Evergreen

Compliance Audit Evidence Checklist

By QuickTrust Editorial

Compliance Audit Evidence Checklist

SOC 2, ISO 27001, HIPAA, and PCI DSS

Prepared by QuickTrust | trust.quickintell.com AI-Powered GRC Platform + Expert Engineering Implementation


How to Use This Checklist

This master evidence checklist maps 86 evidence items across 10 categories to the four most common compliance frameworks — SOC 2 Type II, ISO 27001, HIPAA Security Rule, and PCI DSS v4.0.

Use this checklist to:

  • Identify what evidence you need to collect before an audit
  • Assign ownership of each evidence item to a responsible team member
  • Track collection status and identify gaps
  • Understand which framework requires each item (so you can prioritize based on your target certification)
  • Build your evidence repository in a format auditors expect

Legend:

  • SOC 2 = SOC 2 Type I or Type II (AICPA Trust Services Criteria)
  • ISO = ISO/IEC 27001:2013 Annex A
  • HIPAA = HIPAA Security Rule (45 CFR Part 164 Subpart C)
  • PCI = PCI DSS v4.0

Status codes for tracking:

  • Collected — Evidence is gathered, current, and stored in your evidence repository
  • In Progress — Evidence exists but needs to be organized, updated, or formatted
  • Gap — Evidence does not exist; must be created or implemented
  • N/A — Not applicable to your environment (document justification)

Pro tip: For SOC 2 Type II audits, evidence must cover the full audit period (typically 6–12 months). Start collecting evidence from day one of your observation period — retroactive evidence collection is the #1 cause of audit delays.


Evidence Category 1: Policies and Procedures

The policy library is the foundation of every compliance audit. Auditors look for documented, approved, distributed, and annually reviewed policies that match what you actually do.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
1.1Information Security PolicySigned, dated policy document; management approval evidence; version history; employee distribution recordsPolicy management system, email records, HR platform✓ A.5.1.1✓ §164.308(a)(1)✓ 12.1
1.2Acceptable Use PolicySigned policy; employee acknowledgment records (dated); version historyPolicy management system, HRIS, DocuSign✓ A.6.2.1✓ §164.308(a)(3)✓ 12.1
1.3Access Control PolicySigned policy; management approval; review date history; distribution evidencePolicy repository✓ CC6.1✓ A.9.1.1✓ §164.312(a)✓ 7.1
1.4Incident Response Policy and PlanPolicy document; IRP document with roles, escalation, notification timelines; test recordsPolicy system, incident management platform✓ CC7.3✓ A.16.1.1✓ §164.308(a)(6)✓ 12.10
1.5Change Management PolicyPolicy; documented approval process; change request templatesPolicy system, ITSM platform✓ CC8.1✓ A.12.1.2✓ §164.308(a)(7)✓ 6.5
1.6Data Classification PolicyPolicy; classification tier definitions; employee training on data handlingPolicy repository✓ A.8.2.1✓ §164.308(a)(1)✓ 9.1
1.7Encryption PolicyPolicy; approved algorithm standards; key management proceduresPolicy system✓ CC6.7✓ A.10.1.1✓ §164.312(a)(2)(iv)✓ 4.2.1
1.8Vendor Management PolicyPolicy; vendor assessment procedures; BAA/DPA templates; vendor registerPolicy system, contract management platform✓ CC9.2✓ A.15.1.1✓ §164.308(b)✓ 12.8
1.9Password PolicyPolicy; technical controls documentation showing enforcement; password manager deploymentPolicy repository, IAM system screenshots✓ CC6.1✓ A.9.3.1✓ §164.312(d)✓ 8.3
1.10Vulnerability Management PolicyPolicy; scanning schedule; remediation SLA definitions; patch management proceduresPolicy system✓ CC7.1✓ A.12.6.1✓ §164.308(a)(1)✓ 6.3
1.11Business Continuity / Disaster Recovery PolicyPolicy; BCP/DRP documents; RTO/RPO definitions; test resultsPolicy system, DR documentation✓ A1.2✓ A.17.1.1✓ §164.308(a)(7)✓ 12.10
1.12Remote Work / BYOD PolicyPolicy; MDM enrollment requirements; VPN usage requirements; employee sign-offsPolicy system, MDM platform✓ A.6.2.2✓ §164.310(b)✓ 12.3
1.13Secure Development (SDLC) PolicyPolicy; secure coding standards; code review requirements; security testing requirementsPolicy system✓ CC8.1✓ A.14.2.1✓ 6.2
1.14Physical Security PolicyPolicy; facility security procedures; clean desk policy; visitor managementPolicy system✓ CC6.4✓ A.11.1.1✓ §164.310✓ 9.1
1.15Logging and Monitoring PolicyPolicy; logging requirements; retention periods; alert proceduresPolicy system✓ CC7.2✓ A.12.4.1✓ §164.312(b)✓ 10.1

Category 1 Total: ___ / 15 collected


Evidence Category 2: Access Control Evidence

Auditors verify that access rights are appropriate, approved, regularly reviewed, and promptly revoked. This is the most scrutinized category in SOC 2 and PCI audits.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
2.1User Access List — All Production SystemsComplete list of all users with access to production systems; role/permission level; date access was granted; last login dateIAM system (AWS IAM, Okta, Azure AD), exported reports✓ CC6.2✓ A.9.2.1✓ §164.312(a)(2)(i)✓ 7.2
2.2Access Request and Approval RecordsTickets or records showing access requests were reviewed and approved before provisioning; approver name and dateITSM (Jira, ServiceNow), email approvals, access management platform✓ CC6.2✓ A.9.2.2✓ §164.308(a)(4)✓ 7.3
2.3Privileged Account Inventory and ReviewList of all admin/privileged accounts; quarterly review records showing access was verified and unnecessary accounts removedIAM system; quarterly review sign-off documents✓ CC6.3✓ A.9.2.3✓ §164.308(a)(1)✓ 8.2
2.4MFA Configuration EvidenceScreenshots or configuration exports showing MFA is enforced for privileged accounts, remote access, and cloud consoles; MFA enforcement policyIAM system (Okta, AWS IAM), SSO platform configuration✓ CC6.1✓ A.9.4.2✓ §164.312(d)✓ 8.4
2.5Access Review Records (Semi-Annual / Quarterly)Completed access review sign-offs; evidence of removals or modifications based on review; reviewer name and dateAccess review tickets, spreadsheets, GRC platform✓ CC6.3✓ A.9.2.5✓ §164.308(a)(3)✓ 7.2.5
2.6Offboarding / Termination Access Revocation RecordsList of employee terminations during the audit period; corresponding access revocation evidence with timestamps showing revocation within required timeframeHR system (BambooHR, Workday), IAM deprovisioning logs, offboarding tickets✓ CC6.2✓ A.9.2.6✓ §164.308(a)(3)(ii)(C)✓ 8.2.6
2.7Least-Privilege Configuration EvidenceIAM role definitions showing scope-limited permissions; evidence that broad permissions (AdministratorAccess, FullAccess) are restricted to authorized accountsAWS IAM or equivalent role configuration exports✓ CC6.3✓ A.9.1.2✓ §164.308(a)(4)✓ 7.1.2
2.8Shared / Service Account RegisterInventory of shared accounts and service accounts; documented approval; enhanced logging configuration for shared accountsIAM system, service account documentation✓ CC6.2✓ A.9.2.3✓ §164.312(a)(2)(i)✓ 8.2.2
2.9SSO / Identity Provider ConfigurationEvidence of centralized identity management; IDP configuration screenshots; list of systems integrated with SSOOkta, Azure AD, Google Workspace IDP configuration✓ CC6.1✓ A.9.4.1✓ §164.312(d)✓ 8.2
2.10Physical Access Control RecordsBadge access logs for server rooms / sensitive areas; access control system configuration; physical access review recordsPhysical access control system (HID, Avigilon), building management system✓ CC6.4✓ A.11.1.2✓ §164.310(a)✓ 9.2

Category 2 Total: ___ / 10 collected


Evidence Category 3: Encryption Evidence

Auditors verify that ePHI, cardholder data, and other sensitive data is encrypted both at rest and in transit, and that key management practices are sound.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
3.1Encryption-at-Rest ConfigurationDatabase encryption settings (RDS, MongoDB, etc.); S3 bucket encryption policy; EBS volume encryption; storage encryption screenshotsAWS Console, GCP Console, Azure Portal configuration✓ CC6.7✓ A.10.1.1✓ §164.312(a)(2)(iv)✓ 3.5
3.2TLS / HTTPS Configuration EvidenceSSL/TLS configuration for all public-facing endpoints; SSL Labs or equivalent scan showing TLS 1.2+ and strong cipher suites; HSTS header evidenceSSL Labs scan report, load balancer configuration, NGINX/Apache TLS config✓ CC6.7✓ A.13.2.3✓ §164.312(e)(2)(ii)✓ 4.2.1
3.3TLS Certificate Inventory and Renewal RecordsInventory of all TLS certificates; expiry dates; renewal process evidence; no expired certificates in productionCertificate management tool (AWS Certificate Manager, Let's Encrypt records), certificate monitoring alerts✓ CC6.7✓ A.10.1.2✓ 4.2.1
3.4Key Management System (KMS) ConfigurationKMS configuration showing encryption keys; access policies restricting key usage; key rotation configurationAWS KMS, GCP Cloud KMS, or HashiCorp Vault configuration exports✓ CC6.7✓ A.10.1.2✓ §164.312(a)(2)(iv)✓ 3.7
3.5Key Rotation EvidenceRecords showing encryption keys are rotated per policy; automatic key rotation enabled or manual rotation logsKMS rotation configuration, key version history✓ CC6.7✓ A.10.1.2✓ 3.7.4
3.6Endpoint Encryption ConfigurationFull-disk encryption status report for all company laptops (BitLocker for Windows, FileVault for macOS); MDM compliance reportsMDM platform (Jamf, InTune, Kandji) encryption compliance report✓ CC6.6✓ A.10.1.1✓ §164.310(d)(1)✓ 3.5
3.7Secrets Management ConfigurationEvidence that secrets (API keys, DB credentials) are stored in secrets manager, not in code; secrets manager access policiesAWS Secrets Manager, HashiCorp Vault, Doppler configuration; code scanning evidence showing no hardcoded secrets✓ CC6.7✓ A.10.1.1✓ §164.312(a)(2)(iv)✓ 3.5
3.8Backup Encryption EvidenceBackup encryption configuration; evidence that backups are encrypted at rest and in transitBackup solution configuration (AWS Backup, Veeam, Snapshots)✓ CC9.1✓ A.12.3.1✓ §164.308(a)(7)✓ 3.5

Category 3 Total: ___ / 8 collected


Evidence Category 4: Monitoring and Logging Evidence

Auditors look for centralized, tamper-resistant logs with sufficient detail to detect and investigate security incidents, covering the full audit observation period.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
4.1SIEM / Log Aggregation ConfigurationEvidence of centralized log collection; sources configured; retention settings; sample dashboardSplunk, Datadog, AWS CloudWatch, ELK Stack configuration and dashboards✓ CC7.2✓ A.12.4.1✓ §164.312(b)✓ 10.3
4.2Log Retention ConfigurationLog retention policy settings confirming minimum 12-month retention; evidence logs are not deletable by application usersSIEM retention settings, S3 lifecycle policies for log archives✓ CC7.2✓ A.12.4.1✓ §164.312(b)✓ 10.5
4.3Authentication Event LogsSample authentication logs showing successful logins, failed logins, MFA events; evidence logs are being collected and are completeSIEM, IDP logs (Okta, Azure AD), SSH/VPN logs✓ CC7.2✓ A.12.4.1✓ §164.312(b)✓ 10.2
4.4Privileged Activity Audit LogsLogs of administrative actions on production systems; evidence privilege use is logged; sample of admin activity logsAWS CloudTrail, GCP Admin Activity logs, database audit logs✓ CC6.3✓ A.12.4.3✓ §164.312(b)✓ 10.2.1
4.5Security Alert Configuration and EvidenceAlert rules configured in SIEM/monitoring platform; evidence alerts fire correctly; sample alert notificationsSIEM alert configuration, PagerDuty or alerting platform records✓ CC7.2✓ A.12.4.1✓ §164.308(a)(1)✓ 10.7
4.6Log Review RecordsEvidence of regular log reviews (weekly/monthly); log review checklist or tickets; dates and reviewer namesTicketing system, GRC platform, log review sign-offs✓ CC7.2✓ A.12.4.1✓ §164.308(a)(1)✓ 10.7
4.7File Integrity Monitoring (FIM)FIM tool configuration; alerts for unauthorized file changes; coverage of critical system files and configurationsTripwire, AIDE, AWS Config, cloud-native FIM configuration✓ CC7.2✓ A.12.4.2✓ 10.3.4
4.8Clock Synchronization (NTP) ConfigurationNTP server configuration across all production systems; evidence clocks are synchronizedSystem NTP configuration, CloudWatch clock sync monitoring✓ CC7.1✓ A.12.4.4✓ 10.6
4.9Network Flow / Traffic MonitoringEvidence of network traffic monitoring; VPC flow logs or equivalent; alerts for anomalous trafficAWS VPC Flow Logs, network monitoring platform✓ CC7.1✓ A.12.4.1✓ 10.3
4.10Uptime / Availability MonitoringMonitoring tool configuration; availability SLA reports; incident tickets triggered by downtimeStatusPage, PagerDuty, Datadog, CloudWatch dashboards✓ A1.1✓ A.12.1.3✓ §164.308(a)(7)✓ 12.4

Category 4 Total: ___ / 10 collected


Evidence Category 5: Incident Response Evidence

Auditors verify that your incident response program is active and tested, not just documented on paper. Evidence of real or simulated incident handling is required.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
5.1Incident Response Plan DocumentCurrent, approved IRP document with roles, escalation paths, classification criteria, and notification timelinesPolicy management system✓ CC7.3✓ A.16.1.1✓ §164.308(a)(6)✓ 12.10
5.2Incident Tabletop Exercise RecordsDocumentation of tabletop exercise conducted within the past 12 months; scenario used; participants; outcomes; follow-up actionsGRC platform, meeting notes, exercise report✓ CC7.3✓ A.17.1.3✓ §164.308(a)(7)(ii)(D)✓ 12.10.6
5.3Incident Log / Incident RegisterLog of all security events and incidents during the audit period; severity, classification, actions taken, resolution dateTicketing system (Jira, ServiceNow), SIEM incident queue✓ CC7.4✓ A.16.1.4✓ §164.308(a)(6)(ii)✓ 12.10.2
5.4Post-Incident Review RecordsPost-mortem documents for any significant incidents; root cause analysis; lessons learned; corrective actions implementedConfluence, Notion, GRC platform, incident tickets✓ CC7.5✓ A.16.1.6✓ §164.308(a)(1)✓ 12.10.5
5.5Security Event Reporting ChannelEvidence of published security reporting mechanism (security@company.com or equivalent); records of reports received and triagedEmail logs, ticketing system, security reporting records✓ CC7.3✓ A.16.1.2✓ §164.308(a)(6)(i)✓ 12.10.1
5.6Breach Notification ProceduresDocumented notification procedures including regulatory timelines (HIPAA 60-day, GDPR 72-hour, state laws); customer notification templatesPolicy management system, legal documentation✓ CC7.4✓ A.16.1.7✓ §164.410✓ 12.10.4
5.7Incident Response Contact ListCurrent contact list for IR team, legal, PR, executives, law enforcement, regulatory bodies; evidence it is maintained and accessibleIRP appendix, GRC platform, secure communication platform✓ CC7.3✓ A.16.1.1✓ §164.308(a)(6)✓ 12.10.1
5.8Security Incident Escalation RecordsEvidence of incidents escalated to appropriate leadership; approval records for material incident responsesIncident tickets, executive communication records✓ CC7.4✓ A.16.1.5✓ §164.308(a)(1)✓ 12.10.2

Category 5 Total: ___ / 8 collected


Evidence Category 6: Vendor Management Evidence

Third-party risk management is heavily scrutinized, especially in HIPAA (BAA requirements) and SOC 2 (CC9.2). Auditors want to see active oversight, not just a one-time checklist.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
6.1Vendor / Subprocessor RegisterComplete list of all vendors with access to systems or data; tier classification; data types shared; review datesGRC platform, spreadsheet, vendor management system✓ CC9.2✓ A.15.1.1✓ §164.308(b)✓ 12.8.1
6.2Business Associate Agreement (BAA) RepositoryExecuted BAAs with all vendors who access ePHI; signed and dated; current (not expired)Contract management platform, legal file storage✓ §164.308(b)
6.3Data Processing Agreements (DPAs)Executed DPAs with all vendors processing personal data of EU residents; current; includes required GDPR clausesContract management platform✓ CC9.2✓ A.15.1.2
6.4Vendor Security Assessments / QuestionnairesCompleted security questionnaires (SIG Lite, CAIQ) or SOC 2 reports reviewed for critical vendors; assessment datesGRC platform, vendor assessment files✓ CC9.2✓ A.15.2.1✓ §164.308(b)✓ 12.8.2
6.5Annual Vendor Review RecordsEvidence of annual reassessment of critical vendors; updated assessment dates; action items from reviewsGRC platform, vendor review meeting notes, updated questionnaires✓ CC9.2✓ A.15.2.1✓ §164.308(b)✓ 12.8.4
6.6Vendor Access Review RecordsEvidence that vendor access is reviewed and limited to what is necessary; termination records for departed vendor personnelIAM system, vendor access tickets, vendor offboarding records✓ CC9.2✓ A.15.2.2✓ §164.308(a)(4)✓ 8.2.6
6.7Vendor Offboarding RecordsEvidence of access revocation and data return/destruction for terminated vendor relationships; signed confirmation lettersOffboarding tickets, signed data destruction certificates✓ CC9.2✓ A.15.2.2✓ §164.308(b)✓ 12.8.5
6.8Critical Vendor SOC 2 Reports / Security CertificationsCurrent SOC 2 Type II reports or equivalent (ISO 27001 certificate) for critical vendors; within 12 monthsVendor trust portals, directly requested reports✓ CC9.2✓ A.15.2.1✓ §164.308(b)✓ 12.8.2

Category 6 Total: ___ / 8 collected


Evidence Category 7: Training and Awareness Evidence

Auditors expect to see that security training is ongoing, tracked, and relevant — not just a one-time checkbox at hiring.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
7.1Security Awareness Training Completion RecordsList of all employees; training completion status; completion dates; training platform records; % completionLMS (KnowBe4, Proofpoint, Curricula), HRIS platform✓ CC2.2✓ A.7.2.2✓ §164.308(a)(5)✓ 12.6
7.2Security Training Content / CurriculumTraining modules used; topics covered (phishing, password hygiene, data handling, incident reporting); dates of most recent updateLMS platform; training vendor curriculum✓ CC2.2✓ A.7.2.2✓ §164.308(a)(5)✓ 12.6.3
7.3Phishing Simulation ResultsPhishing simulation campaign results during audit period; click rates; reporting rates; follow-up training for clickersKnowBe4, Proofpoint, GoPhish campaign reports✓ CC2.2✓ A.7.2.2✓ §164.308(a)(5)✓ 12.6
7.4New Employee Security Onboarding RecordsEvidence that security training is completed during onboarding; checklist completion; training acknowledgment datesHRIS, onboarding checklists, LMS records filtered to new hires✓ CC2.2✓ A.7.1.2✓ §164.308(a)(5)✓ 12.6.2
7.5Role-Specific Training RecordsEvidence that developers receive secure coding training; IT receives advanced security training; executives receive leadership security briefingsLMS, training certificates, conference attendance records✓ CC2.2✓ A.7.2.2✓ 12.6
7.6Policy Acknowledgment RecordsSigned or e-signed acknowledgment that employees have read and understood key policies (AUP, IRP, Data Classification, Password Policy)DocuSign, HRIS acknowledgment module, GRC platform✓ CC1.4✓ A.7.2.2✓ §164.308(a)(5)✓ 12.6.3

Category 7 Total: ___ / 6 collected


Evidence Category 8: Change Management Evidence

SOC 2 CC8 and PCI DSS 6.5 require evidence that changes to production systems are authorized, tested, and documented. This is heavily sampled during audits.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
8.1Change Request Tickets (Sample)Sample of change tickets during the audit period showing: description, requester, approver, deployment date, test evidence, rollback planJira, ServiceNow, Linear, GitHub Issues✓ CC8.1✓ A.12.1.2✓ §164.308(a)(7)✓ 6.5
8.2Pull Request / Code Review RecordsEvidence that all code changes went through peer review before merge; PR history in version control; reviewer namesGitHub, GitLab, Bitbucket PR history✓ CC8.1✓ A.14.2.2✓ 6.4
8.3CI/CD Pipeline ConfigurationEvidence of automated testing gates in CI/CD; SAST scan results; deployment automation configuration; branch protection rulesGitHub Actions, CircleCI, Jenkins configuration✓ CC8.1✓ A.14.2.8✓ 6.3
8.4Environment Separation EvidenceArchitecture diagram or configuration evidence showing separate dev/staging/production environments; evidence production access is restrictedCloud console configuration, IAM environment policies, architecture diagram✓ CC8.1✓ A.12.1.4✓ §164.308(a)(7)✓ 6.4.1
8.5Emergency Change RecordsDocumentation of any emergency changes during the audit period; retrospective approval records; post-change review evidenceTicketing system emergency change tickets✓ CC8.1✓ A.12.1.2✓ 6.5.2
8.6Change Advisory Board (CAB) RecordsCAB meeting minutes or documented change approval process; evidence changes were reviewed before deploymentMeeting notes, approval records in ticketing system✓ CC8.1✓ A.12.1.2✓ 6.5.1
8.7Deployment Logs / Change LogSystem or deployment logs showing what was deployed, by whom, and when; correlated with approved change ticketsDeployment platform logs (Heroku, AWS CodeDeploy, ArgoCD), release notes✓ CC8.1✓ A.12.1.2✓ 6.5.6
8.8Security Testing in SDLC EvidenceSAST scan results from audit period; SCA/dependency scanning results; secret scanning evidence; penetration test resultsCI/CD pipeline reports, security tool dashboards (Snyk, Semgrep, GitHub Advanced Security)✓ CC8.1✓ A.14.2.8✓ 6.3.2

Category 8 Total: ___ / 8 collected


Evidence Category 9: Business Continuity Evidence

Auditors want proof that your BCDR plan actually works — not just that it's documented. Backup restoration tests and DR test records are the most commonly cited gaps.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
9.1Business Continuity Plan (BCP)Current, approved BCP document; RTO/RPO definitions; recovery priorities; communication plan; executive approvalPolicy management system, GRC platform✓ A1.2✓ A.17.1.1✓ §164.308(a)(7)✓ 12.10
9.2Disaster Recovery Plan (DRP)Current DRP with step-by-step recovery procedures; system architecture for DR; failover proceduresEngineering documentation, GRC platform✓ A1.2✓ A.17.1.2✓ §164.308(a)(7)(ii)(B)✓ 12.10
9.3Backup Configuration EvidenceBackup schedule configuration; geographic redundancy settings; retention policy settings; backup monitoring alertsAWS Backup, backup platform configuration, snapshots schedule✓ A1.2✓ A.12.3.1✓ §164.308(a)(7)(ii)(A)✓ 12.10.1
9.4Backup Restoration Test ResultsEvidence that backup restoration was tested and successful; restoration dates; tested data volumes; tester name and sign-offBackup test records, restoration tickets, evidence of successfully restored data✓ A1.2✓ A.12.3.1✓ §164.308(a)(7)(ii)(D)✓ 12.10.6
9.5DR / Failover Test ResultsEvidence that a DR failover was tested; test date; systems tested; RTO achieved; RPO achieved; gaps identified and remediatedDR test report, failover test tickets, post-test sign-off✓ A1.2✓ A.17.1.3✓ §164.308(a)(7)(ii)(D)✓ 12.10.6
9.6BCP Tabletop Exercise RecordsBCP tabletop exercise documentation; scenario; participants; outcomes; follow-up actionsMeeting notes, GRC platform, exercise report✓ A1.2✓ A.17.1.3✓ §164.308(a)(7)(ii)(D)✓ 12.10.6
9.7High-Availability / Redundancy ArchitectureArchitecture diagram showing HA configuration; multi-AZ or multi-region setup; load balancer configuration; uptime monitoring evidenceCloud architecture diagram, AWS/GCP/Azure configuration, monitoring dashboards✓ A1.1✓ A.17.2.1✓ §164.308(a)(7)✓ 12.4

Category 9 Total: ___ / 7 collected


Evidence Category 10: Physical Security Evidence

While cloud-native companies have limited on-premises infrastructure, auditors still verify device security, clean desk compliance, and reliance on cloud provider physical security controls.

#Evidence ItemWhat to CollectWhere to Find ItSOC 2ISOHIPAAPCIOwnerStatus
10.1Cloud Provider Physical Security ReportsAWS / GCP / Azure SOC 2 Type II reports or ISO 27001 certificates (verify physical security controls in scope); downloaded from cloud provider trust portalsAWS Artifact, Google Cloud Compliance Reports, Azure Compliance Portal✓ CC6.4✓ A.11.1.1✓ §164.310✓ 9.1
10.2Office Physical Access Control LogsBadge or keycard access logs for office; evidence of access control system in operation; visitor log recordsAccess control system (HID, Verkada, Brivo), visitor log platform✓ CC6.4✓ A.11.1.2✓ §164.310(a)✓ 9.3
10.3Device Inventory and Asset RegisterComplete inventory of company-issued devices (laptops, tablets, phones); serial numbers; assignment to user; encryption status; last audit dateMDM platform asset report, IT asset management system✓ CC6.6✓ A.8.1.1✓ §164.310(d)✓ 9.7
10.4Device Disposal / Decommission RecordsRecords of devices decommissioned during the audit period; secure wipe certificates or certificates of destruction; vendor invoices for secure disposalIT decommission tickets, NIST 800-88 wipe certificates, vendor destruction certificates✓ CC6.5✓ A.11.2.7✓ §164.310(d)(2)(i)✓ 9.8
10.5MDM Compliance ReportMDM platform report showing all enrolled devices, encryption status, OS patch compliance, screen lock configurationJamf, InTune, Kandji, Mosyle compliance dashboard✓ CC6.6✓ A.11.2.6✓ §164.310(b)✓ 9.7
10.6Clean Desk Policy Compliance EvidenceSpot check records or audit results confirming clean desk compliance; employee acknowledgment of clean desk policyPhysical audit records, HR acknowledgment records, photos (if appropriate)✓ CC6.4✓ A.11.2.9✓ §164.310(b)✓ 9.4

Category 10 Total: ___ / 6 collected


Master Evidence Summary

CategoryTotal ItemsCollectedIn ProgressGapN/A
1. Policies and Procedures15
2. Access Control Evidence10
3. Encryption Evidence8
4. Monitoring and Logging Evidence10
5. Incident Response Evidence8
6. Vendor Management Evidence8
7. Training and Awareness Evidence6
8. Change Management Evidence8
9. Business Continuity Evidence7
10. Physical Security Evidence6
TOTAL86

Evidence Readiness Score

(Total Collected + 0.5 × In Progress) / 86 × 100 = ____%

ScoreInterpretation
90–100%Audit-ready. Organize your evidence repository and confirm with your auditor.
75–89%Nearly ready. Close remaining gaps within 2–4 weeks. Prioritize items your target framework requires.
50–74%In progress. 4–8 weeks of focused evidence collection needed. Assign owners to each gap.
< 50%Significant gaps. Begin evidence collection program immediately. Consider an evidence collection sprint before scheduling your audit.

Evidence Repository Best Practices

Organize your evidence using this folder structure:

/Audit-Evidence/
  /01-Policies/
  /02-Access-Control/
  /03-Encryption/
  /04-Monitoring-Logging/
  /05-Incident-Response/
  /06-Vendor-Management/
  /07-Training/
  /08-Change-Management/
  /09-Business-Continuity/
  /10-Physical-Security/

Naming convention for evidence files: [Category]-[Item#]-[Description]-[Date].pdf

Example: 02-Access-Control-2.3-Privileged-Account-Review-Q1-2026.pdf

Key audit-time reminders:

  • Evidence must be current — most auditors require evidence from the past 12 months
  • Screenshots must show the date and system name
  • Policy documents must show approval date, version, and approver name
  • Access review records must show who reviewed, when, and what actions were taken
  • Test records must show what was tested, the outcome, and who signed off

Ready to Never Scramble for Evidence Again?

Collecting evidence manually before every audit is exhausting and error-prone. The companies that sail through audits are the ones who collect evidence continuously throughout the year — automatically.

QuickTrust automates evidence collection from your cloud infrastructure, IAM systems, CI/CD pipelines, and security tools — so your audit evidence portal is always current. When your auditor sends their request list, your team clicks export, not scramble.

What QuickTrust delivers:

  • Automated evidence collection from AWS, GCP, Azure, GitHub, Okta, and more
  • Pre-organized evidence repository mapped to SOC 2, ISO 27001, HIPAA, and PCI DSS
  • Gap alerts when evidence is missing or expiring
  • Auditor-ready evidence packages in days, not weeks
  • Engineering team to close the gaps — not just flag them

100% audit pass rate. Across 100+ audits. For companies just like yours.

Book your free evidence gap review: trust.quickintell.com


QuickTrust is an open-source, AI-powered GRC platform operated by GPT Innovations, Inc. This checklist is provided for informational purposes and does not constitute a formal audit or legal compliance assessment. Framework mappings are provided as general guidance; confirm specific requirements with your auditor.

Ready to get audit-ready?

Our engineers implement controls, prepare evidence, and coordinate your audit.

Get a Free Assessment

Related Articles