SOC 2

SOC 2 Incident Response Checklist: 8 Evidence Items

| | 10 min read | Updated February 24, 2026

Bottom Line Up Front

SOC 2 auditors request eight specific evidence items for CC7 incident response: the IRP, incident definitions, system-generated ticket logs, triage evidence, detailed records, post-incident reviews, tabletop exercise documentation, and plan version history. Automate the alert-to-ticket pipeline and assemble the evidence package 30 days before fieldwork.

Most compliance teams treat incident response evidence as a documentation exercise: write the plan, run the annual tabletop, file the sign-in sheet. SOC 2 auditors evaluate incident response under three distinct criteria: CC7.2 (detection), CC7.3 (evaluation), and CC7.4 (response and recovery) [AICPA TSC CC7.2-CC7.4]. Each criterion demands a separate evidence artifact. The sign-in sheet satisfies none of them.

Incident response evidence drives more CC7 findings than any other control area in SOC 2 examinations [AICPA TSC CC7.3]. The pattern repeats across engagements: teams detect and resolve incidents effectively, then fail the audit because the evidence trail is incomplete. One missing timestamp, one skipped post-mortem, one undocumented triage decision transforms operational competence into a qualified opinion.

Eight evidence items determine whether your SOC 2 incident response passes the CC7 examination. Each item maps to a specific criterion. Each requires a specific documentation format. Organizations preparing all eight before the observation period begins clear the control area without findings.

A SOC 2 incident response checklist requires eight evidence items: the Incident Response Plan (IRP), written incident definitions, a system-generated ticket log, triage evidence for dismissed alerts, detailed incident records with timestamps, post-incident reviews, annual tabletop exercise documentation, and plan version history showing annual updates [AICPA TSC CC7.2, CC7.3, CC7.4].

Why CC7 Drives SOC 2 Incident Response Findings

SOC 2 evaluates incident response under Common Criterion 7 (CC7): System Operations [AICPA TSC CC7.1-CC7.5]. CC7 requires organizations to detect anomalies, evaluate events, respond to incidents, and recover operations. The criterion is mandatory for every SOC 2 engagement, regardless of which additional categories (Availability, Processing Integrity, Confidentiality, Privacy) are in scope.

The Cross-Criteria Problem

Incident response evidence appears in auditor requests beyond CC7. CC2 (Communication) requires evidence of stakeholder notification during incidents [AICPA TSC CC2.2]. CC5 (Control Activities) requires proof your team followed documented procedures during each response [AICPA TSC CC5.2].

A single incident with incomplete documentation triggers findings across three criteria. Auditors cross-reference incident records against communication logs, procedure adherence, and remediation timelines.

Type I vs Type II: Different Evidence Standards

Type I audits test design: the auditor reviews whether your Incident Response Plan exists and addresses the required elements. Type II audits test operating effectiveness: the auditor samples actual incidents from the observation period and verifies your team followed the plan consistently [AICPA TSC SOC 2 Guidance].

The Type II standard is where organizations fail. A detailed incident record in January paired with a one-line ticket in August creates an inconsistency finding. Auditors test for uniform documentation quality across the full observation period.

Map your incident response evidence to three criteria before the audit starts. Create a CC7 evidence folder with sub-folders for CC2 (notification records) and CC5 (procedure adherence). When auditors cross-reference, every artifact is pre-organized and traceable.

The 8 Evidence Items Auditors Request

SOC 2 auditors send a Prepared By Client (PBC) list before fieldwork begins. The SOC 2 incident response checklist section requests these eight items. A gap in any single item creates a finding. The table below shows each evidence item, its auditor purpose, and the most common failure mode.

Evidence Item Auditor Purpose Common Failure
1. Incident Response Plan Defines roles, severity levels, notification timelines Plan references departed employees or outdated tools
2. Written Incident Definitions Distinguishes events from incidents with classification criteria No written criteria; team classifies ad hoc
3. System-Generated Ticket Log Proves completeness of incident population Manual Excel list with no audit trail
4. Triage Evidence Proves reviewed alerts were investigated before dismissal No record of false positives; appears unmonitored
5. Detailed Incident Records Documents detection time, actions taken, resolution time Tickets contain “Fixed it” with no technical detail
6. Post-Incident Reviews Proves lessons learned and corrective actions Post-mortem meetings skipped or undocumented
7. Tabletop Exercise Records Proves annual testing of the plan [AICPA TSC CC7.4] No exercise conducted or no written evidence
8. Plan Version History Proves annual review and updates Plan unchanged for two or more years

How Auditors Test Each Item

Auditors do not accept documents at face value. For the IRP, they verify contact information matches current employees. For incident records, they cross-reference timestamps against SIEM logs. For post-incident reviews, they check whether corrective actions were implemented within the stated timeline.

The ticket log receives the most scrutiny. Auditors pull alerts directly from your SIEM or monitoring tool, select a sample, and trace each alert to a corresponding ticket. A missing ticket for a high-severity alert triggers an immediate finding [AICPA TSC CC7.2].

Configure your monitoring tool (Splunk, Datadog, AWS GuardDuty) to auto-create tickets in your ITSM platform (Jira, ServiceNow) for alerts above your defined severity threshold. System-generated timestamps create an irrefutable audit trail. Run a reconciliation report monthly: compare SIEM alert counts against ticket counts to catch gaps before the auditor does.

The Completeness Trap: Why Manual Incident Logs Fail

Manual incident tracking is the primary reason organizations receive CC7 findings. When your IT team maintains incidents in a spreadsheet, the auditor faces a Completeness and Accuracy (C&A) problem: no mechanism exists to verify whether rows were deleted or events were omitted.

Auditors are required to test completeness for any manually maintained population [AICPA AT-C Section 205]. System-generated logs with immutable timestamps pass this test automatically. Spreadsheets require hours of additional testing and produce findings regardless of actual incident handling quality.

The Three-Step Auditor Verification

Every SOC 2 auditor follows this pattern for incident completeness:

  1. Direct system access: Log into your SIEM (GuardDuty, Splunk, Datadog) and identify alerts from the observation period.
  2. Trace to ticket: Request the corresponding Jira or ServiceNow ticket for each selected alert.
  3. Evaluate documentation: Verify the ticket contains detection time, classification rationale, containment actions, and resolution confirmation.

A missing ticket for any sampled alert means the incident population is incomplete. One gap invalidates the entire log.

Replace manual spreadsheets with automated alert-to-ticket pipelines. Configure your SIEM to create tickets for every alert above your severity threshold. For alerts dismissed as false positives, require a one-line triage note in the ticket before closure. Run a weekly reconciliation: export SIEM alert counts and compare against ticket counts. Document the reconciliation date and reviewer name.

The Zero-Incident Problem

Organizations with no security incidents during the observation period face a distinct documentation challenge. The absence of incidents does not satisfy CC7. Auditors require negative assurance: evidence proving your monitoring was active and your team was prepared to respond [AICPA TSC CC7.1].

The Negative Assurance Package

Three artifacts satisfy the zero-incident requirement:

  1. Monitoring configuration evidence: Screenshots or exports proving your alerting tools (GuardDuty, Splunk, Datadog) operated continuously throughout the observation period. Include uptime reports and configuration settings.
  2. Triage logs: A sample of events reviewed and closed as false positives or non-incidents. These prove your team actively monitored and investigated alerts, even when none escalated.
  3. Tabletop exercise documentation: A signed memo from a simulated incident exercise covering the scenario, participants, gaps identified, and corrective actions planned [AICPA TSC CC7.4].

The tabletop exercise carries the most weight in a zero-incident year. Without real incidents to demonstrate response capability, the exercise becomes your primary evidence for CC7.3 and CC7.4. Review the recommended testing frequency to determine the right cadence for your organization.

If your organization reports zero incidents, prepare the three-artifact negative assurance package 30 days before audit fieldwork. Export SIEM uptime reports covering the full observation period. Pull 10-15 triage records showing investigated and dismissed alerts. Schedule and document a tabletop exercise with your full incident response team, producing a two-page memo with scenario details, participant names, and identified gaps.

The 4-Week Pre-Audit Preparation Timeline

Start this timeline 30 days before audit fieldwork begins. Each week addresses one evidence category from the SOC 2 incident response checklist.

Week 1: Discovery and Reconciliation

Pull the incident ticket log from your ITSM platform. Cross-reference against SIEM alert counts for the observation period. Identify gaps where alerts exist without corresponding tickets. Flag any tickets with incomplete documentation.

Week 2: Gap Closure

Address every gap identified in Week 1. For missing tickets, create retrospective entries with available evidence from SIEM logs, Slack messages, and email threads. Schedule a tabletop exercise if one has not been conducted in the current period.

Week 3: Documentation Review

Verify the IRP was updated within the last 12 months. Confirm all listed team members still hold their designated roles. Update contact information, escalation paths, and tool references. Save the current version with a documented revision date.

Week 4: Evidence Assembly

Compile all eight evidence items into a single CC7 evidence package. Select one closed incident ticket and read it end-to-end. Verify it tells the complete story: detection, classification, containment, resolution, and post-mortem. If the narrative has gaps, add a retrospective note now.

Create a pre-audit checklist with all eight evidence items. Assign an owner and due date for each item during Week 1. Track completion daily through the four-week timeline. The Week 4 evidence package should be a single folder the auditor receives on Day 1 of fieldwork, organized by evidence item number.

CC7 findings follow a pattern: the team resolves incidents competently, then fails the audit because the evidence trail is incomplete. The eight-item checklist converts operational competence into audit evidence. Automate the alert-to-ticket pipeline, document every triage decision, and assemble the evidence package 30 days before fieldwork. This control becomes a formality when the documentation matches the work your team already performs.

Frequently Asked Questions

What should a SOC 2 incident response checklist include?

A SOC 2 incident response checklist includes eight evidence items: the Incident Response Plan, written incident definitions, system-generated ticket logs, triage evidence for dismissed alerts, detailed incident records, post-incident reviews, tabletop exercise documentation, and plan version history [AICPA TSC CC7.2, CC7.3, CC7.4]. Each item addresses a specific auditor verification step under CC7.

What happens if we have zero incidents during the SOC 2 audit period?

Zero incidents require a negative assurance package: monitoring configuration evidence proving your tools operated continuously, triage logs showing reviewed and dismissed alerts, and a documented tabletop exercise. The tabletop carries the most weight because it demonstrates response capability without a real incident [AICPA TSC CC7.4].

Why do manual spreadsheets fail SOC 2 incident response audits?

Auditors perform Completeness and Accuracy (C&A) testing on manually maintained populations [AICPA AT-C Section 205]. Spreadsheets lack immutable timestamps, provide no deletion audit trail, and require hours of additional verification. System-generated ticket logs with automated timestamps pass completeness testing automatically.

How does SOC 2 Type II test incident response differently from Type I?

Type I audits test design: the auditor verifies your Incident Response Plan exists and addresses required elements. Type II audits test operating effectiveness: the auditor samples actual incidents from the observation period and verifies consistent adherence to documented procedures across every sampled event.

How often should we update the Incident Response Plan for SOC 2?

Update the IRP at minimum annually, with version history documenting each revision [AICPA TSC CC7.4]. Trigger additional updates when team members change, tools are replaced, or post-incident reviews identify process gaps. Auditors check the version history for evidence of active maintenance.

Does a tabletop exercise satisfy the SOC 2 incident response testing requirement?

A documented tabletop exercise satisfies the CC7.4 annual testing requirement. The exercise must include a realistic scenario, the full incident response team, documented discussion points, identified gaps, and planned corrective actions. A two-page signed memo serves as the audit artifact [AICPA TSC CC7.4].

Get The Authority Brief

Weekly compliance intelligence for security leaders and technology executives. Frameworks decoded. Audit strategies explained. Regulatory updates analyzed.

Discipline in preparation. Confidence in the room.

Josef Kamara, CPA, CISSP, CISA, Security+
Josef Kamara
Josef Kamara
CPA · CISSP · CISA · Security+

Former KPMG and BDO. Senior manager over third-party risk attestations and IT audits at a top-five global firm, and former technology risk leader directing the IT audit function at a Fortune 500 medical technology company. Advises growth-stage SaaS companies on SOC 2, HIPAA, and AI governance certifications.