SOC 2 cloud control mapper
Map Terraform change categories to SOC 2 evidence.
Use this static mapper to plan review notes for common AWS resource changes. It is high-level by design: raw Terraform plans stay local, and readtheplan can generate control-mapped evidence from your CI or workstation.
The mapping below is useful for triage and auditor conversations. Treat it as a starting point, then verify exact control IDs against your control matrix and the generated readtheplan evidence envelope.
Placeholder inbox: pilot-contact@example.com. Replace the configured pilot handoff address before production use.
AWS / Terraform categories
SOC 2 control family map
FAQ
Mapper questions
Can this replace a SOC 2 control matrix?
No. It gives a useful high-level map for cloud changes. Your auditor, control owner, and internal control matrix remain authoritative.
How does readtheplan help with evidence?
readtheplan runs locally or in CI against Terraform JSON and can produce risk tiers, reviewer context, control IDs, and signed evidence.
Next step
Wire it into one repo.
Start with one private production repo, confirm the plan JSON artifact path, and route SOC 2 review notes to the pilot setup flow.
Open setup generator