CC1: Common Criteria — Control Environment Requirements
Understand SOC 2 CC1 control environment requirements: tone at the top, organizational structure, HR controls, and how auditors evaluate them.
- CC1 covers the COSO control environment — the foundation all other SOC 2 criteria build on.
- Auditors look for a documented code of conduct, org chart, and background check policy.
- Board or leadership oversight (CC1.2) must be demonstrable through meeting minutes or written reviews.
- HR processes — onboarding, role definitions, performance reviews — are direct CC1 evidence.
- Weak control environment findings can escalate to qualified opinions even when technical controls pass.
In this guide
What Is CC1?
CC1 is the first category in the AICPA Trust Services Criteria (TSC) common criteria section. It maps directly to the COSO Internal Control Framework's "Control Environment" component — the set of standards, processes, and structures that form the foundation of internal control across the organization.
Unlike technical controls that can be verified with a screenshot or log export, CC1 is evaluated through policies, organizational evidence, and interviews. An auditor assessing CC1 wants to know: does leadership set the right tone, are roles and responsibilities clearly defined, and does the company have the HR processes to hire, train, and hold accountable the people responsible for controls?
For SaaS companies pursuing SOC 2 Type II, CC1 is often the first area populated in a readiness assessment. Getting it right sets the stage for every other control category.
CC1 Criteria Breakdown
CC1 contains five sub-criteria: CC1.1 through CC1.5. Each maps to a COSO principle and each has specific points of focus that auditors use to evaluate design and operating effectiveness.
CC1.1 — The entity demonstrates a commitment to integrity and ethical values. CC1.2 — The board of directors (or equivalent) demonstrates independence from management and exercises oversight. CC1.3 — Management establishes, with oversight, structures, reporting lines, and appropriate authorities. CC1.4 — The organization demonstrates commitment to attracting, developing, and retaining competent individuals. CC1.5 — The organization holds individuals accountable for their internal control responsibilities.
Each sub-criterion has "Points of Focus" — implementation guidance from the AICPA that auditors use to evaluate whether a control is designed and operating effectively. Not every point of focus needs to be addressed if the entity can demonstrate compensating controls.
Tone at the Top (CC1.1)
CC1.1 requires the organization to demonstrate a commitment to integrity and ethical values. In practice, auditors look for a code of conduct or ethics policy that all employees acknowledge, a whistleblower or speak-up mechanism, and documented disciplinary actions when violations occur.
For early-stage startups, this often means creating a formal Code of Business Conduct document, adding it to the employee handbook, and collecting annual e-signatures. Tools like Rippling, BambooHR, or even a simple Google Form signature capture work as evidence.
The key is operationalization — the policy needs to be communicated, not just written. Auditors will check that new hires sign it during onboarding and that existing employees re-acknowledge it at least annually.
Board and Management Oversight (CC1.2)
CC1.2 requires the board or equivalent governing body to exercise oversight of the system of internal control. For VC-backed startups without a formal board of directors, an audit committee or advisory board with documented review responsibilities can satisfy this criterion.
Evidence auditors typically request: board meeting minutes that reference security or compliance reviews, quarterly risk reports presented to leadership, and documentation showing the board has reviewed and approved the security program at least annually.
If your company lacks a formal board, designate a security oversight committee — even a monthly meeting between the CEO and CTO reviewing security metrics, documented in meeting minutes, demonstrates the oversight the criterion requires.
Organizational Structure (CC1.3)
CC1.3 requires defined reporting lines and assigned authorities and responsibilities. The primary evidence artifact is an org chart, but auditors also look for documented role descriptions that include security and compliance responsibilities.
Job descriptions should state who is responsible for maintaining security controls. The CISO or Head of Engineering should have a written mandate that includes information security. If these responsibilities are split, a RACI matrix clarifying who is Responsible, Accountable, Consulted, and Informed for key security decisions satisfies the criterion.
Auditors also check that reporting lines are appropriate — an engineer who also approves their own access changes, for example, is a segregation of duties finding that originates in CC1.3.
HR and Competency Controls (CC1.4–CC1.5)
CC1.4 covers attracting, developing, and retaining competent personnel. Evidence includes job descriptions with required qualifications, documented onboarding checklists, security awareness training records, and professional development plans.
CC1.5 covers accountability — holding individuals responsible for their control obligations. This is demonstrated through performance review processes that include security objectives, documented disciplinary procedures, and a user access review process that ties access rights to job function.
Background checks are a critical CC1.4 evidence item. Your policy should define which roles require a background check, what the check covers (criminal, employment verification, etc.), and your process for handling adverse findings. Auditors will sample new-hire records to verify the process is followed.
Evidence to Collect for CC1
For a Type II audit covering a 12-month period, prepare the following CC1 evidence: (1) Code of Conduct signed by all employees — export from your HR system showing sign dates. (2) Org chart current as of audit period. (3) Board or leadership meeting minutes that reference security reviews. (4) Background check policy and sample completed check records (redacted). (5) Security awareness training completion records. (6) Job descriptions for key security roles. (7) Performance review records showing security objectives.
AuditPath automates evidence collection for CC1.4 by integrating with Okta, BambooHR, and Google Workspace to pull training completion and onboarding records directly, eliminating manual spreadsheet exports.
Common CC1 Gaps
The most common CC1 finding is a code of conduct that exists but isn't formally acknowledged by employees. A document sitting in Notion that nobody signs is not a control — it's a draft.
The second most common gap is lack of board-level oversight documentation. Founding teams often skip meeting minutes, but auditors need to see that leadership is reviewing the security program at a cadence. Start keeping minutes from your next security review.
Third: background checks not run consistently. Auditors will sample 5-10 new hires from the audit period. If any are missing background checks, it's a finding. Define the policy, automate the trigger in your HR system, and keep records.
Frequently Asked Questions
Does CC1 apply to Type I audits as well as Type II?
We are a 10-person startup. Do we need a formal board to satisfy CC1.2?
What counts as "security awareness training" for CC1.4?
Can a contractor satisfy CC1.4 competency requirements?
How far back do auditors look at HR records for a Type II audit?
Automate your compliance today
AuditPath runs 86+ automated checks across AWS, GitHub, Okta, and 14 more integrations. SOC 2 and DPDP Act. Free plan available.
Start for free