Compliance Checklist

Complaince-Score Card

Checklists [SOC 2, HIPAA, ISO 27001]

Golf-Ball

1. SOC 2 Compliance Checklist

SOC 2 focuses on the Trust Services Criteria — Security (mandatory), Availability, Confidentiality, Processing Integrity, and Privacy. (The HIPAA Journal)

Scope & Planning

  • Define the SOC 2 scope (systems, data, services). (ISMS.online)
  • Choose applicable Trust Services Criteria (Security mandatory; others as needed). (ISMS.online)
  • Assign compliance roles & responsibilities. (Hicomply)

Policies & Documentation

  • Information security policy suite (access control, incident response, change management). (Hicomply)
  • Data classification & handling procedures. (Hicomply)
  • Privacy and confidentiality policies. (The HIPAA Journal)

Risk & Access Controls

  • Perform a formal risk assessment and risk treatment plan. (DSALTA)
  • Implement logical and physical access controls (MFA, RBAC, principle of least privilege). (Compliancy Group)
  • Quarterly access reviews and recertification. (Compliancy Group)

Technical Security

  • Network firewalls, IDS/IPS, and SIEM monitoring. (Compliancy Group)
  • Encryption of data at rest and in transit. (The HIPAA Journal)
  • Vulnerability scanning and penetration tests.

Availability & Monitoring

Incident Response & Business Continuity

  • Formal incident response plan (detect, respond, recover). (DSALTA)
  • Documented disaster recovery and business continuity plans. (DSALTA)

Third-Party & Vendor Risk

  • Vendor inventory with contract and security requirements. (DSALTA)
  • Annual or risk-based third-party security assessments.

Audit Preparation

  • Collect evidence (logs, screenshots, documentation). (DSALTA)
  • Gap assessment, remediation actions documented. (Drata)
  • Engage SOC 2 auditor.
Golf-Ball

2. HIPAA Compliance Checklist

HIPAA compliance applies if your site handles Protected Health Information (PHI). It is centered on Administrative, Technical, and Physical Safeguards.

Administrative Safeguards

  • HIPAA policies & procedures (privacy, security, breach notification).
  • Assigned security/privacy officers.
  • Workforce training on HIPAA rules and PHI handling.
  • Risk assessment and risk management plan.
  • Documentation of risk analysis and mitigation.
  • Sanction policy for workforce non-compliance.

Technical Safeguards

  • Access controls (unique user IDs, MFA, session timeout).
  • Encryption for PHI in transit and at rest. (DSALTA)
  • Automatic log-off procedures.
  • Audit controls (log review, monitoring systems).
  • Integrity controls (checksums, hashes, versioning).

Physical Safeguards

  • Facility access controls (badges, locks).
  • Workstation use and security standards.
  • Device and media controls for hardware that stores PHI.

Breach & Incident Response

  • HIPAA-specific breach response plan.
  • Notification procedures within HHS timelines.

Business Associate Agreements

  • Signed agreements (BAAs) with vendors handling PHI.
Golf-Ball

3. ISO 27001 Compliance Checklist

ISO 27001 is a formal Information Security Management System (ISMS) certification with structured documentation and audit requirements. (DSALTA)

ISMS Foundation

  • Establish ISMS scope and objectives aligned with business.
  • Executive leadership commitment and governance.

Risk Management

  • Perform formal risk assessment and risk treatment plans. (DSALTA)
  • Maintain a risk register. (DSALTA)
  • Statement of Applicability (SoA) detailing selected controls.

Policies & Procedures

  • Information security policies approved and published.
  • Asset management procedures.
  • Acceptable use and data classification policies.

Control Implementation (Annex A Controls)

ISO 27001 includes ~90 controls across Annex A domains. Examples:

  • Identity & access control (A.9) (DSALTA)
  • Cryptography (A.10) (DSALTA)
  • Physical & environmental security (A.11)
  • Operations security (A.12) — monitoring, logging
  • Communications security (A.13)
  • Supplier relationships (A.15)
  • Incident management (A.16)
  • Business continuity (A.17)

Training & Awareness

  • Security awareness training records. (DSALTA)

Internal Audit & Review

  • Internal audits of ISMS processes. (DSALTA)
  • Management review meetings documented. (DSALTA)
  • Corrective action follow-ups tracked.

Continuous Improvement

  • Monitor control effectiveness.
  • Update risk treatments and SoA annually.
Golf-Ball

Tips for Combined Compliance

Since these frameworks overlap (e.g., access control, logging, incident response), you can standardize common controls and evidence to satisfy all three rather than duplicating effort. (DSALTA)

Examples Of Overlaps:

  • Access management (MFA, RBAC) — SOC 2, ISO 27001, and HIPAA all require strong controls. (DSALTA)
  • Risk assessments — required for ISO 27001 and valuable for SOC 2/HIPAA programs. (DSALTA)
  • Incident response plans — part of all three frameworks. (DSALTA)

If you want, I can turn this into a customized Excel/CSV audit checklist or tie it to your specific tech stack and threat model.

pdf
Download Compliance Checklists