SOC 2 Evidence Export
Igris maps your audit events to SOC 2 Trust Services Criteria and exports evidence packages for your auditor. Evidence is auto-populated from real system data, and exports include HMAC-SHA256 integrity hashes.Supported Controls
Igris provides evidence for the following Common Criteria:| Control | Name | Evidence Source |
|---|---|---|
| CC6.1 | Logical and Physical Access Controls | Policy enforcement events (allow/deny), authentication events |
| CC6.7 | Restriction of Data Transmission | Proxy-intercepted tool calls, denied transmissions |
| CC7.2 | Monitoring of System Components | Audit event coverage, anomaly detection alerts |
| CC7.3 | Detection of Unauthorized Changes | Denied tool calls, destructive pattern anomalies |
Generating an Export
- Go to Compliance → SOC 2 Evidence
- Select a date range (minimum 90 days for Type II)
- Choose export format (CSV or JSON)
- Click Export
Type II Validation
SOC 2 Type II requires evidence over a minimum 90-day observation period. Igris validates this automatically:- If your date range is less than 90 days, the export includes a
typeII: falseflag and a warning - If 90 days or more,
typeII: trueis set and the export includes the observation period summary - The validation checks that audit events exist consistently throughout the period (not just at the start and end)
Evidence Structure
Each export contains:Evidence Integrity
Every export includes anintegrityHash — an HMAC-SHA256 hash of the entire evidence payload computed with your organization’s secret. This allows your auditor to verify the export hasn’t been modified after generation.
Verifying integrity:
The hash covers the controls and validation objects. Your auditor can verify the export using the Verify button on the SOC 2 Evidence page in the dashboard.
Best Practices
- Start early — begin routing tool calls through Igris at least 90 days before your SOC 2 audit
- Use deny policies — CC6.1 and CC7.3 evidence is strongest when you actively enforce access controls
- Enable anomaly detection — CC7.2 requires evidence of monitoring, which anomaly alerts provide
- Export regularly — generate monthly exports to track coverage and identify gaps before the audit