If you are pursuing SOC 2 Type II attestation, you will need a complete information security policy library aligned to the AICPA Trust Services Criteria. This article lists every policy that a SOC 2 Type II audit expects to see, how auditors evaluate them, and the fastest path to a compliant policy set.
The Short Answer
Plan on delivering at least 39 distinct policies to your SOC 2 Type II auditor. These map to the nine common criteria (CC1 through CC9) plus the additional criteria for availability, confidentiality, processing integrity, and privacy if those Trust Services Criteria are in scope.
The 39 Policies Your SOC 2 Audit Expects
CC1 - Control Environment (5 policies)
- Code of Conduct and Ethics Policy - integrity, ethical values, whistleblower program
- Governance Policy - board oversight, risk appetite, accountability
- Organizational Structure and Authority Policy - segregation of duties, reporting lines
- HR Policy and Background Check Policy - hiring, onboarding, termination, background screening
- Workforce Development and Training Policy - security awareness, role-based training
CC2 - Communication and Information (3 policies)
- Information Classification and Handling Policy
- External Communications Policy - customer communications, marketing claims
- Incident Communication Policy - internal and external notification procedures
CC3 - Risk Assessment (3 policies)
- Risk Management Policy
- Fraud Risk Assessment Policy
- Change Impact Assessment Policy
CC4 - Monitoring Activities (2 policies)
- Internal Audit and Monitoring Policy
- Control Self-Assessment Policy
CC5 - Control Activities (2 policies)
- Control Design and Implementation Policy
- Technology Controls Policy
CC6 - Logical and Physical Access (6 policies)
- Access Control Policy
- Identity and Authentication Policy - MFA, SSO, password requirements
- Privileged Access Management Policy
- Physical Security Policy
- Asset Management Policy
- Media Handling and Destruction Policy
CC7 - System Operations (5 policies)
- System Monitoring and Logging Policy
- Vulnerability Management Policy
- Patch Management Policy
- Incident Response Policy
- Problem Management Policy
CC8 - Change Management (2 policies)
- Change Management Policy
- Secure Software Development Lifecycle Policy
CC9 - Risk Mitigation (2 policies)
- Business Continuity Policy
- Vendor and Third-Party Risk Management Policy
A1 - Availability (2 policies)
- Capacity Management Policy
- Disaster Recovery Policy
C1 - Confidentiality (1 policy)
- Data Confidentiality and Retention Policy
PI1 - Processing Integrity (1 policy)
- Data Processing Integrity Policy
P1-P8 - Privacy (5 policies)
- Privacy Notice and Data Subject Rights Policy
- Consent Management Policy
- Privacy Impact Assessment Policy
- Data Minimization and Retention Policy
- Cross-Border Data Transfer Policy
What Auditors Actually Check in Each Policy
Your SOC 2 Type II auditor is not just checking that a policy exists. They evaluate four dimensions of every policy during the audit period:
- Design - Does the policy address the relevant Trust Services Criterion?
- Implementation - Is the policy published, approved, and communicated to the workforce?
- Operating Effectiveness - Is the policy actually followed? Auditors sample test evidence across your audit period.
- Review Cadence - Is the policy reviewed and re-approved annually? Policies older than 12 months without review are a common finding.
Common Policy Mistakes That Fail SOC 2 Audits
- Templates copied from the internet without customization. Auditors recognize generic language and will dig for actual operating practices.
- Policies without clear owners. Every policy needs a named role accountable for it.
- No version history. Auditors want to see the document control trail.
- Missing review dates. Annual review must be documented, not just performed.
- Policies that contradict actual practice. A password policy mandating 90-day rotation while your IdP enforces no rotation is an instant finding.
The Fastest Path to a Complete SOC 2 Policy Set
CyberPolicyPros delivers a SOC 2 Type II policy package with all 39 policies pre-authored, CPGF-governed, and ready for customization. The Advanced (Level 4-5) tier includes the quantitative metrics, executive reporting cadence, and exception governance that pass a Type II operating-effectiveness evaluation.
Related Reading
- ISO 27001:2022 Policy Templates - SOC 2 and ISO 27001 share about 60 percent overlap. Bundle them.
- NIST 800-53 Rev 5 Policy Templates - the control catalog SOC 2 auditors reference for technical control design
- What is CPGF? - the governance methodology behind every CyberPolicyPros policy