SOC 2 vs GDPR

Side-by-side comparison of SOC 2 Type II and GDPR across 49 cybersecurity controls.

47
Shared
2
SOC 2 Only
0
GDPR Only
0
Neither

Covered by Both (47 controls)

Controls recognized by both SOC 2 and GDPR.

Gp Governance Policy
CC1.1, CC1.2, CC1.3 | Art.5(2), Art.24(1), Art.24(2)
Aw Awareness & Training
CC1.4, CC2.2 | Art.39(1)(b), Art.47(2)(n)
Rm Risk Management
CC3.1, CC3.2, CC3.3 | Art.24(1), Art.32(1)
Sc Supply Chain Risk
CC9.2 | Art.28(1), Art.28(2)
Rr Roles & Responsibilities
CC1.3, CC1.4 | Art.37(1), Art.38(1), Art.39(1)
Cm Compliance
CC2.1, CC4.1, CC4.2 | Art.5(2), Art.58(1), Art.83(1)
Am Asset Management
CC6.1 | Art.30(1)
Ra Risk Assessment
CC3.2, CC3.4 | Art.35(1), Art.35(7)
Be Business Environment
CC1.1, CC1.2 | Art.35(7)(b)
Da Data Classification
CC6.1, CC6.5 | Art.9(1), Art.5(1)(c)
Vn Vulnerability Mgmt
CC7.1 | Art.32(1)(d)
Ac Access Control
CC6.1, CC6.2, CC6.3 | Art.32(1)(b), Art.25(2)
Mf Multi-Factor Auth
CC6.1 | Art.32(1)(b)
En Encryption
CC6.1, CC6.7 | Art.32(1)(a), Art.34(3)(a)
Dp Data Protection
CC6.1, CC6.5, CC6.7 | Art.5(1)(f), Art.32(1)
Bk Backup & Recovery
A1.2, CC7.5 | Art.32(1)(c)
Pa Privileged Access
CC6.1, CC6.2, CC6.3 | Art.32(1)(b), Art.29
Fw Firewall / Net Seg
CC6.1, CC6.6 | Art.32(1)(b)
Ep Endpoint Protection
CC6.8, CC7.1 | Art.32(1)(b)
Pm Patch Management
CC7.1 | Art.32(1)(d)
Cf Secure Config
CC6.1, CC7.1 | Art.25(1), Art.32(1)
Sd Secure Development
CC8.1 | Art.25(1), Art.25(2)
Ml Email Security
CC6.8 | Art.32(1)(b)
Ws Web Security
CC6.6, CC6.8 | Art.32(1)(b)
Zt Zero Trust
CC6.1, CC6.3 | Art.32(1)(b), Art.25(1)
Mb Mobile Security
CC6.7 | Art.32(1)(b)
Cl Cloud Security
CC6.1, CC6.7, CC7.1 | Art.28(1), Art.32(1)
Wf WAF
CC6.6 | Art.32(1)(b)
Dl DLP
CC6.5, CC6.7 | Art.5(1)(f), Art.32(1)(b)
Sm Cont. Monitoring
CC7.1, CC7.2 | Art.32(1)(d)
Lg Logging & Audit
CC7.2, CC7.3 | Art.5(2), Art.30(1)
Id Intrusion Detection
CC7.2 | Art.32(1)(d), Art.33(1)
An Anomaly Detection
CC7.2 | Art.32(1)(d)
Sg SIEM / SOC
CC7.2, CC7.3 | Art.32(1)(d)
Ir Incident Response
CC7.3, CC7.4, CC7.5 | Art.33(1), Art.33(2)
Fn Forensics
CC7.4 | Art.33(3)
Co Communication
CC2.3, CC7.4 | Art.33(1), Art.34(1)
Mt Mitigation
CC7.4, CC7.5 | Art.33(3)(d), Art.34(2)
Rp Reporting
CC2.3, CC7.3 | Art.33(1), Art.34(1)
Rc Recovery Planning
A1.2, A1.3 | Art.32(1)(c)
Bc Business Continuity
A1.1, A1.2, A1.3 | Art.32(1)(b), Art.32(1)(c)
Ll Lessons Learned
CC4.2, CC7.5 | Art.32(1)(d), Art.24(1)
Cr Comms & Restore
CC2.3, A1.2 | Art.34(1), Art.32(1)(c)
Dr Disaster Recovery
A1.2, A1.3 | Art.32(1)(c)
Ap API Security
CC6.1, CC6.6, CC8.1 | Art.25(1), Art.32(1)(b)
It Insider Threat
CC6.2, CC6.3, CC7.2 | Art.29, Art.32(1)(b), Art.32(4)
Vr Vendor Risk Mgmt
CC9.2, CC3.2 | Art.28(1), Art.28(2), Art.28(3)

Only in SOC 2 (2 controls)

Controls covered by SOC 2 but not GDPR. Organizations using GDPR should consider supplementing with these.

Summary: SOC 2 vs GDPR

SOC 2 Type II and GDPR share 47 controls in common out of 49 total. SOC 2 uniquely covers 2 controls that GDPR does not, including Threat Intelligence, DNS Security. GDPR uniquely covers 0 controls that SOC 2 does not. Together, these two frameworks cover all tracked controls. For comprehensive cybersecurity coverage, organizations often adopt both frameworks or supplement with other frameworks.

View Interactive Dashboard