← Articles

April 4, 2026 · Tim Fraser, Cloud Operations Lead

AWS Security Audit Checklist for SOC2 Compliance

If your company runs on AWS and a customer has asked about SOC2, you're about to learn a lot about audit evidence. SOC2 isn't a certification you pass once — it's an ongoing demonstration that your organisation handles data responsibly. And if your infrastructure lives in AWS, most of the evidence comes from how your account is configured.

Here's what SOC2 auditors actually look for in an AWS environment, and how to make sure you're ready.

What SOC2 auditors care about

SOC2 is built around five Trust Service Criteria: security, availability, processing integrity, confidentiality, and privacy. Most audits focus heavily on security and availability. In practice, that translates to a set of recurring questions about your AWS setup.

The auditor doesn't care which AWS services you use. They care whether you can demonstrate controls are in place — and that they've been in place consistently, not just on the day of the audit.

The checklist

1. Identity and access management

2. Encryption

3. Logging and monitoring

4. Network security

5. Incident response

6. Change management

The evidence problem

Here's where most companies struggle: SOC2 isn't just about having controls in place today. It's about proving they were in place throughout the audit period — typically 6 or 12 months.

That means you need continuous evidence. Showing an auditor a clean IAM configuration on audit day doesn't help if you can't demonstrate it was clean in June, August, and October too.

This is what makes SOC2 genuinely difficult. It's not a technical challenge — most of the controls above are straightforward to implement. The hard part is maintaining them consistently and proving it.

How plainfra provides continuous audit evidence

This is where plainfra's weekly health reports become directly useful for SOC2. Every week, plainfra scans your connected AWS accounts with read-only access and produces a prioritised report covering security, access, encryption, and network configuration.

Each weekly report is a timestamped record of your security posture. Over a 12-month audit period, that's 52 data points showing that your controls were consistently in place — or flagging the week something drifted.

When an auditor asks "how do you monitor for overly permissive IAM policies?" or "how would you detect a public S3 bucket?", the answer is simple: plainfra checks every week and alerts on findings. Here are the reports.

Between audits, you can ask plainfra direct questions: "Which IAM users don't have MFA?", "Are all my EBS volumes encrypted?", "Show me security groups open to the internet." It makes the API calls, reads the responses, and gives you a clear answer in seconds — no console spelunking required.

The always-on monitoring means you catch configuration drift the week it happens, not eleven months later when the auditor finds it. That's the difference between a smooth audit and a scramble.

Try plainfra free → 50K tokens, 7 days, no charge. Or see the interactive demo →.