Browse the full policy marketplace catalog
Control and monitor AI usage across your org
Protect codebase and infrastructure from risks
Prevent data leaks and enforce data policies
EU AI Act compliance policy templates
PHI protection and healthcare AI policies
Trust Services Criteria policy templates
AI management system compliance policies
NIST AI Risk Management Framework policies
AI agent security, safety & reliability standard
Regulatory and internal compliance requirements
Enforce code quality and dev best practices
Operational policies for infrastructure workflows
SOC 2 audits require evidence of controls across security, availability, and confidentiality. Aguardic maps your AI governance policies to Trust Services Criteria and generates audit evidence automatically.
Pre-built SOC 2 policy pack — 4 policies, 12 enforceable rules
Policies mapped to Trust Services Criteria (CC6–CC8)
Continuous evidence generation — always audit-ready
14-day free trial · No credit card · Free SOC 2 policy pack
88%
Score
5
Violations
3
Open
4/4
Policies
Policy Coverage
Requirements Coverage
No single tool covers every requirement. Here's exactly what Aguardic covers and what you'll need alongside us.
4
Covered
2
Partial
3
Not Covered
9
Total
CC6.1 — Logical Access Security
Implement logical access security over information assets
Policy enforcement gates which users, systems, and AI models can access sensitive data. Integration-level policies control data flow across all connected tools.
Evidence: Access policy evaluation logs, integration access records
CC6.2 — User Authentication
Authenticate users before granting access to information assets
Requires an identity provider with MFA (e.g., Okta, Azure AD). Aguardic enforces post-authentication policies, not authentication itself.
CC6.3 — Access Authorization
Authorize access based on authorization credentials and system configuration
Policies enforce role-based and context-based access to AI systems and their outputs. Does not manage the underlying authorization infrastructure.
Evidence: Policy evaluation logs with authorization context
CC7.1 — Vulnerability Management
Detect and monitor security vulnerabilities in system components
Requires vulnerability scanning tools (e.g., Snyk, Dependabot). Aguardic governs AI behavior, not infrastructure security.
CC7.2 — Anomaly Detection
Monitor system components for anomalies indicative of malicious acts or errors
Continuous policy evaluation across AI outputs detects anomalous behavior, policy violations, and suspicious patterns. Alerts on violations in real time.
Evidence: Violation alerts, anomaly detection logs, trend reports
CC7.3 — Security Incident Response
Evaluate detected events and respond to identified security incidents
Enforcement modes (Block/Warn/Escalate) provide automated incident response for policy violations. Does not replace a full incident response plan or team.
Evidence: Enforcement action logs, escalation records
CC8.1 — Change Management
Authorize, design, develop, configure, document, test, approve, and implement changes
Policy versioning tracks all changes with timestamps and audit trail. VCS integration enforces code review policies. Every policy change is logged.
Evidence: Policy version history, change approval logs, VCS evaluation records
C1.1 — Confidentiality Commitments
Protect confidential information as committed or agreed
Content scanning policies detect and block sensitive data leakage through AI outputs, document sharing, email, and messaging. Enforcement prevents exposure before it happens.
Evidence: Data leakage prevention logs, blocked disclosure records
C1.2 — Confidential Information Disposal
Dispose of confidential information to meet commitments
Requires data lifecycle management tools. Aguardic prevents leakage but does not manage data retention or disposal.
Coverage mappings are based on Aguardic's current product capabilities mapped to SOC 2 Trust Services Criteria. These mappings should be validated with your auditor for your specific SOC 2 engagement.
Trust Services Criteria
Control who and what can access AI systems and their outputs. Enforce policies on data access, model queries, and output sharing.
Monitor AI system operations, detect anomalies, and enforce operational policies. Track model performance and availability.
Track changes to AI models, policies, prompts, and configurations with full audit trail. Document every modification.
Prevent sensitive data leakage through AI outputs and document sharing. Detect and block confidential information in real time.
Does This Apply to You?
If your customers ask for a SOC 2 report and you use AI in your product, your auditor will expect to see AI-specific controls.
Get Compliant in Three Steps
One-click install. 4 policies with 12 rules mapped to Trust Services Criteria.
Browse in MarketplaceLink AI tools, code repos, messaging, and storage. OAuth into 16 integrations.
Every evaluation logged with full context. Export audit evidence on demand.
Already have internal SOC 2 policies? Upload them and extract enforceable rules automatically
Install the SOC 2 policy pack, connect your AI systems, and get continuous audit evidence from day one.
14-day free trial · No credit card · Free SOC 2 policy pack