SOC 2 CC2.1: COSO Principle 13: Obtains or Generates Relevant, Quality Information
What This Control Requires
The entity obtains or generates and uses relevant, quality information to support the functioning of internal controls. Information is identified and obtained from relevant internal and external sources, processed into meaningful information, and maintained for quality over time.
In Plain Language
Garbage in, garbage out applies directly to your control environment. If your security logs are incomplete, your asset inventory is stale, or your risk data is months old, you're making decisions in the dark - and auditors will notice.
This means identifying what information you need to manage your control environment, establishing processes for collecting it from internal and external sources, and ensuring it stays accurate, complete, and timely. Think security logs, risk assessments, vulnerability data, compliance reports, and threat intelligence.
Assessors evaluate whether you've defined your information requirements, whether you have reliable processes for gathering and maintaining that information, and whether the information is actually used in decision-making. Collecting data that nobody looks at doesn't satisfy this control.
How to Implement
Identify the information requirements for your internal control environment. Document what data each major control area needs - security monitoring, access management, change management, incident response, risk assessment. Specify sources, frequency, and quality requirements for each type.
Deploy centralised logging and monitoring that captures security-relevant events from all critical systems. Cover authentication events, access changes, system modifications, network activity, and security alerts. Protect logs from tampering, retain them for appropriate periods, and make them available for analysis.
Set up processes for obtaining external information relevant to your security posture: threat intelligence feeds, vendor security advisories, regulatory updates, and industry benchmarking data. Assign someone to monitor these sources and feed relevant information into your risk management processes.
Implement data quality controls for security-relevant information. Validate log data completeness, check accuracy of asset inventories, and reconcile access records with HR data. Regularly audit the quality of your information sources and fix any gaps or inconsistencies.
Build dashboards and reports that turn raw data into actionable information for decision-makers. Management should see key security metrics, control effectiveness indicators, and risk trends. Keep reports timely, accurate, and tailored to different audiences.
Review information requirements at least annually, or whenever there are significant changes to your technology environment, threat landscape, or regulatory obligations. Document the rationale for requirements and any changes made.
Evidence Your Auditor Will Request
- Documented information requirements for internal controls including sources, frequency, and quality criteria
- Centralized logging architecture documentation and evidence of log completeness monitoring
- External threat intelligence and information source subscriptions and integration processes
- Data quality validation procedures and results for security-relevant information
- Management dashboards and reports demonstrating use of quality information for control decisions
Common Mistakes
- Security logs are collected but not centralized or analyzed, providing no actionable information
- No formal process for monitoring external threat intelligence or vendor security advisories
- Information requirements are not documented, leading to ad hoc and inconsistent data collection
- Data quality issues such as incomplete logs, stale asset inventories, or inaccurate access records
- Management receives raw data dumps rather than meaningful reports that support decision-making
Related Controls Across Frameworks
| Framework | Control ID | Relationship |
|---|---|---|
| ISO 27001 | ISO 27001 A.5.7 (related mapping) | Related |
| ISO 27001 | ISO 27001 A.8.15 (partial overlap mapping) | Partial overlap |
| nist-csf | nist-csf DE.AE-02 (related mapping) | Related |
Frequently Asked Questions
What log sources should we centralize at minimum?
How long should we retain security logs?
Do we need a commercial SIEM to meet CC2.1?
Related Articles
The True Cost of Compliance: DIY vs Consultant vs Platform (2026)
A realistic comparison of three compliance approaches - DIY spreadsheets, hiring a consultant, or using a platform - with costs, timelines, and tradeoffs.
Read article →ISO 27001 vs SOC 2: Which Do You Need?
A clear comparison of ISO 27001 and SOC 2 - key differences, when to choose which, where they overlap, and whether you should pursue both.
Read article →SOC 2 for Startups: When You Need It and How to Get Started
A practical guide for startup founders and CTOs on SOC 2 compliance - when it's actually required, Type 1 vs Type 2, realistic costs, and a readiness checklist.
Read article →Track SOC 2 compliance in one place
AuditFront helps you manage every SOC 2 control, collect evidence, and stay audit-ready.
Start Free Assessment