SOC2 Control Mapping

How Varax maps Kubernetes security checks to SOC2 Trust Services Criteria.

Overview

Varax maps Kubernetes security checks to SOC2 Trust Services Criteria (TSC) controls. Each check is associated with one or more SOC2 controls, and control status is derived from the results of its constituent checks.

Control Mapping

ControlNameCategoryChecks
CC5.1Control EnvironmentGovernance4
CC5.2Control ActivitiesGovernance6
CC6.1Logical Access ControlsAccess Control8
CC6.2System CredentialsAccess Control4
CC6.3Authorization ControlsAccess Control6
CC6.6Security Event MonitoringMonitoring3
CC6.7Data Transmission SecurityData Protection4
CC6.8Vulnerability ManagementSecurity5
CC7.1Detection ActivitiesMonitoring4
CC7.2Incident ResponseOperations3
CC7.3Threat MitigationOperations3
CC7.4Recovery ActivitiesOperations2
CC8.1Change ManagementOperations4
A1.1System AvailabilityAvailability3
A1.2Recovery OperationsAvailability2

How Scoring Works

Control status is derived from its mapped checks:

StatusCondition
PassAll mapped checks pass
FailAny mapped check fails
PartialSome checks pass, some fail or warn
Not AssessedAll mapped checks were skipped

The overall compliance score is calculated as:

Score = (Passing Controls / Assessed Controls) × 100

Controls where all checks are skipped or provider-managed are excluded from the score calculation.

Example: CC6.1 — Logical Access Controls

CC6.1 maps to 8 checks covering:

  • RBAC configuration (cluster roles, role bindings)
  • Service account token management
  • Default namespace restrictions
  • Pod security admission

If 7 of 8 checks pass and 1 fails, CC6.1 status is Partial.

Shared Responsibility on Managed Kubernetes

On managed clusters (EKS, AKS, GKE), many CIS checks cover provider-managed components (API server flags, etcd encryption, scheduler config). These are reported as Provider-Managed in Varax reports.

Your auditor needs to see both:

  • Customer-controlled: RBAC, pod security, network policies, secrets management, workload configuration — these are your responsibility
  • Provider-managed: Control plane configuration, etcd encryption at rest, API server TLS — these are covered by your cloud provider’s compliance certifications (e.g., AWS SOC2 report)

Varax reports include a shared responsibility section that clearly maps which controls fall where, giving your auditor a complete picture without you needing to compile this manually.

Using Control Data in CI/CD

Export control status as JSON for pipeline integration:

varax status --controls --json

Fail a pipeline if the compliance score drops below a threshold:

varax scan --json | jq -e '.summary.score >= 80'