🔒 Security Controls

Top 10 Security Controls
Every Startup Should Implement

The controls that form the foundation of every SOC 2, ISO 27001, and DPDP Act compliance programme, explained in plain language with implementation steps, cost estimates, and framework mappings.

SS
Soham Sawant
✍️ Cybersecurity Expert & Technical Writer·📖 7 min read
📅 March 11, 2026·🏢 SecComply
90%
Of breaches preventable by these controls
10
Controls covering SOC 2, ISO 27001 & DPDP
8 wks
Typical full implementation timeline
$0
Starting cost for 4 of the 10 controls

Compliance frameworks look overwhelming at first glance, SOC 2 has 64 criteria, ISO 27001 has 93 Annex A controls, and DPDP Act adds its own obligations on top. But underneath all of them, the same foundational controls appear again and again. Get these ten right, and you have answered the most common audit questions before the auditor asks them.

Cybersecurity controls and network security monitoring
The 10 controls in this guide address the root cause of over 90% of security incidents, and collectively satisfy the core requirements of SOC 2, ISO 27001, and DPDP Act.
🎯 The Pattern

These 10 controls collectively address the root cause of over 90% of security incidents. They are not the most complex controls, they are the most commonly missing ones. Implement them in order, starting with MFA.

01
Access Security
🔐Multi-Factor Authentication (MFA)

MFA is the single highest-impact control a startup can implement. Over 80% of breaches involve compromised credentials, MFA stops the vast majority of them. Enforce MFA across every system: cloud console, code repository, email, HR system, and any tool containing customer data. No exceptions for founders, engineers, or administrators.

💡 Implementation: Enable MFA in Google Workspace or Microsoft 365 at the organisation level. Enforce in AWS IAM with an explicit deny policy for non-MFA sessions. Okta or JumpCloud centralises enforcement across all tools in one place.
📋 Framework coverage: SOC 2 CC6.1 · ISO 27001 A.8.5 · DPDP Act Security Safeguard
02
Identity Management
🛡️Access Control & Least Privilege

Every employee should have access to exactly the systems and data they need to do their job, and nothing more. "Everyone has admin" is not an access control policy. Role-based access control (RBAC) defines permissions by job function, not by individual. Access reviews quarterly ensure that permissions are still appropriate as roles change.

💡 Implementation: Define three roles minimum: read-only, operator, and administrator. Review all permissions when someone changes roles or leaves. Automate offboarding through Okta Lifecycle Management to revoke all access within minutes of a departure.
📋 Framework coverage: SOC 2 CC6.2, CC6.3 · ISO 27001 A.5.15, A.8.2 · DPDP Act Purpose Limitation
03
Data Protection
🔒Data Encryption (at Rest & in Transit)

Unencrypted data is a breach waiting to happen. Encryption at rest means data stored in databases, file systems, and backups is encrypted. Encryption in transit means all data moving between systems, APIs, and users is protected with TLS 1.2 or higher. Both are non-negotiable for any compliance framework and most enterprise security questionnaires.

💡 Implementation: Enable AES-256 encryption at rest for all AWS RDS, S3, and EBS volumes, one checkbox per service. Enforce HTTPS on all endpoints. Audit using AWS Config rule: "encrypted-volumes" and "s3-bucket-ssl-requests-only".
📋 Framework coverage: SOC 2 CC6.7 · ISO 27001 A.8.24 · DPDP Act Security Safeguard
04
Threat Reduction
🔍Vulnerability Management

Known vulnerabilities in dependencies, containers, and infrastructure are the most predictable attack vector. Vulnerability management means scanning continuously, prioritising by severity, and remediating within defined SLAs. A critical CVE (CVSS 9.0+) in production code with no remediation plan is a material risk, and a finding in every security audit.

💡 Implementation: Snyk for application dependencies integrated into every pull request. AWS Inspector for EC2 and container image scanning. Set remediation SLAs: Critical ≤7 days, High ≤30 days, Medium ≤90 days. Track in Jira or Linear.
📋 Framework coverage: SOC 2 CC7.1 · ISO 27001 A.8.8 · DPDP Act Security Safeguard
05
Human Layer
🎓Security Awareness Training

The majority of successful attacks start with a human, a phishing email clicked, a credential reused, a USB drive plugged in. Annual security awareness training is not a nice-to-have; it is a mandatory SOC 2 control and an ISO 27001 requirement. Training must cover phishing recognition, password hygiene, incident reporting, and data handling.

💡 Implementation: KnowBe4 or Proofpoint Security Awareness for automated phishing simulations and training modules. Run a quarterly phishing simulation. Track completion rate, 100% completion is the SOC 2 auditor's expectation. Under £2,000/year for a 20-person startup.
📋 Framework coverage: SOC 2 CC2.2 · ISO 27001 A.6.3 · DPDP Act Security Safeguard
06
Resilience
🚨Incident Response Plan

When, not if, a security incident occurs, the response quality determines the outcome. An undocumented, improvised response leads to delayed containment, regulatory notification failures, and customer trust destruction. An incident response plan defines: what counts as an incident, who is on the response team, the escalation sequence, the containment steps, and the notification obligations under DPDP Act and other regulations.

💡 Implementation: Document a one-page incident response procedure covering: detection → triage → containment → eradication → recovery → post-incident review. Define your DPDP Act breach notification trigger (72-hour clock starts on awareness). Test with a tabletop exercise once per year.
📋 Framework coverage: SOC 2 CC7.3, CC7.4 · ISO 27001 A.5.24, A.5.26 · DPDP Act Breach Notification
07
Supply Chain
🤝Vendor Risk Management

Your security posture is only as strong as your weakest vendor. The Okta breach in 2022 came through a third-party support vendor. The MOVEit breach in 2023 affected thousands of companies through a single file transfer tool. Every vendor that processes your customer data or has access to your systems extends your attack surface. Vendor risk management means assessing, documenting, and monitoring that surface.

💡 Implementation: Maintain a vendor inventory. For any vendor with access to personal data or production systems, obtain their SOC 2 report or ISO 27001 certificate annually. Include security obligations in every vendor contract. Review quarterly.
📋 Framework coverage: SOC 2 CC9.2 · ISO 27001 A.5.19, A.5.20 · DPDP Act Data Processor Obligations
08
Business Continuity
💾Backup & Recovery Testing

A backup that has never been tested is not a backup, it is a hope. Ransomware attacks are now the most common cause of business disruption for startups, and the only real defence is clean, recent, tested backups that are stored separately from production systems. Recovery testing once per quarter proves that backups work before you need them.

💡 Implementation: Enable automated daily backups for all databases to a separate AWS account. Set retention to 30 days minimum. Run a full restore test quarterly and document the result. Recovery Time Objective (RTO) and Recovery Point Objective (RPO) should be defined and tested.
📋 Framework coverage: SOC 2 A1.2 · ISO 27001 A.8.13, A.5.30 · DPDP Act Security Safeguard
09
Visibility
📋Audit Logging & Monitoring

You cannot investigate what you cannot see. Audit logging captures who did what, when, and from where across every system. Monitoring alerts on suspicious patterns, failed logins, privilege escalation, unusual data exports. Twelve months of log retention is a hard SOC 2 requirement. Three specific alerts cover the majority of first-time audit findings.

💡 Implementation: Enable AWS CloudTrail in all regions with 12-month S3 retention. Create three CloudWatch alarms: root account login, console login without MFA, security group modification. For SaaS logs, centralise in Datadog or Elasticsearch.
📋 Framework coverage: SOC 2 CC7.2, CC7.3 · ISO 27001 A.8.15, A.8.16 · DPDP Act Accountability
10
Vulnerability Hygiene
🔧Patch Management

Unpatched systems running known vulnerabilities are responsible for a significant proportion of breaches every year, including high-profile incidents like the 2021 Microsoft Exchange attacks. Patch management means tracking OS, application, and library versions, applying security patches within defined windows, and maintaining a record that satisfies auditors.

💡 Implementation: Enable AWS Systems Manager Patch Manager for EC2 instances. For container workloads, rebuild base images monthly. Define patch SLAs in policy: Critical within 48 hours, High within 14 days. Use Snyk or Dependabot for library patches in application code.
📋 Framework coverage: SOC 2 CC7.1 · ISO 27001 A.8.8, A.8.19 · DPDP Act Security Safeguard
Security audit and compliance maturity assessment for startups
Maturity moves in one direction: from missing controls to documented evidence. Auditors look for both, a working control and proof that it was working throughout the audit period.

Where Does Your Startup Stand?

Use this maturity grid to benchmark which controls are in place, partially implemented, or missing entirely. Any "missing" cell in the first five controls is a material finding in a SOC 2 audit.

ControlNot StartedPartialImplemented
01. Multi-Factor AuthenticationNo MFA / no policyPartial rolloutEnforced + evidence
02. Access Control & Least PrivilegeNo MFA / no policyPartial rolloutEnforced + evidence
03. Data EncryptionNo MFA / no policyPartial rolloutEnforced + evidence
04. Vulnerability ManagementNo MFA / no policyPartial rolloutEnforced + evidence
05. Security Awareness TrainingNo MFA / no policyPartial rolloutEnforced + evidence
06. Incident Response PlanNo MFA / no policyPartial rolloutEnforced + evidence
07. Vendor Risk ManagementNo MFA / no policyPartial rolloutEnforced + evidence
08. Backup & Recovery TestingNo MFA / no policyPartial rolloutEnforced + evidence
09. Audit Logging & MonitoringNo MFA / no policyPartial rolloutEnforced + evidence
10. Patch ManagementNo MFA / no policyPartial rolloutEnforced + evidence

See which controls you're missing, in 48 hours

SecComply runs a gap assessment across all 10 controls and maps findings against SOC 2, ISO 27001, and DPDP Act simultaneously. You receive a prioritised remediation roadmap, not a generic checklist.

Book Free Gap Assessment →

Frequently Asked Questions

Start with MFA, access control, and data encryption, these three collectively address the majority of breach vectors and close the highest-weight criteria in SOC 2 and ISO 27001. Everything else builds on this foundation.
Controls 1–3 (MFA, access control, encryption) can be configured in 1–2 weeks using existing cloud infrastructure. Controls 4–7 take 2–4 weeks each. Full implementation typically takes 8–12 weeks for a startup with 10–50 employees.
These 10 controls cover the majority of SOC 2 Trust Service Criteria, particularly the CC6 (Logical Access), CC7 (System Operations), and CC9 (Risk Management) series that form the core of most Type II audits. A compliance automation platform like SecComply maps implementation evidence directly to criteria.
Controls 3 (encryption), 6 (incident response plan), 8 (backup, if using existing cloud), and 9 (CloudTrail + CloudWatch) have zero incremental cost on AWS. MFA within Google Workspace or Microsoft 365 is included in existing licences. Snyk has a free tier covering open-source scanning.
Each control generates specific evidence: MFA configuration exports, access review records, encryption settings screenshots, vulnerability scan reports, training completion logs, incident response test records, vendor assessment files, backup restore test documentation, CloudTrail logs, and patch records. SecComply collects this evidence automatically from connected tools.