| SOC 2 CC6.1 | Logical access security — the entity implements logical access security software, infrastructure, and architectures over protected information assets. | AI-system access evidence — which employees accessed which AI systems, authentication context, tenant-type (Enterprise vs personal), time-bounded access logging. |
| SOC 2 CC7.2 | System monitoring — the entity monitors system components and the operation of controls. | Prompt-level monitoring log — user, timestamp, AI system, action taken (redact / block / allow), policy version, retained for full audit window. |
| SOC 2 CC7.3 | Evaluation of security events — the entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives. | AI-related security event taxonomy — novel-category detection, repeat violations, exfiltration attempts, classified and triaged per policy with evidence of review. |
| SOC 2 CC8.1 | Change management — the entity authorizes, designs, develops, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. | Policy change log — every AI detection rule or oversight policy change versioned with editor, timestamp, rationale, approval evidence. |
| SOC 2 Privacy P5 | Privacy criteria P5 — the entity uses and retains personal information in accordance with its privacy commitments. | Redaction evidence per data category (PII, PHI, payment, secrets) with hash-based replay capability. Minimization evidence per prompt. |
| SOC 2 Confidentiality C1.1 | Confidentiality — the entity identifies and maintains confidential information to meet the entity's objectives related to confidentiality. | Customer identifier and internal project codename redaction — dictionary-versioned evidence, per-prompt application log, exception handling where customer-approved disclosure is required. |
| AICPA Additional Considerations (2024) AI-A | AI system inventory — maintain an inventory of AI systems, their intended purpose, and the data they process. | AI-system inventory artifact — auto-discovered, classified by provider and tenant type, updated on every new system detection. |
| AICPA Additional Considerations (2024) AI-B | Human oversight — document human oversight activities for consequential AI use cases. | Human-oversight policy registry + per-use-case assignment + per-prompt oversight tag + exception handling log. |