Use This Checklist Before the Auditor Does
SOC 2 evidence questions tend to arrive after the agent is already in production. That is exactly the wrong time to discover that access is not attributable or that your logs cannot answer basic reconstruction questions. This checklist is designed for the week you decide to operationalize controls, not the week before fieldwork starts.
Identity and Access
- Every production agent has a unique, non-shared identity.
- Credential issuance is tied to a provisioning decision, not an ad-hoc runtime secret.
- Access scope is documented and reviewable by system or data class.
Audit Trail Quality
- Protected actions are logged at the infrastructure or control layer, not only inside application traces.
- Each event records agent identity, resource, action, timestamp, and outcome.
- Logs can be queried by time window, agent, and resource without manual correlation work.
Change and Review Controls
- Model updates, prompt changes, and tool-scope expansions leave a reviewable record.
- Security or compliance teams can reconstruct an incident path from logs alone.
- There is a defined response path when an agent performs an out-of-scope action.
What To Do If You Fail More Than Two Checks
If your team cannot satisfy most of the checklist without pulling together logs from multiple systems, you likely need a dedicated evidence layer rather than another policy document. The commercial destination for that problem is the SOC 2 for AI agents solution page, with the pricing path and quickstart acting as the next operational steps.
Sources
Operational follow-through
Once you can answer most of the checklist, move to the SOC 2 for AI agents solution page and the quickstart to turn the checklist into a rollout plan.