2025 SOX Compliance Checklist

What is the Sarbanes-Oxley (SOX) Act?

The Sarbanes-Oxley Act (SOX), enacted in 2002, is a U.S. federal law established to enhance corporate governance and strengthen the accuracy and reliability of financial reporting for publicly traded companies. SOX aims to protect investors and the public by enforcing stringent reforms to improve financial disclosures and prevent corporate fraud.

What is SOX Compliance?

SOX compliance refers to adhering to the requirements set forth by the Sarbanes-Oxley Act. It mandates that companies establish robust internal controls and procedures to ensure the accuracy and security of financial data. Compliance is not optional; all publicly traded companies in the U.S., including their wholly-owned subsidiaries and foreign companies doing business in the U.S., must comply with SOX regulations.

To achieve SOX compliance, public companies operating in the US are required to:

  • Establish internal controls to safeguard financial data from unauthorized access or tampering.
  • Submit regular filings to the Securities and Exchange Commission (SEC) certifying the accuracy of financial disclosures and the effectiveness of security controls.
  • Undergo an independent annual audit of financial statements and internal controls.

We’ll dive deeper into the specific requirements below.

Key SOX Compliance Requirements

Organizations can meet SOX requirements in different ways, as there’s no unique framework or list of measures they need to implement. However, to achieve SOX compliance, companies must focus on several critical areas:

1. Internal Controls Over Financial Reporting

Organizations must establish and maintain internal controls across their processes and IT systems that ensure the integrity of financial data. This includes implementing processes to detect errors, prevent fraud or illicit use of data, and safeguard sensitive financial information. Controls should be tested regularly to ensure effectiveness and compliance.

2. Regular Audits

SOX requires both internal and external audits to evaluate the effectiveness of financial controls. External auditors must assess and validate internal controls, while internal teams should conduct periodic reviews to identify and address weaknesses proactively. Internal audit findings also support external auditors in their annual SOX compliance assessments. During these audits, an independent accounting firm evaluates the company’s internal controls and financial reporting processes. The results are often included in the organization’s annual SEC filing, ensuring transparency and accountability.

3. Document Retention

Companies must retain all financial records, audit trails, and communications for at least seven years. This requirement ensures transparency and provides a clear paper trail for regulatory audits and investigations.

4. Whistleblower Protections

SOX mandates the establishment of secure reporting mechanisms, allowing employees to report fraudulent or unethical activities anonymously. In fact, retaliation against employees for reporting potential fraud entails fines and prison sentences of up to 10 years. This ensures a culture of accountability and transparency.

5. Accurate Financial Reporting

The CEO and CFO are required to certify the accuracy of all financial reports and the effectiveness of internal controls. These statements must be complete, accurate, and free of material misstatements. Regular audits provide the evidence needed to support these certifications, ensuring that all data reported is reliable and that any discrepancies are immediately addressed and documented.

6. Event Logging and Monitoring

To comply with SOX, organizations must maintain comprehensive logs of system activities. This includes tracking changes to financial data, monitoring access to critical systems, and ensuring logs are readily available for audits.

7. Cybersecurity Measures

Although SOX does not explicitly mention cybersecurity, protecting the systems and networks that house financial data is a core requirement. Organizations must implement robust security controls, such as encryption, access management, data loss prevention (DLP) solutions, and intrusion detection systems, to ensure compliance. These obligations extend to cloud data centers that store or process financial information.

SOX Compliance Checklist

Information Technology (IT) systems play a pivotal role in SOX compliance. IT departments must ensure that systems handling financial data are secure, reliable, and capable of producing accurate reports. This includes implementing security measures such as access controls, maintaining audit trails, keeping up-to-date backups, and regularly testing IT systems to ensure they function correctly and securely.

On a broader organizational level, achieving and maintaining SOX compliance involves a systematic approach. Here’s a concise checklist to guide organizations:

  1. Establish Strong Internal Controls: Develop and document controls over financial reporting.
  2. Conduct Regular Risk Assessments: Identify and evaluate risks related to financial reporting.
  3. Implement IT Controls: Ensure IT systems are secure and support financial data integrity.
  4. Maintain Accurate Financial Records: Keep detailed and accurate financial records as per SOX requirements.
  5. Perform Internal Audits: Regularly audit internal controls and financial reporting processes.
  6. Ensure Management Accountability: Have CEOs and CFOs certify the accuracy of financial statements.
  7. Facilitate External Audits: Cooperate with external auditors and provide necessary documentation.
  8. Provide Whistleblower Mechanisms: Establish channels for employees to report unethical behavior anonymously.
  9. Stay Updated with Regulations: Continuously monitor and adapt to any changes in SOX regulations.

Important SOX Sections

The Sarbanes-Oxley Act is divided into 11 titles, but not all carry the same weight in terms of cybersecurity compliance. Here are some of the most critical sections and their relevance:

Section 203: Audit Partner Rotation

To prevent conflicts of interest and ensure unbiased oversight, SOX requires that the lead audit partner and the partner reviewing the audit rotate off after five consecutive years with the same company. This rule helps maintain independence and objectivity.

Section 301: Public Company Audit Committees

This section outlines the responsibilities of audit committees, including oversight of the external audit process. It mandates that committees must have the authority to investigate and address complaints about financial mismanagement or fraud.

Section 302: Corporate Responsibility for Financial Reports

This section requires senior executives, such as the CEO and CFO, to certify the accuracy of financial statements personally. They must also attest that internal controls are in place to ensure accurate reporting, tying compliance directly to accountability at the highest levels.

Section 404: Management Assessment of Internal Controls

Section 404 is one of the most complex and critical aspects of SOX. It mandates that organizations implement, document, and test internal controls over financial reporting. External auditors must verify these controls to ensure they are effective, making this section pivotal for both financial and cybersecurity teams.

Section 806: Whistleblower Protection

This section protects employees who report fraudulent activities from retaliation. It encourages transparency and creates a culture of accountability, ensuring that issues within financial reporting are brought to light.

Why is SOX Compliance Important?

Beyond legal and regulatory obligations, SOX compliance is crucial because it builds trust with investors by ensuring transparency and accuracy in financial reporting. It also increases overall operational efficiency and prevents fraud by means of improved internal processes and controls.

SOX Compliance & Cybersecurity

While the Sarbanes-Oxley Act (SOX) is often associated with financial reporting, its impact on cybersecurity cannot be overstated. At its core, SOX aims to ensure the integrity and accuracy of financial data, which ties directly to managing and mitigating cyber risks. After all, financial data security is only as strong as the systems protecting it.

Cybersecurity plays a pivotal role in SOX compliance by safeguarding the systems that house sensitive financial information. From tracking data breach attempts to implementing robust event logging, organizations must demonstrate that their digital infrastructure is resilient against unauthorized access and tampering. SOX compliance requires businesses to prevent malicious manipulation of financial data, detect and respond to potential breaches, and document remediation efforts effectively. Cyber risk management solutions enable security and compliance officers to do so.

Additionally, SOX mandates that event logs and other audit trails be readily available for review by auditors. This means organizations need advanced logging and monitoring systems that not only capture relevant activities but also store them securely and make them accessible when required. For cybersecurity practitioners, this means creating a framework that aligns with SOX requirements while reducing the likelihood of data breaches that could compromise compliance.

By integrating cybersecurity measures into SOX compliance efforts, organizations can protect financial data while building resilience against threats that jeopardize their compliance posture. The synergy between SOX and cybersecurity is critical to fostering trust with stakeholders and ensuring long-term operational integrity.

Who is Responsible for SOX Compliance?

The requirements apply to all U.S. public company boards, management, and accounting firms. Private companies considering an IPO, a merger, or acquisition may also need to review their internal controls. Responsibility for SOX compliance spans across multiple levels of an organization:

  • Executive Management: CEOs and CFOs are ultimately accountable for the accuracy of financial statements and the effectiveness of internal controls.
  • Audit Committees: Independent audit committees oversee compliance efforts and ensure the integrity of financial reporting.
  • IT Departments: Responsible for implementing and maintaining IT controls that protect financial data.
  • Internal Auditors: Conduct regular assessments to ensure controls are effective and identify areas for improvement.

How Often is SOX Compliance Audited?

SOX compliance is typically audited annually. Public companies are required to include an internal control report in their annual financial reports, which assesses the effectiveness of the company's internal controls over financial reporting. Additionally, external auditors must attest to the accuracy of management's assessment. Regular internal audits throughout the year can help ensure ongoing compliance and readiness for the annual review.

This regulation is a fundamental component of corporate governance for publicly traded companies in the United States. By adhering to SOX requirements, organizations not only comply with legal obligations but also enhance their financial integrity and operational efficiency. Implementing robust internal controls, ensuring accurate financial reporting, and maintaining vigilant oversight are key components of a successful SOX compliance strategy.

A Practical Guide to Risk-Based Cybersecurity Reporting

Free guide: Risk-Based Cybersecurity Reporting Made Simple

Bridge the gap between technical teams and leadership. Learn how to deliver concise, risk-focused reports that align with business goals and improve decision-making at all levels.

SOC 2 Compliance Checklist

SOC 2 compliance is no longer optional—it’s essential to a robust cybersecurity posture and cyber risk management strategy. It’s a key indicator of an organization’s commitment to securing data and maintaining operational resilience. In this blog, we’ll offer insights and recommendations to help your organization stay ahead as part of your overarching cybersecurity compliance strategy.

SOC 2 Compliance: What is it & Why Does it Matter?

SOC 2 (short for System and Organization Controls) is a framework developed by the American Institute of Certified Public Accountants (AICPA) to assess how organizations manage customer data based on five trust service principles: security, availability, processing integrity, confidentiality, and privacy.

For businesses engaged in third-party risk management, SOC 2 compliance acts as a baseline for evaluating vendor security practices. A vendor’s SOC 2 report provides a clear window into their security controls, helping you identify potential risks before they impact your business.

Many third-party breaches occur due to weak vendor controls—making it imperative to assess not just whether a vendor is compliant but how their compliance aligns with your organization’s risk tolerance.

Exposure management also plays a crucial role here. SOC compliance can guide organizations in identifying and mitigating risks and gaps across their extended attack surfaces.

SOC 2 Compliance Requirements: Breaking Down the Essentials

To achieve SOC 2 compliance, organizations must demonstrate adherence to the trust service principles through robust controls. Five key requirements include:

  • Security: Implementing measures like firewalls, intrusion detection systems, and encryption to protect against unauthorized access and data exposure.
  • Availability: Ensuring systems are operational and resilient, with disaster recovery plans in place to maintain operations.
  • Processing Integrity: Ensuring system processing is complete, valid, accurate, timely, and authorized.
  • Confidentiality: Protecting sensitive information through strict access controls and data handling policies.
  • Privacy: Managing customer data in line with privacy regulations and transparency requirements, ensuring personal information is collected and used in line with the organization's privacy policy.

Types of SOC Reports and Standards

It’s common to get confused between ​​terms like SOC 1, SOC 2, or Type 1, Type 2. There are three SOC audit standards:

SOC 1

SOC 1 evaluates controls relevant to a service organization's client financial reporting. These reports are essential for entities that impact their clients' financial statements, ensuring that financial data is handled appropriately.

SOC 2

SOC 2 evaluates controls related to security, availability, processing integrity, confidentiality, and privacy. They are vital for service organizations that manage customer data, providing assurance that information is protected and systems are reliable.

SOC 3

SOC 3 offers a high-level overview of the same information found in SOC 2 but is intended for a general audience. It provides assurance without the detailed testing and results, making it suitable for broad distribution, such as a seal of compliance on a company's website.

Type 1 vs. Type 2 Reports

In turn, each of the standards above can have a different type of report:

  • Type 1: Evaluates the design of controls at a specific point in time.
  • Type 2: Assesses the operational effectiveness of controls over a period, typically ranging from six to twelve months.

Type 1 reports are a practical choice for demonstrating compliance quickly. However, Type 2 reports are more comprehensive and provide greater assurance, as they demonstrate the operational effectiveness of your security controls over time.

SOC 2 Compliance Checklist

The path to SOC 2 compliance starts with a pre-assessment to gain a clear picture of the organization’s current security posture. Then moves on to strategic planning—from developing robust policies and implementing effective controls, to prioritizing educational training. Each step contributes toward building a resilient and future-proof security framework.

Whether you’re pursuing compliance for your organization or evaluating vendors, this checklist can guide your journey:

1. Understand the Trust Service Criteria

Identify which systems, processes, and data are subject to SOC 2 evaluation. Assemble the resources needed to achieve compliance—human, technological, and financial.

2. Conduct a Gap Analysis

Assess your current controls and processes to identify gaps in meeting SOC 2 requirements. This readiness assessment will help prioritize areas needing immediate attention.

3. Develop and Implement Policies

Establish robust policies and procedures that address identified gaps, ensuring they align with SOC 2 requirements. Focus on access controls, network security controls, incident response, change management, and data handling protocols. Keep documentation updated as risks and regulatory frameworks evolve.

You will need to build a cross-functional team and engage executive support so that the entire organization shares the goal of securing your data management practices.

4. Strengthen Third-Party Risk Management

Evaluate the SOC compliance of your vendors, especially technology service providers or SaaS companies that store, process, or handle customer data. Require SOC 2 reports as part of your vendor risk assessments and incorporate contractual clauses for maintaining compliance and reporting security incidents.

5. Implement Continuous Monitoring

Use continuous monitoring tools to track your compliance posture in real time and identify any deviations from established security policies. This will ensure that controls remain effective and vulnerabilities are addressed promptly.

6. Engage an Experienced Auditor

AICPA specifies that only a licensed, independent Certified Public Accountant (CPA) or certified professionals from AICPA-licensed firms are authorized to perform SOC 2 audits. Select a qualified firm to conduct your SOC 2 audit, and work with them to ensure all necessary evidence and documentation are prepared for a successful assessment.

Beyond the audit, work on remediating gaps and make it a habit to systematically collect and organize the evidence needed to validate your compliance efforts—so that your organization remains committed and consistent. This includes maintaining change logs and audit trails.

7. Foster a Security-First Culture

Train employees on cybersecurity best practices and the importance of compliance. A well-informed team is key to maintaining long-term compliance and mitigating risks, working as a frontline defense of your organization.

Recommendations for CISOs and Cybersecurity Leaders

SOC 2 compliance isn’t just a certificate—it’s a strategic tool for managing cyber risks and building trust with stakeholders. To make the most of it:

  • Integrate Compliance into Vendor Risk Assessments: Ensure SOC compliance is a key factor in selecting and evaluating vendors. SOC 2 Type 2 reports are generally preferred in vendor risk assessments because they are evidence-based.
  • Leverage Automation: Simplify compliance with tools that automate monitoring, evidence collection, and reporting. Focus your team on strategic tasks, not manual ones.
  • Collaborate Across Teams: Work with GRC, IT, and procurement teams to align compliance efforts with organizational goals.
  • Continuously Assess and Adapt: Regularly review your compliance posture and stay ahead of changes to SOC 2 requirements. Address gaps proactively to maintain confidence and resilience.

With a proactive approach and the right tools, your organization can turn SOC 2 compliance into a competitive advantage, building resilience across your entire digital ecosystem.

A Practical Guide to Risk-Based Cybersecurity Reporting

Free guide: Risk-Based Cybersecurity Reporting Made Simple

Bridge the gap between technical teams and leadership. Learn how to deliver concise, risk-focused reports that align with business goals and improve decision-making at all levels.

GDPR Compliance: An Advanced Guide

The General Data Protection Regulation (GDPR) is a pivotal framework that governs data protection and privacy for individuals within the European Union (EU). Its implications are far-reaching, affecting organizations worldwide that handle EU citizens' data. Understanding and achieving GDPR compliance is essential to avoid substantial penalties and to maintain trust with customers.

General Data Protection Regulation (GDPR) compliance

GDPR compliance entails adhering to the regulations set forth by the law, which aim to protect personal data and uphold the privacy rights of individuals. Personal data is defined as any information which is related to an identified or identifiable natural person. For other definitions, read our breakdown of key GDPR terms.

Organizations must implement appropriate technical and organizational measures to ensure data security, transparency, and accountability in their data processing activities.

Who is subject to GPDR?

Entities that either control or process personal data should be GDPR compliant.

A data controller is any natural or legal person, public authority, agency, or other body that determines the purposes and means of the processing of personal data. In essence, they decide the "why" and "how" data is processed. For example, a healthcare provider that collects patient data on a certain system of their choosing.

A data processor is any natural or legal person, public authority, agency, or other body which processes personal data on behalf of the controller; this means they don’t make decisions about how that data is handled. For example, a payroll company that processes employee salary and tax information for a company (the data controller) based on their instructions.

Although processors operate under the instructions of controllers, they must still comply with GDPR requirements when handling personal data. Read more about how controllers can manage cyber risk from their data processors.

Keys to achieving GDPR compliance requirements

The GDPR establishes stringent principles around lawfulness, fairness, and transparency that organizations must follow, including:

  • Lawful Processing: Data must be processed lawfully, fairly, and transparently.
  • Data Minimization: Only data necessary for the specified purpose should be collected.
  • Accuracy: Data must be accurate and kept up to date.
  • Storage Limitation: Data should be retained only as long as necessary.
  • Integrity and Confidentiality: Data must be processed securely to prevent unauthorized access.

GDPR compliance checklist

Subject organizations should start by assessing their current practices to identify gaps and develop an action plan. Achieving GDPR compliance involves several critical steps:

  1. Data Mapping: Create an inventory and document your processes that relate to personal data collection, processing, and storing. Consider the types of data your organization collects, its source, reason for collection, ways it is processed, and when/how it’s disposed of.
  2. Legal Basis Assessment: Determine the lawful basis for each data processing activity.
  3. Policy Development: Create clear data protection policies and procedures. Ensure the information and the consent language you provide to your customers is transparent, clear, unambiguous, and written in plain language.
  4. Employee Training: Educate staff on GDPR requirements and data protection best practices.
  5. Third-Party Management: Have an understanding of where and how you share personal information with third parties, and ensure that you have the correct contracts in place with these processors to comply with GDPR. Continuously monitor your vendors to assure ongoing compliance.
  6. Regular Audits: Conduct periodic reviews to assess compliance and address any gaps. Engaging with external auditors can provide additional assurance.
  7. Data Protection Officer (DPO): If required under the conditions of Article 37, designate a DPO to oversee data protection strategies, monitor compliance, cooperate with the supervisory authority, and provide advice where requested.
  8. Data Protection Impact Assessments (DPIAs): Evaluate and mitigate risks associated with any new project that is likely to involve “a high risk” to personal data.
  9. Technical Security Measures: Implement encryption, multi-factor authentication, and regular security assessments to mitigate vulnerabilities and prevent data breaches.
  10. Data Subject Rights: Ensure mechanisms are in place for individuals to exercise their rights, such as access, rectification, and erasure of their data, as well as the right to object.
  11. Establish Data Breach Response Plans: Develop procedures to detect, report, and investigate data breaches promptly.

GDPR compliance across the globe

While GDPR is an EU regulation, its reach extends globally. Any organization, regardless of location, that processes the personal data of EU residents must comply with GDPR. This extraterritorial scope means that businesses worldwide need to be aware of and adhere to GDPR requirements.

U.S. companies that handle EU citizens' data are subject to GDPR too. This includes e-commerce sites, service providers, and any business offering goods or services to EU residents. Non-compliance can result in significant fines and legal challenges.

Cookies that collect personal data are subject to GDPR. Organizations must obtain explicit consent from users before placing such cookies on their devices. This involves providing clear information about the cookies' purposes and ensuring users can opt in or out easily. Regular reviews of cookie practices are essential to maintain compliance.

GDPR and CCPA compliance

The California Consumer Privacy Act (CCPA) shares similarities with GDPR, but has distinct requirements. Organizations operating in both jurisdictions must navigate these differences to ensure compliance with both laws. This may involve implementing separate processes for data access requests and understanding the specific definitions and rights under each regulation.

Risk of non-compliance with GDPR

Intentional infringement, a failure to take measures to mitigate damage, or lack of collaboration with authorities can be the cause for penalties. For especially severe violations, listed in Art. 83(5), the fine framework can be up to €20 million, or in the case of an undertaking, up to 4% of the company’s total global turnover of the preceding fiscal year, whichever is higher. Beyond financial repercussions, organizations may suffer reputational damage, loss of customer trust, and legal actions. Therefore, adhering to GDPR is not only a legal obligation but also a critical component of responsible business practice.

GDPR compliance is a comprehensive and ongoing process that requires diligence, transparency, and a commitment to data protection principles. By following the guidelines outlined above, organizations can navigate the complexities of GDPR and build a robust framework for data privacy and security.

cisos guide to reporting to the board cta learn

Security is under the spotlight—and CISOs are expected to perform. This guide helps you report with precision, connect metrics to risk and resilience, and give executives what they need to lead with confidence.

GDPR compliance FAQs

Is double opt-in required for GDPR?

No, double opt-in is not explicitly required under the General Data Protection Regulation (GDPR). However, it can be a recommended practice to help demonstrate valid, informed consent—especially in email marketing. GDPR requires that consent be freely given, specific, informed, and unambiguous. While a single opt-in process can meet these criteria, double opt-in provides an added layer of verification that helps organizations document and prove that consent was obtained properly.

What is a requirement for controllers under the GDPR?

Under the GDPR, data controllers are required to implement appropriate technical and organizational measures to ensure and demonstrate that data processing is compliant with the regulation. This includes maintaining records of processing activities, ensuring transparency with data subjects, enabling rights like access and erasure, and working with processors that offer sufficient guarantees of GDPR compliance. Controllers must also notify supervisory authorities of data breaches within 72 hours, where feasible.

What level of encryption is required for GDPR?

The GDPR does not mandate a specific encryption algorithm or level, but it does require that organizations implement "appropriate technical and organizational measures" to protect personal data. Encryption is explicitly mentioned as a recommended safeguard. The chosen level of encryption should reflect the sensitivity of the data, potential risks, and the state of the art in data protection. Common standards include AES-256 for data at rest and TLS 1.2 or higher for data in transit.

Is SSL required for GDPR?

SSL (Secure Sockets Layer) is outdated and has been replaced by TLS (Transport Layer Security), which is the industry standard for encrypting data in transit. While the GDPR doesn’t explicitly require SSL or TLS by name, it does require appropriate security measures for protecting personal data during transmission. Using TLS is considered a best practice and is often necessary to meet GDPR's expectations for safeguarding data in transit over networks.

Does GDPR require consent for third-party cookies?

Yes, under the GDPR—particularly when interpreted alongside the ePrivacy Directive—organizations must obtain explicit, informed consent before placing or accessing most third-party cookies on a user's device. This includes cookies used for advertising, tracking, or analytics. Consent must be given before the cookies are set, and users should have a clear, easy way to refuse or withdraw consent at any time.

What are the reporting requirements for data breaches under GDPR?

Under the GDPR, organizations must report personal data breaches to the relevant supervisory authority within 72 hours of becoming aware of the breach—unless the breach is unlikely to result in a risk to the rights and freedoms of individuals. If the risk is high, affected individuals must also be informed without undue delay. The report should include details such as the nature of the breach, the categories and number of data subjects affected, likely consequences, and measures taken or proposed to address the breach.