← Back to AnnexesCrosswalk Overview

SOC 2 Crosswalk

Protective Computing can support SOC 2-style assurance narratives by turning privacy, confidentiality, availability, and processing integrity into public behavior and evidence claims.

Protective controlTrust service criterionTranslationEvidence
Exposure MinimizationPrivacy / ConfidentialityMakes confidentiality claims inspectable with field necessity and retention artifacts.compliance matrix, retention enforcement report
Degraded FunctionalityAvailabilityReframes availability as essential-workflow continuity rather than service uptime alone.offline parity
Essential UtilityProcessing integrity / GovernanceAsks whether incentive structure or optional functionality undermines reliable core-task completion.feature matrix