthly |
| A1.2 | System monitoring | Implemented | GCP Monitoring, Prometheus, Grafana, PagerDuty | None |
| A1.3 | Incident response | Partial | On-call rotation, runbooks | Formalize IRP (see CC7.2) |
| A1.4 | Disaster recovery | Gap | No tested DR plan | Complete DR plan + quarterly tests (see CC9.1-CC9.2) |
| A1.5 | Capacity management | Gap | No formal capacity planning | Implement capacity forecasting (see CC7.3) |
Remediation Required:
- A1.1: Implement uptime monitoring dashboard (Pingdom or UptimeRobot, $15/month) with monthly SLA reports (1 week)
- A1.3: Formalize incident response plan (see CC7.2) (2 weeks)
- A1.4: Complete DR plan and conduct quarterly tests (see CC9.1-CC9.2) (3 weeks)
- A1.5: Implement capacity planning (see CC7.3) (2 weeks)
Effort: 8 weeks FTE + $15/month SaaS
Strengths:
- Kubernetes high availability (3 replicas per service)
- Multi-zone deployment in GCP
- Automated health checks and pod restarts
2.4 Processing Integrity Criterion (PI1) Maturity
Status: 🟢 Strong (90%)
| TSC Point | Description | Current State | Evidence | Gap |
|---|---|---|---|---|
| PI1.1 | Processing complete | Implemented | FDA Part 11 validation (D.2) | None |
| PI1.2 | Processing accurate | Implemented | IQ/OQ/PQ validation, data integrity checks | None |
| PI1.3 | Processing timely | Implemented | SLA monitoring, queue depth alerts | None |
| PI1.4 | Processing authorized | Implemented | E-signature controls, RBAC, audit trail | None |
| PI1.5 | Error handling | Implemented | Exception logging, validation error reporting | None |
Remediation Required: None — FDA 21 CFR Part 11 validation provides comprehensive coverage.
Effort: 0 weeks
Strengths:
- Complete FDA 21 CFR Part 11 validation (D.2) with IQ/OQ/PQ protocols
- Electronic signature controls with non-repudiation (D.2.3)
- Immutable audit trail with hash chain integrity (D.5.1 planned)
- Data validation rules enforced at API and database layers
- Error handling with user-friendly validation feedback
Note: This is the STRONGEST category due to FDA Part 11 overlap. Auditors will leverage existing validation documentation.
2.5 Confidentiality Criterion (C1) Maturity
Status: 🟢 Strong (88%)
| TSC Point | Description | Current State | Evidence | Gap |
|---|---|---|---|---|
| C1.1 | Confidential information protected | Implemented | HIPAA encryption controls (D.3.2) | None |
| C1.2 | Data classification | Partial | PHI vs non-PHI distinction | Formalize data classification policy (Public/Internal/Confidential/Restricted) |
| C1.3 | Encryption at rest | Implemented | AES-256-GCM, per-tenant keys, HSM (D.1) | None |
| C1.4 | Encryption in transit | Implemented | TLS 1.3, HSTS, certificate pinning (D.1) | None |
| C1.5 | Data masking | Partial | PHI redacted in logs | Implement field-level masking in UI for non-authorized users |
Remediation Required:
- C1.2: Formalize data classification policy with labeling requirements (1 week, $3K legal review)
- C1.5: Implement UI-level PHI masking for users without PHI access (2 weeks)
Effort: 3 weeks FTE + $3K legal fees
Strengths:
- HIPAA encryption controls complete (D.3.2)
- Cryptographic foundation mature (D.1)
- Per-tenant encryption keys with crypto-shredding
- PHI access controls with minimum necessary principle
2.6 Privacy Criteria (P1-P8) Maturity
Status: 🟡 Moderate-Low (45%) — DEFERRED SCOPE RECOMMENDATION
| TSC Point | Description | Current State | Evidence | Gap |
|---|---|---|---|---|
| P1: Notice and communication | Partial | Privacy policy exists (if drafted) | Privacy notice, consent management UI | |
| P2: Choice and consent | Gap | No consent management | Consent opt-in/opt-out workflows | |
| P3: Collection | Partial | Data minimization in design | Formalize collection limitation policy | |
| P4: Use, retention, disposal | Partial | Retention policy exists (partial) | Complete retention schedule, automated deletion | |
| P5: Access | Gap | No DSAR portal | Data Subject Access Request (DSAR) automation | |
| P6: Disclosure to third parties | Partial | Vendor contracts reviewed | Third-party data sharing inventory | |
| P7: Quality | Implemented | Data validation, accuracy controls | None | |
| P8: Monitoring and enforcement | Gap | No privacy program | Appoint Privacy Officer, privacy training |
Remediation Required (IF PRIVACY IN SCOPE):
- P1: Draft privacy notice, implement consent management UI (4 weeks + $10K legal fees)
- P2: Build consent opt-in/opt-out workflows with audit trail (3 weeks)
- P3: Formalize data collection limitation policy (1 week)
- P4: Complete retention schedule, implement automated deletion (3 weeks)
- P5: Build DSAR portal (data export, rectification, deletion requests) (6 weeks)
- P6: Create third-party data sharing inventory (1 week)
- P8: Appoint Privacy Officer, conduct privacy training (2 weeks)
Total Effort (IF PRIVACY IN SCOPE): 20 weeks FTE + $10K legal fees + 6-9 month delay
RECOMMENDATION: DEFER Privacy criteria to future SOC 2 engagement. Focus initial audit on Security + Availability + Processing Integrity + Confidentiality. Add Privacy only if contractually required by customers.
3. Gap Analysis Summary
3.1 Overall Control Maturity
| TSC Category | Total Controls | Implemented | Partial | Gap | Maturity % |
|---|---|---|---|---|---|
| CC1: Control Environment | 5 | 1 | 3 | 1 | 55% |
| CC2: Communication | 3 | 2 | 1 | 0 | 70% |
| CC3: Risk Assessment | 4 | 0 | 2 | 2 | 35% |
| CC4: Monitoring | 2 | 0 | 2 | 0 | 60% |
| CC5: Control Activities | 3 | 2 | 1 | 0 | 80% |
| CC6: Access Controls | 7 | 5 | 2 | 0 | 85% |
| CC7: System Operations | 5 | 2 | 2 | 1 | 72% |
| CC8: Change Management | 4 | 3 | 1 | 0 | 65% |
| CC9: Risk Mitigation | 3 | 0 | 2 | 1 | 70% |
| Security (A1) | 4 | 2 | 2 | 0 | 85% |
| Availability (A1) | 5 | 1 | 3 | 1 | 72% |
| Processing Integrity (PI1) | 5 | 5 | 0 | 0 | 90% |
| Confidentiality (C1) | 5 | 3 | 2 | 0 | 88% |
| Privacy (P1-P8) | 8 | 1 | 4 | 3 | 45% |
| OVERALL (exc. Privacy) | 50 | 26 | 21 | 3 | 68% |
| OVERALL (inc. Privacy) | 58 | 27 | 25 | 6 | 63% |
3.2 Critical Gaps (P0 — Must Fix Before Type I Audit)
| Gap ID | TSC | Description | Effort | Cost | Owner | Target Date |
|---|---|---|---|---|---|---|
| G-001 | CC3.1 | Formalize risk assessment framework (SSAE 18) | 6 weeks | $20K | CISO | 2026-05-15 |
| G-002 | CC8.1 | Establish Change Advisory Board (CAB) | 2 weeks | $0 | VP Eng | 2026-04-30 |
| G-003 | CC9.1 | Complete disaster recovery plan | 2 weeks | $0 | SRE Lead | 2026-05-30 |
| G-004 | CC9.2 | Conduct DR tabletop test | 1 day | $0 | SRE Lead | 2026-06-15 |
| G-005 | CC7.3 | Implement capacity planning process | 2 weeks | $0 | SRE Lead | 2026-05-30 |
| G-006 | — | System description for auditor | 3 weeks | $0 | CISO + VP Eng | 2026-06-30 |
| G-007 | — | Management assertion letter | 1 week | $5K | Legal + CISO | 2026-07-15 |
Total P0 Effort: 16.2 weeks FTE + $25K
3.3 High-Priority Gaps (P1 — Should Fix Before Type I Audit)
| Gap ID | TSC | Description | Effort | Cost | Owner | Target Date |
|---|---|---|---|---|---|---|
| G-101 | CC1.1 | Code of Conduct and Ethics policy | 2 weeks | $5K | Legal | 2026-05-15 |
| G-102 | CC1.5 | Compliance KPI dashboard | 2 weeks | $0 | CISO | 2026-06-15 |
| G-103 | CC2.3 | Service status page + breach notification | 2 weeks | $29/mo | VP Eng | 2026-05-30 |
| G-104 | CC6.3 | Automate access removal via HR integration | 1 week | $0 | IT | 2026-06-15 |
| G-105 | CC6.7 | Data retention and deletion policy | 1 week | $5K | Legal | 2026-05-30 |
| G-106 | CC7.2 | Formalize incident response plan | 2 weeks | $0 | CISO | 2026-06-15 |
| G-107 | CC9.3 | Vendor risk assessment process | 1 week | $0 | CISO | 2026-06-30 |
| G-108 | A1.1 | Uptime monitoring and SLA reporting | 1 week | $15/mo | SRE | 2026-05-30 |
| G-109 | A1.3 | DLP for PHI exfiltration prevention | 3 weeks | $500/mo | CISO | 2026-06-30 |
| G-110 | C1.2 | Data classification policy | 1 week | $3K | Legal + CISO | 2026-05-30 |
| G-111 | D.4.3 | Evidence collection automation | 3 weeks | $0 | CISO | 2026-06-30 |
Total P1 Effort: 19 weeks FTE + $13K + $544/month SaaS
3.4 Medium-Priority Gaps (P2 — Nice to Have)
| Gap ID | TSC | Description | Effort | Cost | Owner | Target Date |
|---|---|---|---|---|---|---|
| G-201 | CC1.2 | Establish Audit Committee | 1 week | $0 | Board | 2026-06-30 |
| G-202 | CC1.4 | Technical competency matrix | 1 week | $0 | HR + VP Eng | 2026-06-30 |
| G-203 | CC5.1 | Document control selection rationale | 2 weeks | $0 | CISO | 2026-07-15 |
| G-204 | A1.4 | Deploy Falco HIDS/NIDS | 2 weeks | $0 | SRE | 2026-07-15 |
| G-205 | C1.5 | UI-level PHI masking | 2 weeks | $0 | Frontend | 2026-07-15 |
Total P2 Effort: 8 weeks FTE + $0
4. Remediation Plan
4.1 Remediation Timeline (Gantt Format)
2026 Timeline Mar Apr May Jun Jul Aug Sep
────────────────────────────────────────────────────────────────────────────
P0 CRITICAL PATH
G-001 Risk Assessment ████████████████
G-002 CAB Establishment ████████
G-003 DR Plan ████████
G-004 DR Tabletop Test ██
G-005 Capacity Planning ████████
G-006 System Description ████████████████
G-007 Management Assertion ████████
P1 HIGH PRIORITY
G-101 Code of Conduct ████████
G-102 Compliance KPIs ████████
G-103 Status Page ████████
G-104 HR Access Integration ████
G-105 Retention Policy ████
G-106 Incident Response Plan ████████
G-107 Vendor Risk Mgmt ████
G-108 Uptime Monitoring ████
G-109 DLP Implementation ████████████
G-110 Data Classification ████
G-111 Evidence Automation ████████████
P2 MEDIUM PRIORITY
G-201 Audit Committee ████
G-202 Competency Matrix ████
G-203 Control Rationale ████████
G-204 Falco Deployment ████████
G-205 PHI Masking ████████
AUDIT MILESTONES
Internal Readiness Audit ████
Type I Audit Fieldwork ████████
Type I Report Issued ██
4.2 Resource Allocation
FTE Requirements by Month:
| Month | P0 FTE | P1 FTE | P2 FTE | Total FTE | Key Deliverables |
|---|---|---|---|---|---|
| Mar 2026 | 1.5 | 0.5 | 0 | 2.0 | Risk assessment kickoff, CAB charter |
| Apr 2026 | 1.5 | 1.0 | 0 | 2.5 | Risk assessment complete, Code of Conduct |
| May 2026 | 1.0 | 1.5 | 0.5 | 3.0 | DR plan, capacity planning, policies |
| Jun 2026 | 1.5 | 1.5 | 0.5 | 3.5 | System description, DLP, evidence automation |
| Jul 2026 | 0.5 | 0 | 1.0 | 1.5 | Management assertion, P2 tasks, internal audit |
| Aug 2026 | 0 | 0 | 0 | 0 | Type I audit fieldwork (respond to auditor requests) |
Total Effort: 43.2 FTE-weeks (1.08 FTE over 5 months)
Recommended Team:
- CISO (50% allocation): Risk assessment, incident response, DLP, evidence automation
- SRE Lead (30% allocation): DR plan, capacity planning, uptime monitoring, Falco
- Security Engineer (40% allocation): CAB process, policies, control documentation
- Legal Counsel (10% allocation): Code of Conduct, retention policy, data classification, management assertion
- VP Engineering (10% allocation): CAB chair, system description, change management
External Consulting:
- Risk Assessment Consultant: $20K (6-week engagement, SSAE 18 framework)
- Legal Review: $13K (Code of Conduct $5K, retention policy $5K, data classification $3K)
4.3 Budget Summary
| Category | Item | Cost | Timeline |
|---|---|---|---|
| P0 Gaps | Risk assessment consultant | $20,000 | Mar-May 2026 |
| Management assertion legal review | $5,000 | Jul 2026 | |
| P1 Gaps | Code of Conduct legal review | $5,000 | Apr 2026 |
| Data retention policy legal review | $5,000 | May 2026 | |
| Data classification policy legal review | $3,000 | May 2026 | |
| Status page (statuspage.io) | $348/yr | May 2026 | |
| Uptime monitoring (UptimeRobot) | $180/yr | May 2026 | |
| DLP solution (Nightfall AI or GCP DLP) | $6,000/yr | Jun 2026 | |
| Internal Costs | CISO + SRE + Security Eng salaries | (existing) | Mar-Jul 2026 |
| Type I Audit | CPA firm fees (specialized) | $45,000 | Aug 2026 |
| CPA firm fees (Big 4, if chosen) | $75,000 | Aug 2026 | |
| Type II Observation | Evidence collection tooling | $3,000 | Sep 2026-Mar 2027 |
| Ongoing control testing | (existing) | Sep 2026-Mar 2027 | |
| Type II Audit | CPA firm fees (specialized) | $65,000 | Apr 2027 |
| CPA firm fees (Big 4, if chosen) | $95,000 | Apr 2027 |
Total Investment (Specialized Audit Firm Path):
- Gap Closure: $38K + $6.5K/yr SaaS = $44.5K
- Type I Audit: $45K
- Type II Audit: $65K
- 12-Month Total: $154.5K
Total Investment (Big 4 Audit Firm Path):
- Gap Closure: $44.5K
- Type I Audit: $75K
- Type II Audit: $95K
- 12-Month Total: $214.5K
Recommended: Specialized firm path ($154.5K total) for faster time-to-market.
5. Pre-Audit Documentation Package
5.1 System Description (REQUIRED)
Purpose: Provides auditor with comprehensive understanding of the BIO-QMS platform architecture, boundaries, and control environment.
Template Outline:
1. Company Overview
- Business Model: B2B SaaS for biosciences quality management
- Customer Base: Biotech, pharmaceuticals, CROs, medical device manufacturers
- Service Commitments: 99.9% uptime, SOC 2 Security + Availability + Processing Integrity + Confidentiality
- Regulatory Context: FDA 21 CFR Part 11, HIPAA, cGMP, ISO 13485 (customer-specific)
2. System Boundaries
- In Scope:
- BIO-QMS web application (React + TypeScript frontend)
- Django REST API backend (Python 3.11)
- PostgreSQL database (Google Cloud SQL)
- GCS object storage (documents, attachments)
- GKE compute infrastructure
- CI/CD pipeline (GitHub Actions, Google Cloud Build)
- Monitoring stack (Prometheus, Grafana, PagerDuty)
- Out of Scope:
- GCP datacenter physical security (relies on GCP SOC 2)
- Third-party SaaS tools (Google Workspace, Slack, JIRA) — complementary controls
- Customer-managed data (customers responsible for user access management)
3. Infrastructure Architecture
- Cloud Provider: Google Cloud Platform (us-central1 region, multi-zone)
- Compute: Google Kubernetes Engine (GKE Autopilot)
- Database: Cloud SQL for PostgreSQL 15 (HA configuration)
- Storage: Google Cloud Storage (regional, versioned buckets)
- Network: VPC with private subnets, Cloud NAT, Cloud Armor WAF
- CDN: Cloud CDN for static assets
- DNS: Cloud DNS with DNSSEC
4. Application Architecture
- Frontend: React 18, TypeScript, React Router, Material-UI
- API: Django 4.2, Django REST Framework, Gunicorn + Uvicorn ASGI
- Authentication: Google Workspace SSO (SAML 2.0), optional customer SSO (SAML/OIDC)
- Authorization: Role-Based Access Control (RBAC) with 12 roles, 87 permissions
- Data Model: Multi-tenant (per-organization database schemas + encryption keys)
- Queue: Cloud Tasks for async workflows (e-signature notifications, report generation)
5. Security Architecture
- Encryption at Rest: AES-256-GCM (GCP default + application-level per-tenant keys)
- Encryption in Transit: TLS 1.3 (minimum), HSTS, certificate pinning
- Key Management: Google Cloud KMS + planned HSM for signing keys
- Authentication: MFA enforced (TOTP or hardware tokens)
- Session Management: 15-minute idle timeout, secure cookies (HttpOnly, Secure, SameSite)
- Audit Logging: Immutable audit trail with hash chain integrity verification
6. Control Environment
- Organizational Structure: CEO → CISO, VP Engineering, VP QA
- Change Management: CAB approval for production changes, GitHub PR + code review
- Monitoring: 24/7 on-call rotation, PagerDuty escalation, runbooks
- Vendor Management: Quarterly vendor reviews, SOC 2 report collection
- Incident Response: Incident response plan with defined roles, escalation tree
7. Complementary User Entity Controls (CUECs)
- User Access Management: Customers responsible for granting/revoking user access within their organization
- Data Backup Verification: Customers should test restoration of critical data exports
- Network Security: Customers should enforce IP whitelisting (if required)
- Training: Customers should train users on electronic signature policies
8. Subservice Organizations
- Google Cloud Platform: Infrastructure (compute, database, storage, network)
- SOC 2 Report: Available (include in auditor package)
- Carve-Out Method: BIO-QMS SOC 2 report references GCP SOC 2 controls
- PagerDuty: Incident alerting and on-call scheduling
- SOC 2 Report: Available
- Stripe (if payment processing): Payment processing for subscriptions
- PCI DSS Attestation: Available
Effort to Create: 3 weeks (CISO + VP Engineering collaboration)
5.2 Control Environment Description
Purpose: Describes the governance, risk, and compliance (GRC) framework supporting SOC 2 controls.
Content:
- Governance Structure: Board oversight, executive responsibilities, Audit Committee (or equivalent)
- Risk Assessment Process: Annual enterprise risk assessment, risk register, treatment plans
- Policy Framework: Security policy, acceptable use policy, incident response policy, change management policy, data classification policy
- Change Management: CAB charter, change request workflow, emergency change procedures
- Monitoring and Testing: Quarterly internal control testing, vulnerability scanning, penetration testing
- Vendor Management: Third-party risk assessment, SOC 2 report reviews, contract security provisions
- Training and Awareness: Annual security awareness training, phishing simulations, onboarding security training
Effort to Create: 2 weeks (CISO)
5.3 Risk Assessment Methodology
Purpose: Documents the risk assessment process used to identify, analyze, and respond to risks.
Content (SSAE 18 Compliant):
1. Risk Identification
- Sources: Threat modeling workshops, vulnerability scans, penetration tests, industry threat intelligence, regulatory changes
- Risk Categories: Strategic, operational, financial, compliance, reputational, technology
2. Risk Analysis
- Likelihood Scoring: 1 (Rare) to 5 (Almost Certain)
- Impact Scoring: 1 (Negligible) to 5 (Catastrophic)
- Risk Score: Likelihood × Impact (1-25 scale)
- Risk Appetite: Risk score 1-9 (acceptable), 10-15 (monitor), 16-25 (treat)
3. Risk Response
- Accept: Risk score < 10, document acceptance rationale
- Mitigate: Implement controls to reduce likelihood or impact
- Transfer: Cyber insurance, vendor indemnification clauses
- Avoid: Discontinue risky activities or services
4. Risk Register
- Fields: Risk ID, description, owner, likelihood, impact, score, response, status, review date
- Quarterly Review: Risk owner updates status, CISO reviews
5. Documentation
- Annual Risk Assessment Report: Summary of risk landscape, top 10 risks, treatment status
- Board Reporting: Quarterly risk dashboard presented to Board
Effort to Create: 6 weeks (CISO + external consultant $20K)
5.4 Management Assertion Letter
Purpose: Formal statement from management that controls are designed and operating effectively.
Template:
[Date]
To [CPA Audit Firm Name]:
AZ1.AI Inc. ("the Company") management is responsible for designing, implementing, and
operating effective controls within the CODITECT Biosciences Quality Management System
(BIO-QMS) Platform (the "System") to provide reasonable assurance that the Trust Service
Criteria relevant to Security, Availability, Processing Integrity, and Confidentiality
(applicable criteria) were achieved throughout the period [Start Date] to [End Date]
(the "Period").
Management has performed an assessment of the controls within the System and has concluded
that the controls were suitably designed and operating effectively to meet the applicable
Trust Service Criteria throughout the Period, except for [list any exceptions, or state "none"].
Management has provided [CPA Firm Name] with:
1. Access to all information relevant to the System and controls
2. Additional information requested for the purposes of the examination
3. Unrestricted access to persons within the entity from whom the auditor determined
it necessary to obtain evidence
Management acknowledges responsibility for:
- Designing, implementing, and operating effective controls
- Providing complete and accurate descriptions of the System
- Identifying risks that threaten achievement of the Trust Service Criteria
- Monitoring the effectiveness of controls on an ongoing basis
- Selecting and implementing complementary user entity controls (CUECs)
- Remediating deficiencies identified during the examination
Sincerely,
_______________________
[CEO Name], Chief Executive Officer
_______________________
[CISO Name], Chief Information Security Officer
_______________________
[VP Engineering Name], Vice President of Engineering
Effort to Create: 1 week (Legal + CISO, $5K legal review)
5.5 Complementary User Entity Controls (CUECs)
Purpose: Identifies controls that customers must implement for SOC 2 controls to be effective.
| CUEC ID | Control | Customer Responsibility | Impact if Not Implemented |
|---|---|---|---|
| CUEC-1 | User access management | Customers must grant/revoke user access based on job responsibilities | Unauthorized users may access system |
| CUEC-2 | Password complexity | Customers must enforce strong password policies for non-SSO users | Weak passwords may be compromised |
| CUEC-3 | Data backup verification | Customers should test restoration of data exports periodically | Inability to recover data in disaster scenario |
| CUEC-4 | IP whitelisting | Customers may restrict access to specific IP ranges (optional) | Unauthorized network access if not implemented |
| CUEC-5 | User training | Customers should train users on electronic signature policies and data handling | Users may misuse electronic signatures or mishandle PHI |
| CUEC-6 | Incident reporting | Customers should report suspected security incidents to CODITECT support | Delayed response to security incidents |
Note: CUECs are included in SOC 2 report and customer contracts. Customers receive annual reminder to review CUECs.
5.6 Subservice Organization Relationships
| Subservice | Service Provided | SOC 2 Report | Carve-Out or Inclusive |
|---|---|---|---|
| Google Cloud Platform | Infrastructure (compute, storage, network) | Available (request from GCP) | Carve-Out (BIO-QMS SOC 2 references GCP SOC 2) |
| PagerDuty | Incident alerting | Available (download from PagerDuty Trust Center) | Carve-Out |
| Stripe | Payment processing | PCI DSS Level 1 certified | Carve-Out |
| Google Workspace | Email, calendar, SSO | SOC 2 available | Carve-Out |
Action Required: Collect SOC 2 reports from all subservice organizations and review for relevant controls. Document how BIO-QMS relies on subservice controls in system description.
Effort: 1 week (CISO)
6. Auditor Preparation
6.1 Recommended SOC 2 Audit Firms
Big 4 Firms
| Firm | Pros | Cons | Estimated Cost |
|---|---|---|---|
| Deloitte | Brand recognition, healthcare expertise, global footprint | $$$$ expensive, slower engagement, may over-engineer | Type I: $75K, Type II: $95K |
| PwC | Strong SOC 2 practice, investor/customer trust, regulatory relationships | $$$$ expensive, long lead times | Type I: $70K, Type II: $90K |
| EY | Technology sector focus, startup-friendly, modern tools | $$$ expensive, less healthcare depth | Type I: $65K, Type II: $85K |
| KPMG | Healthcare and life sciences specialization, global compliance expertise | $$$ expensive, bureaucratic | Type I: $70K, Type II: $90K |
Specialized SOC 2 Firms
| Firm | Pros | Cons | Estimated Cost |
|---|---|---|---|
| A-LIGN | SOC 2 specialization, fast turnaround (4-6 weeks), pragmatic approach | Less brand recognition | Type I: $45K, Type II: $65K |
| Schellman | Healthcare focus, technology-friendly, good reputation in SaaS | Mid-tier brand | Type I: $50K, Type II: $70K |
| KirkpatrickPrice | Affordable, startup-friendly, fast engagement | Smaller firm, less global presence | Type I: $40K, Type II: $60K |
| Prescient Assurance | Modern tooling, developer-friendly, fast | Newer firm, less established | Type I: $40K, Type II: $60K |
Recommendation
Phase 1 (Type I — Q3 2026): Engage A-LIGN or Schellman
- Rationale:
- Faster time-to-market (4-6 week turnaround vs 8-12 weeks Big 4)
- Cost savings ($30K for Type I, $30K for Type II)
- SOC 2 specialization = pragmatic approach, less over-engineering
- Healthcare experience (Schellman especially)
- Risk: Less brand recognition with investors/customers
- Mitigation: Big 4 brand value diminishes rapidly in SaaS market; most customers accept any reputable CPA firm
Phase 2 (Type II — Q2 2027): Reassess based on customer requirements
- If enterprise customers require Big 4: Engage Deloitte or KPMG (healthcare expertise)
- If no Big 4 requirement: Continue with A-LIGN/Schellman (cost savings, relationship continuity)
6.2 Audit Scope Definition
Recommended Scope for Initial SOC 2 Type I:
Trust Service Criteria:
- ✅ Security (Required): All SOC 2 reports must include Security
- ✅ Availability: 99.9% uptime SLA commitment
- ✅ Processing Integrity: Core QMS validation workflows (leverages FDA Part 11)
- ✅ Confidentiality: PHI and proprietary data handling
- ❌ Privacy (Defer): Only if contractually required; 6-9 month delay
Scope Statement:
"Management's description of the CODITECT BIO-QMS Platform and the suitability of the design and operating effectiveness of controls to meet the criteria for the Security, Availability, Processing Integrity, and Confidentiality principles set forth in the AICPA Trust Service Criteria relevant to security, availability, processing integrity, and confidentiality for the period [Audit Date] (Type I) / [Start Date] to [End Date] (Type II)."
System Boundaries:
- BIO-QMS web application (frontend + API + database)
- GCP infrastructure (compute, storage, network)
- CI/CD pipeline
- Monitoring and alerting systems
- Excludes: Customer-managed data, third-party SaaS tools (CUECs apply)
Carve-Out Subservice Organizations:
- Google Cloud Platform (infrastructure)
- PagerDuty (incident alerting)
- Google Workspace (SSO, email)
6.3 Timeline and Milestones
Type I Audit Timeline (Q3 2026)
| Week | Activity | Owner | Deliverables |
|---|---|---|---|
| Week -12 (Jun 1) | RFP to audit firms | CISO | SOW, cost estimates, firm selection |
| Week -10 (Jun 15) | Audit firm engagement | CEO + CISO | Signed engagement letter, kick-off call |
| Week -8 (Jul 1) | Gap closure completion | CISO + SRE | All P0 gaps closed, evidence collected |
| Week -4 (Jul 15) | System description finalized | CISO + VP Eng | System description + control matrix |
| Week -2 (Aug 1) | Pre-audit readiness review | CISO | Internal audit, remediation of findings |
| Week 0 (Aug 1) | Type I audit fieldwork begins | Audit Firm | Information request list (IRL) |
| Week 1-2 | Auditor on-site (virtual) | All | Control walkthroughs, interviews, documentation review |
| Week 3-4 | Audit evidence review | CISO | Respond to auditor questions, provide additional evidence |
| Week 5-6 | Draft report review | CISO + Legal | Review findings, management responses |
| Week 7 (Sep 15) | Final Type I report issued | Audit Firm | SOC 2 Type I report + bridge letter |
Total Duration: 12 weeks (Jun 1 - Sep 15, 2026)
Type II Audit Timeline (Q2 2027)
| Month | Activity | Owner | Deliverables |
|---|---|---|---|
| Sep 2026 - Mar 2027 | Observation period (6 months) | CISO + SRE | Evidence collection, quarterly control testing |
| Jan 2027 | Mid-observation check-in | Audit Firm | Interim review, identify gaps early |
| Mar 15, 2027 | Observation period ends | — | 6 months of evidence packaged |
| Mar 16 - Apr 15 | Type II audit fieldwork | Audit Firm | Sample testing, control walkthroughs |
| Apr 16 - May 1 | Draft report review | CISO + Legal | Review findings, management responses |
| May 15, 2027 | Final Type II report issued | Audit Firm | SOC 2 Type II report |
Total Duration: 8 months (Sep 2026 - May 2027)
6.4 Estimated Cost Breakdown
Type I Audit (Specialized Firm — A-LIGN)
| Cost Category | Amount | Notes |
|---|---|---|
| CPA Audit Fees | $45,000 | 200-250 hours @ $180-225/hr blended rate |
| Pre-Audit Prep | $25,000 | Gap closure consulting (risk assessment) |
| System Description | (internal) | CISO + VP Eng time (3 weeks) |
| Evidence Collection | (internal) | CISO + Security Eng automation (3 weeks) |
| Internal Readiness Audit | $5,000 | Mock audit by external consultant (optional) |
| Management Assertion Legal | $5,000 | Legal review of assertion letter |
| Total Type I | $80,000 | External costs only |
Type II Audit (Specialized Firm — A-LIGN)
| Cost Category | Amount | Notes |
|---|---|---|
| CPA Audit Fees | $65,000 | 300-350 hours @ $185-230/hr blended rate |
| Observation Period Evidence | $3,000 | Evidence collection tooling (screenshots, log exports) |
| Ongoing Control Testing | (internal) | Quarterly testing by CISO + Security Eng |
| Total Type II | $68,000 | External costs only |
Total 12-Month Investment (Type I + Type II)
| Path | Type I | Type II | Observation | Gap Closure | Total |
|---|---|---|---|---|---|
| Specialized Firm | $45K | $65K | $3K | $38K | $151K |
| Big 4 Firm | $75K | $95K | $3K | $38K | $211K |
Savings with Specialized Firm: $60K (28% cost reduction)
6.5 Typical Auditor Information Request List (IRL)
Purpose: Prepare responses to typical auditor requests in advance to accelerate fieldwork.
Common Criteria (CC1-CC9)
| Request | Document/Evidence | Owner | Preparation Effort |
|---|---|---|---|
| Organizational chart | Org chart with reporting structure | HR | 1 day |
| Job descriptions | Role definitions for security/engineering | HR | 1 day |
| Board meeting minutes | Last 4 quarters (redacted if needed) | Legal | 1 day |
| Risk assessment | Annual risk assessment + risk register | CISO | 3 weeks (part of G-001) |
| Change management policy | CAB charter, change request template | VP Eng | 2 weeks (part of G-002) |
| Incident response plan | IRP with roles, escalation tree | CISO | 2 weeks (part of G-106) |
| Vendor contracts | Contracts with GCP, PagerDuty, Stripe | Legal | 1 day |
| Vendor SOC 2 reports | GCP, PagerDuty SOC 2 reports | CISO | 1 week |
| Security awareness training | Training completion records | HR | 1 day |
| Background check policy | Employment screening procedures | HR | 1 day |
Security (A1)
| Request | Document/Evidence | Owner | Preparation Effort |
|---|---|---|---|
| Access control policy | RBAC model, permission matrix | CISO | Available (D.3.1) |
| MFA enforcement | SSO config screenshots, MFA policy | IT | 1 day |
| Firewall rules | GCP VPC firewall rules export | SRE | 1 day |
| Intrusion detection | Security Command Center config | CISO | 1 day |
| Penetration test report | Most recent pentest findings | CISO | 1 day (if conducted) |
| Vulnerability scan reports | Trivy/Dependabot scan results | SRE | 1 day |
| Encryption configuration | TLS config, KMS key policies | CISO | Available (D.1) |
Availability (A1)
| Request | Document/Evidence | Owner | Preparation Effort |
|---|---|---|---|
| SLA commitment | Customer contract SLA terms | Legal | 1 day |
| Uptime monitoring | Uptime reports (last 6 months) | SRE | 1 week (part of G-108) |
| Disaster recovery plan | DR plan + tabletop test results | SRE | 3 weeks (part of G-003, G-004) |
| Incident response logs | PagerDuty incident history | SRE | 1 day |
| Capacity planning | CPU/mem/storage forecasts | SRE | 2 weeks (part of G-005) |
| Backup configuration | GCS snapshot policies | SRE | 1 day |
| Backup restoration test | Most recent restore test results | SRE | 1 day |
Processing Integrity (PI1)
| Request | Document/Evidence | Owner | Preparation Effort |
|---|---|---|---|
| Validation protocols | IQ/OQ/PQ protocols | QA | Available (D.2.1) |
| Validation evidence | Test execution logs, screenshots | QA | Available (D.2.4) |
| E-signature controls | E-signature architecture, policies | CISO | Available (D.2.3) |
| Audit trail | Audit log samples, integrity verification | CISO | Available (D.5.1 planned) |
| Data validation rules | API validation logic, database constraints | Backend | 1 week |
Confidentiality (C1)
| Request | Document/Evidence | Owner | Preparation Effort |
|---|---|---|---|
| Data classification policy | Classification scheme (Public/Internal/Confidential/Restricted) | CISO | 1 week (part of G-110) |
| Encryption at rest | KMS key policies, per-tenant keys | CISO | Available (D.1, D.3.2) |
| Encryption in transit | TLS config, certificate policies | CISO | Available (D.1) |
| DLP controls | DLP rules, alert samples | CISO | 3 weeks (part of G-109) |
| PHI access logs | Audit trail of PHI access | CISO | Available (D.3.4) |
Total Preparation Effort: Most evidence available from existing compliance work (D.1-D.3); new evidence requires 16 weeks (covered by gap closure plan).
7. Type I vs Type II Roadmap
7.1 Type I Audit (Point-in-Time) — Q3 2026
Objective: Demonstrate that controls are suitably designed to meet Trust Service Criteria as of a specific date (e.g., August 15, 2026).
What Auditor Tests:
- Design Effectiveness: Are controls logically designed to prevent/detect control failures?
- Implementation: Do controls exist and are they operational?
- No Operating Effectiveness: Auditor does NOT test whether controls operated consistently over time
Deliverables:
- SOC 2 Type I Report: CPA opinion on design effectiveness
- Bridge Letter: Optional letter for customers explaining Type I vs Type II
- Management Assertion: Signed statement from management
Timeline:
- Readiness Date: August 1, 2026 (all gaps closed)
- Audit Date: August 15, 2026 (point-in-time snapshot)
- Fieldwork: August 1-15, 2026 (2 weeks)
- Report Issued: September 15, 2026
Value:
- Accelerates GTM: Can share Type I report with customers/investors in Q3 2026
- Validates readiness: Confirms controls are designed correctly before Type II observation period
- Investor confidence: Demonstrates commitment to compliance before Series A/B
Limitations:
- Not proof of operating effectiveness: Customers/investors may ask "but do controls work consistently?"
- Shorter shelf life: Many enterprises prefer Type II
Cost: $45K (specialized firm) or $75K (Big 4)
7.2 Type II Audit (Operating Effectiveness) — Q2 2027
Objective: Demonstrate that controls operated effectively throughout a 6-12 month observation period (e.g., September 16, 2026 - March 15, 2027).
What Auditor Tests:
- Design Effectiveness: Same as Type I
- Operating Effectiveness: Did controls operate consistently throughout the period?
- Sampling: Auditor samples control executions (e.g., 25 change requests, 25 access reviews, 25 vulnerability scans)
Deliverables:
- SOC 2 Type II Report: CPA opinion on design AND operating effectiveness
- Control Exceptions: Any control failures noted (with management responses)
- Management Assertion: Signed statement for the observation period
Timeline:
- Observation Period Begins: September 16, 2026 (day after Type I report)
- Observation Period Ends: March 15, 2027 (6 months)
- Fieldwork: March 16 - April 15, 2027 (4 weeks)
- Report Issued: May 15, 2027
Value:
- Enterprise sales enabler: Most enterprise customers require Type II
- Proof of consistency: Demonstrates controls work over time, not just point-in-time
- Competitive advantage: Differentiate from competitors without SOC 2 Type II
- Insurance premiums: May reduce cyber insurance costs
Observation Period Requirements:
- Evidence Collection: Must collect evidence of control execution throughout the 6 months
- Example: Screenshots of monthly access reviews, change request approvals, vulnerability scan reports, backup restoration tests
- Control Failures: Any control failures must be documented with root cause analysis and remediation
- No Major Changes: Avoid major architecture changes during observation period (triggers re-audit)
Cost: $65K (specialized firm) or $95K (Big 4)
7.3 Key Milestones and Decision Gates
Timeline View:
2026
────────────────────────────────────────────────────────────────────────────
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
████████████████████████████████████
│ │ │ │
│ │ │ └─ Type II observation begins
│ │ └────── Type I report issued (Sep 15)
│ └─────────── Type I fieldwork (Aug 1-15)
└─────────────────────────────── Gap closure begins (Mar 1)
2027
────────────────────────────────────────────────────────────────────────────
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
███████████████████████
│ │ │ │
│ │ │ └─────────────────────────── Type II report issued (May 15)
│ │ └──────────────────────────────── Type II fieldwork (Mar 16 - Apr 15)
│ └───────────────────────────────────── Type II observation ends (Mar 15)
└─────────────────────────────────────────────── Mid-observation check-in (Jan 15)
Decision Gate 1: Audit Firm Selection (June 15, 2026)
- Decision: Specialized firm (A-LIGN/Schellman) vs Big 4 (Deloitte/KPMG)
- Criteria: Customer requirements, investor preferences, budget constraints, timeline urgency
- Recommendation: Specialized firm for cost/speed; reassess for Type II if Big 4 required
Decision Gate 2: Type I Scope Confirmation (July 1, 2026)
- Decision: Include Privacy criteria or defer?
- Criteria: Customer contractual requirements, regulatory obligations, resource availability
- Recommendation: Defer Privacy unless explicitly required (6-9 month delay)
Decision Gate 3: Type I Pass/Fail (September 15, 2026)
- Scenario A (Pass): Proceed to Type II observation period starting Sep 16
- Scenario B (Fail with minor findings): Remediate findings, extend observation period start by 1 month
- Scenario C (Fail with major findings): Delay Type II by 6 months, remediate, re-audit Type I
Decision Gate 4: Type II Firm Selection (January 15, 2027)
- Decision: Continue with Type I firm or switch to Big 4?
- Criteria: Enterprise customer requirements, investor Series B prep, budget
- Recommendation: If no explicit Big 4 requirement, continue with Type I firm (cost savings, continuity)
7.4 Type I to Type II Transition Plan
Observation Period Preparation (August 2026):
| Task | Owner | Deliverable | Target Date |
|---|---|---|---|
| Define evidence collection schedule | CISO | Monthly evidence checklist (access reviews, change requests, backups, vuln scans, DR tests) | Aug 1 |
| Implement evidence automation | Security Eng | D.4.3 Evidence collection automation (screenshots, log exports, report generation) | Aug 15 |
| Train team on evidence collection | CISO | Training session for SRE, Security, QA teams on evidence requirements | Aug 15 |
| Establish control testing calendar | CISO | Quarterly internal control testing schedule (Sep, Dec, Mar) | Aug 15 |
Monthly During Observation Period (Sep 2026 - Mar 2027):
| Activity | Frequency | Owner | Evidence Generated |
|---|---|---|---|
| Access review | Monthly | CISO | Screenshot of access review approvals |
| Change requests | Ongoing | VP Eng | CAB meeting minutes, change approval records |
| Vulnerability scans | Monthly | SRE | Trivy/Dependabot scan reports, remediation tracking |
| Backup restoration test | Quarterly | SRE | Backup restore test results, success/failure logs |
| DR tabletop exercise | Quarterly | SRE | DR test results, lessons learned |
| Incident response | As needed | CISO | Incident tickets, root cause analysis, remediation |
| Security awareness training | Quarterly | HR | Training completion records |
| Risk register review | Quarterly | CISO | Updated risk register, risk treatment status |
Mid-Observation Check-In (January 15, 2027):
- Purpose: Auditor reviews 3 months of evidence to identify gaps early
- Participants: Auditor, CISO, VP Eng, SRE Lead
- Deliverables: Gap list, remediation plan, timeline adjustment (if needed)
- Effort: 1 week
Observation Period Close (March 15, 2027):
- Package all evidence: Organize 6 months of evidence into auditor-ready format (PDFs, screenshots, logs)
- Internal review: CISO reviews all evidence for completeness, identifies missing items
- Remediation: Address any gaps found in internal review before Type II fieldwork
- Effort: 2 weeks
8. Cross-Framework Synergies
8.1 FDA 21 CFR Part 11 → SOC 2 Processing Integrity (PI1)
Overlap: ~80% of Processing Integrity controls already implemented via FDA Part 11 validation.
| FDA Part 11 Requirement | SOC 2 PI1 Control | Evidence Reuse |
|---|---|---|
| §11.10(a) Validation | PI1.1 Processing complete | IQ/OQ/PQ protocols (D.2.1) |
| §11.10(e) Audit trail | PI1.4 Processing authorized | Audit log architecture (D.5.1) |
| §11.70 Signature binding | PI1.2 Processing accurate | E-signature controls (D.2.3) |
| §11.10(b) Record copies | PI1.1 Processing complete | Record retrieval controls (D.2.2) |
| §11.10(c) Record protection | PI1.2 Processing accurate | Data integrity checks (D.2.2) |
Auditor Benefit: FDA Part 11 validation provides substantial evidence for PI1; auditor can leverage existing validation reports.
Effort Savings: ~12 weeks (PI1 controls would otherwise require separate validation)
8.2 HIPAA Security Rule → SOC 2 Security (A1) + Confidentiality (C1)
Overlap: ~75% of Security and Confidentiality controls already implemented via HIPAA compliance.
| HIPAA Control | SOC 2 Control | Evidence Reuse |
|---|---|---|
| §164.312(a)(1) Access controls | CC6.1 Logical access | HIPAA access controls (D.3.1) |
| §164.312(a)(2)(i) Unique user IDs | CC6.1 Logical access | SSO + RBAC implementation |
| §164.312(a)(2)(ii) Emergency access | CC6.2 Privilege escalation | Break-glass procedures (D.3.1) |
| §164.312(a)(2)(iii) Auto log-off | CC6.1 Logical access | 15-minute session timeout |
| §164.312(a)(2)(iv) Encryption | C1.3 Encryption at rest | AES-256-GCM implementation (D.3.2) |
| §164.312(e)(1) Transmission security | C1.4 Encryption in transit | TLS 1.3 configuration (D.3.2) |
| §164.312(b) Audit logs | CC7.1 System monitoring | HIPAA audit logging (D.3.4) |
Auditor Benefit: HIPAA controls provide comprehensive evidence for Security and Confidentiality criteria.
Effort Savings: ~10 weeks (Security/Confidentiality controls would otherwise require separate implementation)
8.3 Cryptographic Standards (D.1) → SOC 2 Security (A1) + Confidentiality (C1)
Overlap: Cryptographic foundation provides ~30% of Security and Confidentiality evidence.
| Crypto Control | SOC 2 Control | Evidence Reuse |
|---|---|---|
| ECDSA P-256 signatures | PI1.4 Processing authorized | E-signature non-repudiation (D.1.3) |
| AES-256-GCM encryption | C1.3 Encryption at rest | Encryption standards (D.1.1) |
| TLS 1.3 | C1.4 Encryption in transit | TLS configuration (D.1.1) |
| HSM key management | C1.3 Encryption at rest | Key lifecycle management (D.1.2) |
| Certificate chain | CC6.1 Logical access | PKI infrastructure (D.1.3) |
Auditor Benefit: Mature cryptographic controls demonstrate defense-in-depth security posture.
Effort Savings: ~4 weeks (crypto controls would otherwise require separate design and implementation)
8.4 Total Effort Savings from Cross-Framework Leverage
| Framework | SOC 2 Overlap | Effort Saved | Cost Saved |
|---|---|---|---|
| FDA 21 CFR Part 11 | Processing Integrity (PI1) | 12 weeks | $30K |
| HIPAA Security Rule | Security (A1) + Confidentiality (C1) | 10 weeks | $25K |
| Cryptographic Standards | Security (A1) + Confidentiality (C1) | 4 weeks | $10K |
| Total | — | 26 weeks | $65K |
Result: SOC 2 readiness achieved 26 weeks faster and $65K cheaper than if implemented from scratch.
Key Insight: The "compliance flywheel" effect — each additional framework becomes cheaper and faster to implement due to control reuse.
9. Risks and Mitigation
9.1 Risk Register for SOC 2 Readiness
| Risk ID | Risk Description | Likelihood | Impact | Score | Mitigation | Owner |
|---|---|---|---|---|---|---|
| R-001 | Audit delayed due to incomplete gap closure | Medium | High | 12 | Weekly gap closure status meetings, buffer 2 weeks in timeline | CISO |
| R-002 | Auditor identifies new gaps during fieldwork | Medium | Medium | 9 | Internal readiness audit 2 weeks before auditor engagement | CISO |
| R-003 | Type I report has qualified opinion (control deficiencies) | Low | High | 6 | Engage external consultant for mock audit, remediate findings early | CISO |
| R-004 | Key personnel leave during observation period | Low | Medium | 4 | Document all control procedures, cross-train team members | VP Eng |
| R-005 | Major architecture change during observation period | Medium | High | 12 | Freeze architecture changes Sep 2026 - Mar 2027, defer to Q2 2027 | VP Eng |
| R-006 | Evidence collection automation fails | Medium | Medium | 9 | Implement automation by Aug 15, test for 2 weeks before observation period | Security Eng |
| R-007 | Budget overrun for audit fees | Low | Low | 2 | Fixed-price SOW with audit firm, negotiate scope changes upfront | CISO |
| R-008 | Customer demands Type II before Q2 2027 | Medium | Medium | 9 | Educate customers on Type I value, offer bridge letter, expedite Type II if needed | Sales |
| R-009 | Control failure during observation period | Medium | High | 12 | Implement robust monitoring, detect failures early, document remediation | CISO |
| R-010 | Auditor requires Privacy criteria (not in scope) | Low | High | 6 | Negotiate Privacy exclusion upfront, document rationale in SOW | CISO |
Total Risks: 10 identified, 8 mitigated, 2 monitored
9.2 Risk Mitigation Plan
R-001: Audit Delayed Due to Incomplete Gap Closure
Mitigation Strategy:
- Weekly status meetings: CISO + gap owners review progress every Friday
- Timeline buffer: Build 2-week buffer into gap closure deadline (Jun 30 vs Aug 1 audit start)
- Escalation path: Any P0 gap at risk of missing deadline escalates to CEO
Residual Risk: Low — Timeline is achievable with existing resources
R-005: Major Architecture Change During Observation Period
Mitigation Strategy:
- Architecture freeze: No major changes Sep 2026 - Mar 2027 (6-month observation period)
- Major change definition: Database migration, authentication system redesign, multi-region deployment
- Allowed changes: Bug fixes, minor features, security patches, dependency updates
- Change review: CAB reviews all changes for SOC 2 impact before approval
- Auditor notification: Notify auditor within 48 hours of any control-impacting change
Residual Risk: Low — Engineering roadmap already planned to defer major changes to Q2 2027
R-009: Control Failure During Observation Period
Mitigation Strategy:
- Proactive monitoring: Implement alerting for control failures (e.g., missed access review, failed backup, vulnerability exceeding SLA)
- Root cause analysis: Document root cause for every control failure within 5 business days
- Remediation tracking: Track remediation in JIRA with SLA (P0: 24 hours, P1: 5 days, P2: 30 days)
- Management response: Include control failures in Type II report with management response (what went wrong, how fixed, how prevented)
Residual Risk: Medium — Control failures are expected; key is to demonstrate effective remediation
Auditor Perspective: 1-2 control failures with strong remediation is BETTER than zero failures (auditors are skeptical of "perfect" results).
10. Success Metrics and KPIs
10.1 Gap Closure Metrics (Mar - Jul 2026)
| Metric | Target | Tracking Frequency | Owner |
|---|---|---|---|
| P0 gaps closed | 7/7 by Jun 30 | Weekly | CISO |
| P1 gaps closed | 11/11 by Jul 15 | Weekly | CISO |
| P2 gaps closed | 5/5 by Jul 31 | Weekly | CISO |
| Gap closure budget variance | < 10% over budget | Monthly | CISO |
| Gap closure timeline variance | < 2 weeks delay | Weekly | CISO |
10.2 Type I Audit Metrics (Aug - Sep 2026)
| Metric | Target | Tracking Frequency | Owner |
|---|---|---|---|
| Auditor information requests | < 20 requests | Daily during fieldwork | CISO |
| Average response time to auditor | < 24 hours | Daily during fieldwork | CISO |
| Control deficiencies identified | 0 material deficiencies | Post-audit | CISO |
| Type I opinion | Unqualified (clean) opinion | Post-audit | CISO |
| Report delivery vs target | Within 1 week of Sep 15 | Post-audit | Audit Firm |
10.3 Type II Observation Period Metrics (Sep 2026 - Mar 2027)
| Metric | Target | Tracking Frequency | Owner |
|---|---|---|---|
| Monthly evidence collected | 100% of checklist | Monthly | CISO |
| Control failures | < 2 per quarter | Monthly | CISO |
| Control failure remediation SLA | 100% within SLA | Monthly | CISO |
| Quarterly control testing completion | 100% on schedule | Quarterly | CISO |
| Mid-observation gap count | < 5 gaps | Jan 15, 2027 | CISO |
10.4 Business Impact Metrics (Post-Type I)
| Metric | Baseline | Target (6 months post-Type I) | Tracking |
|---|---|---|---|
| Enterprise deals closed | 0 | 3-5 | Sales CRM |
| Average deal size | $50K | $150K | Sales CRM |
| Security questionnaire completion time | 40 hours | 5 hours (attach SOC 2 report) | Sales |
| Customer churn due to security concerns | 2% | 0% | Customer Success |
| Cyber insurance premium | (current) | -15% reduction | Finance |
| Investor confidence (Series B readiness) | (subjective) | SOC 2 as diligence requirement | CFO |
11. Conclusion and Recommendations
11.1 Executive Summary of Recommendations
1. Pursue SOC 2 Type I in Q3 2026, Type II in Q2 2027
- Rationale: Type I accelerates GTM and investor confidence; Type II enables enterprise sales
- Timeline: Aggressive but achievable with existing compliance foundation (FDA Part 11, HIPAA)
- Investment: $151K total over 12 months (specialized firm path)
2. Engage Specialized Audit Firm (A-LIGN or Schellman)
- Rationale: 40% cost savings ($60K), 50% faster turnaround (4-6 weeks vs 8-12 weeks)
- Risk mitigation: Reassess for Type II if Big 4 required by customers/investors
3. Defer Privacy Criteria to Future Engagement
- Rationale: Privacy adds 6-9 months and $50K+ with limited ROI unless contractually required
- Scope: Security + Availability + Processing Integrity + Confidentiality provides comprehensive coverage
4. Prioritize P0 Gaps (Risk Assessment, CAB, DR Plan)
- Rationale: These are the most scrutinized by auditors and highest risk of qualified opinion
- Timeline: Complete by Jun 30 (5 weeks before audit start)
5. Leverage Existing Compliance Work Aggressively
- FDA Part 11: Reuse IQ/OQ/PQ validation for Processing Integrity (12 weeks saved)
- HIPAA: Reuse access controls and encryption for Security + Confidentiality (10 weeks saved)
- Crypto standards: Reuse cryptographic architecture for Security (4 weeks saved)
11.2 Go/No-Go Decision Framework
Proceed with SOC 2 Type I (Q3 2026) IF:
- ✅ Budget approved ($151K total over 12 months)
- ✅ P0 gap closure resourced (1 FTE CISO + 0.3 FTE SRE + 0.4 FTE Security Eng for 5 months)
- ✅ Executive sponsorship committed (CEO + CISO sign management assertion)
- ✅ Architecture freeze acceptable (no major changes Sep 2026 - Mar 2027)
- ✅ Customer/investor demand confirmed (SOC 2 required for enterprise deals or Series B)
Defer SOC 2 IF:
- ❌ Budget not approved or higher-priority investments (e.g., product development)
- ❌ Key personnel unavailable (CISO departure, SRE team overloaded)
- ❌ Architecture changes planned (database migration, multi-region deployment)
- ❌ Customer/investor demand uncertain (no enterprise pipeline, no Series B timing)
11.3 Next Steps (Week of 2026-02-17)
Immediate Actions (This Week):
- Executive approval: Present this assessment to CEO + Board for budget and timeline approval
- Audit firm RFP: Send RFP to A-LIGN, Schellman, KirkpatrickPrice (target: 3 proposals by Mar 1)
- Gap closure kickoff: CISO + VP Eng + SRE Lead align on gap ownership and timeline
- Risk assessment consultant: Engage external consultant for CC3 gap closure (target: start Mar 1)
30-Day Actions (By Mar 17):
- Audit firm selection: Review proposals, negotiate SOW, sign engagement letter by Mar 15
- P0 gap closure begins: Risk assessment kickoff, CAB charter drafted
- Evidence automation scoped: Security Eng scopes D.4.3 evidence collection automation
- Internal readiness calendar: CISO publishes weekly status meeting schedule + Gantt timeline
60-Day Actions (By Apr 17):
- Risk assessment complete: Risk register finalized, treatment plans documented
- CAB operational: First CAB meeting held, change requests approved
- P1 gap closure 50% complete: Code of Conduct, status page, policies in progress
90-Day Actions (By May 17):
- P0 gap closure complete: All 7 P0 gaps closed and evidenced
- P1 gap closure 80% complete: Only DLP and evidence automation remaining
- System description drafted: CISO + VP Eng draft system description for auditor review
12. Appendices
Appendix A: Trust Service Criteria Control Mapping
See detailed control-by-control mapping in docs/compliance/soc2-trust-service-criteria-mapping.md (D.4.1 deliverable, not yet created).
Appendix B: Evidence Collection Checklist
See monthly evidence collection checklist in D.4.3 Evidence Collection Automation implementation.
Appendix C: Risk Assessment Template
See SSAE 18 compliant risk assessment template in G-001 remediation deliverable.
Appendix D: CAB Charter and Change Request Template
See CAB charter and change request template in G-002 remediation deliverable.
Appendix E: Disaster Recovery Plan Template
See DR plan template in G-003 remediation deliverable.
Appendix F: Glossary
| Term | Definition |
|---|---|
| AICPA | American Institute of Certified Public Accountants — professional body that publishes TSC |
| Carve-Out Method | SOC 2 approach where subservice organization controls are referenced but not tested |
| CUEC | Complementary User Entity Control — controls customers must implement |
| IRL | Information Request List — auditor's list of requested documents/evidence |
| Observation Period | 6-12 month period during which Type II auditor tests control operating effectiveness |
| SSAE 18 | Statement on Standards for Attestation Engagements No. 18 — audit standard for SOC 2 |
| TSC | Trust Service Criteria — AICPA's 2017 criteria for SOC 2 audits |
| Type I | Point-in-time audit of control design effectiveness |
| Type II | Period-of-time audit of control design AND operating effectiveness |
Document History
| Version | Date | Author | Changes |
|---|---|---|---|
| 1.0.0 | 2026-02-16 | CISO Office | Initial readiness assessment |
Document ID: CODITECT-BIO-SOC2-RA-001 Classification: Internal - Confidential Next Review: 2026-05-16 Owner: Chief Information Security Officer (CISO) + VP Engineering
End of Document
Total Lines: 2,347