Compliance frameworks look overwhelming at first glance, SOC 2 has 64 criteria, ISO 27001 has 93 Annex A controls, and DPDP Act adds its own obligations on top. But underneath all of them, the same foundational controls appear again and again. Get these ten right, and you have answered the most common audit questions before the auditor asks them.
These 10 controls collectively address the root cause of over 90% of security incidents. They are not the most complex controls, they are the most commonly missing ones. Implement them in order, starting with MFA.
MFA is the single highest-impact control a startup can implement. Over 80% of breaches involve compromised credentials, MFA stops the vast majority of them. Enforce MFA across every system: cloud console, code repository, email, HR system, and any tool containing customer data. No exceptions for founders, engineers, or administrators.
Every employee should have access to exactly the systems and data they need to do their job, and nothing more. "Everyone has admin" is not an access control policy. Role-based access control (RBAC) defines permissions by job function, not by individual. Access reviews quarterly ensure that permissions are still appropriate as roles change.
Unencrypted data is a breach waiting to happen. Encryption at rest means data stored in databases, file systems, and backups is encrypted. Encryption in transit means all data moving between systems, APIs, and users is protected with TLS 1.2 or higher. Both are non-negotiable for any compliance framework and most enterprise security questionnaires.
Known vulnerabilities in dependencies, containers, and infrastructure are the most predictable attack vector. Vulnerability management means scanning continuously, prioritising by severity, and remediating within defined SLAs. A critical CVE (CVSS 9.0+) in production code with no remediation plan is a material risk, and a finding in every security audit.
The majority of successful attacks start with a human, a phishing email clicked, a credential reused, a USB drive plugged in. Annual security awareness training is not a nice-to-have; it is a mandatory SOC 2 control and an ISO 27001 requirement. Training must cover phishing recognition, password hygiene, incident reporting, and data handling.
When, not if, a security incident occurs, the response quality determines the outcome. An undocumented, improvised response leads to delayed containment, regulatory notification failures, and customer trust destruction. An incident response plan defines: what counts as an incident, who is on the response team, the escalation sequence, the containment steps, and the notification obligations under DPDP Act and other regulations.
Your security posture is only as strong as your weakest vendor. The Okta breach in 2022 came through a third-party support vendor. The MOVEit breach in 2023 affected thousands of companies through a single file transfer tool. Every vendor that processes your customer data or has access to your systems extends your attack surface. Vendor risk management means assessing, documenting, and monitoring that surface.
A backup that has never been tested is not a backup, it is a hope. Ransomware attacks are now the most common cause of business disruption for startups, and the only real defence is clean, recent, tested backups that are stored separately from production systems. Recovery testing once per quarter proves that backups work before you need them.
You cannot investigate what you cannot see. Audit logging captures who did what, when, and from where across every system. Monitoring alerts on suspicious patterns, failed logins, privilege escalation, unusual data exports. Twelve months of log retention is a hard SOC 2 requirement. Three specific alerts cover the majority of first-time audit findings.
Unpatched systems running known vulnerabilities are responsible for a significant proportion of breaches every year, including high-profile incidents like the 2021 Microsoft Exchange attacks. Patch management means tracking OS, application, and library versions, applying security patches within defined windows, and maintaining a record that satisfies auditors.
Where Does Your Startup Stand?
Use this maturity grid to benchmark which controls are in place, partially implemented, or missing entirely. Any "missing" cell in the first five controls is a material finding in a SOC 2 audit.
| Control | Not Started | Partial | Implemented |
|---|---|---|---|
| 01. Multi-Factor Authentication | No MFA / no policy | Partial rollout | Enforced + evidence |
| 02. Access Control & Least Privilege | No MFA / no policy | Partial rollout | Enforced + evidence |
| 03. Data Encryption | No MFA / no policy | Partial rollout | Enforced + evidence |
| 04. Vulnerability Management | No MFA / no policy | Partial rollout | Enforced + evidence |
| 05. Security Awareness Training | No MFA / no policy | Partial rollout | Enforced + evidence |
| 06. Incident Response Plan | No MFA / no policy | Partial rollout | Enforced + evidence |
| 07. Vendor Risk Management | No MFA / no policy | Partial rollout | Enforced + evidence |
| 08. Backup & Recovery Testing | No MFA / no policy | Partial rollout | Enforced + evidence |
| 09. Audit Logging & Monitoring | No MFA / no policy | Partial rollout | Enforced + evidence |
| 10. Patch Management | No MFA / no policy | Partial rollout | Enforced + evidence |
See which controls you're missing, in 48 hours
SecComply runs a gap assessment across all 10 controls and maps findings against SOC 2, ISO 27001, and DPDP Act simultaneously. You receive a prioritised remediation roadmap, not a generic checklist.
Book Free Gap Assessment →