SOC 2 Security Monitoring: SIEM, Alerts, and Evidence
Build a SOC 2-compliant security monitoring program. Learn SIEM options, what to alert on, how to document alert review, and the CC7.2 evidence auditors expect.
- CC7.2 requires the entity to monitor the system to detect anomalies and potential threats.
- A SIEM (Datadog, Splunk, Sumo Logic) or SIEM-equivalent aggregates logs and provides correlation and alerting.
- Alerts must be actionable, assigned, and documented — not just emailed and ignored.
- For AWS-centric companies, Security Hub + GuardDuty + CloudWatch provides SIEM-like capabilities without a dedicated SIEM.
- Monthly security review meetings with documented minutes satisfy the CC4.2 deficiency reporting requirement.
In this guide
Security Monitoring and SOC 2 CC7.2
CC7.2 requires the entity to monitor system components and the operation of those controls on an ongoing basis to detect anomalies that are indicative of malicious acts, natural disasters, and errors affecting the entity's ability to meet its objectives.
The key word is "ongoing" — one-time checks or annual reviews don't satisfy CC7.2. Monitoring must be continuous, and the output (alerts, reports, findings) must be reviewed by a human who can take action. The challenge is building a monitoring program that produces actionable signal without overwhelming alert fatigue.
What to Log and Where
A comprehensive CC7.2 monitoring program covers multiple log sources: Infrastructure layer (CloudTrail API calls, VPC Flow Logs, AWS Config changes), Platform layer (container runtime logs, Kubernetes audit logs, ECS task logs), Application layer (application error logs, authentication events, data access events), and Endpoint layer (EDR telemetry, MDM events).
Centralize logs in a single platform for correlation — AWS CloudWatch Logs, Datadog, Splunk, or Sumo Logic. Log correlation is what separates a SIEM from a collection of individual log sources. A SIEM can correlate an authentication failure in CloudTrail with an unusual API call five minutes later and trigger a single alert, reducing investigation time.
SIEM Options for SaaS Companies
AWS Security Hub: native AWS tool that aggregates findings from GuardDuty, Config, Inspector, Macie, and third-party integrations. Not a full SIEM but provides a centralized security findings console. Suitable as a starting point for small teams.
Datadog Security Monitoring: cloud-native SIEM that integrates with CloudTrail, application logs, and 400+ integrations. Detection rules written in SQL-like query language. Good for teams already using Datadog for APM and infrastructure monitoring.
Splunk Cloud: enterprise-grade SIEM with the most mature detection rule ecosystem. High cost but highest capability. Suitable for larger SaaS companies with dedicated security teams.
Sumo Logic Cloud SIEM: mid-market option with good AWS integration and pre-built SOC 2 detection content. Cloud Security Operations Center (CSOC) add-on provides managed detection.
What to Alert On
High-priority alerts (immediate response required): Root AWS account login, IAM policy change on a privileged role, GuardDuty HIGH severity finding, public S3 bucket detected, production security group opened to 0.0.0.0/0, failed MFA attempts exceeding threshold, CloudTrail disabled or logging paused.
Medium-priority alerts (review within 24 hours): User accessing production systems outside business hours for the first time, large data export (S3 GetObject on >10,000 objects), new IAM access key created, EC2 instance launched in an unexpected region, application error rate spike >50%.
Low-priority items (weekly review): Access key age >60 days, MFA not enrolled for new user account after 7 days, vulnerability scan findings summary, software dependency CVE notification.
Alert Review and Documentation
Alerts must be reviewed and actioned to satisfy CC7.2. Configure your alerting to create a ticket in Jira or your ITSM for every High priority alert. Require that each ticket is assigned, investigated, and closed with a resolution note. The ticket history is your CC7.2 evidence.
Hold a monthly security review meeting: review all Medium and Low alerts from the month, review open vulnerability findings, review access review results, and update the risk register if new risks are identified. Keep meeting minutes. This meeting is your CC4.2 deficiency reporting evidence — it demonstrates that monitoring findings are escalated to management.
Review your alert rules annually and tune them: suppress false positives, add new rules for emerging threats, and retire rules that no longer apply. Document the rule review.
Security Monitoring Evidence
(1) SIEM or monitoring tool configuration showing enabled log sources and detection rules. (2) Alert routing configuration showing High priority alerts go to Jira or ticketing. (3) Sample alert tickets from the audit period showing investigation and resolution. (4) Monthly security review meeting minutes from the audit period. (5) AWS Security Hub findings dashboard screenshot. (6) Alert rule tuning records showing annual review of detection rules.
Frequently Asked Questions
Do we need a dedicated SIEM tool for SOC 2, or can we use AWS-native tools?
How do we evidence that we are actually reviewing alerts, not just receiving them?
What is alert fatigue, and how does it affect SOC 2 compliance?
Should we enable all available detection rules in our SIEM from day one?
How do we handle after-hours alerts when the team is small?
Automate your compliance today
AuditPath runs 86+ automated checks across AWS, GitHub, Okta, and 14 more integrations. SOC 2 and DPDP Act. Free plan available.
Start for free