How are you proving humans actually performed your SOC 2 controls?
Going through SOC 2 Type II and stuck on a specific problem I can't find a clean answer to.
Vanta handles the technical side fine. MFA enforced in Okta, encryption on S3, branch protection on GitHub all automated, all green.
The problem is controls where a human has to actually do the work. Three examples I'm struggling with:
Quarterly access review (CC6.2): My engineering lead spent two hours in AWS IAM and Okta, reviewed all accounts, removed two stale ones, created Jira tickets for the removals. What does your auditor actually want to see here? A spreadsheet? A Jira export? A written summary? How do you prove the review happened and wasn't just a checkbox?
Incident response (CC7.2) We had a production outage in May. Team responded within SLA, ran a post-mortem. But reconstructing the timeline for an auditor means pulling from PagerDuty, Slack threads, and a doc written two days later. Is that actually acceptable or do auditors push back on reconstructed timelines?
Vendor risk assessment (CC9.2) We review critical vendors annually. Right now the evidence is a folder with a completed questionnaire PDF and an email thread. That feels thin.
Questions for anyone who's been through a Type II:
- What format does your auditor actually accept for access review evidence?
- Has anyone had an auditor reject reconstructed incident timelines?
- What's the weakest evidence you've seen an auditor actually accept for a human performed control?