Dobby
Back to Academy
Security & ComplianceIntermediate

SOC 2 Compliance for AI Agents: The Complete Mapping

Map SOC 2 Trust Service Criteria to AI agent controls. Audit trails, access controls, encryption, monitoring, and a pre-audit checklist.

10 min read Gil KalMar 24, 2026

What you will learn

  • Map SOC 2 Trust Service Criteria to AI agent controls
  • Implement immutable audit trails for every agent action
  • Set up access controls with 3-level RBAC
  • Prepare for a SOC 2 audit with AI agents in your stack
  • Know which evidence auditors will ask for and where to find it

TL;DR — SOC 2 maps cleanly onto AI agents when the control plane is designed for it: append-only audit logs, 3-level RBAC, AES-256-GCM encryption, regional data residency, and an exportable evidence view. Without a control plane, collecting the same evidence takes weeks.

SOC 2 and AI Agents

SOC 2 (Service Organization Control 2) defines criteria for managing customer data based on five Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. When AI agents access, process, or act on customer data, they fall squarely within SOC 2 scope.

The challenge is that most AI agent frameworks were not designed with SOC 2 in mind. They lack built-in audit trails, access controls, and encryption. A control plane fills this gap.

Mapping TSC to Agent Controls

  • Security — Encryption at rest (AES-256-GCM) and in transit (TLS 1.3). Gateway key authentication. IP allowlisting.
  • Availability — Health monitoring every 5 minutes. Kill-switch for emergency shutdown. Circuit breaker for provider failures.
  • Processing Integrity — Immutable audit trail of every agent action. Approval gates for high-risk operations. Token budget enforcement.
  • Confidentiality — DLP policies redact PII before LLM calls. Regional data residency (IL/EU/US). Tenant data isolation.
  • Privacy — GDPR consent management. Data retention policies. Right to deletion support.

The Audit Trail

The foundation of SOC 2 compliance is the audit trail. Every agent action — every LLM call, every tool use, every approval decision — must be logged in an append-only store. Auditors will ask: Who did what, when, and was it authorized?

sql
-- Example: Query the audit trail for a specific agent
SELECT
  event_type,
  actor_type,
  actor_id,
  description,
  metadata,
  created_at
FROM ds_agents_il.task_timeline
WHERE tenant_id = @tenantId
  AND agent_id = @agentId
  AND created_at BETWEEN @startDate AND @endDate
ORDER BY created_at DESC

Dobby maintains a 365-day immutable audit trail in BigQuery. Every agent action, LLM call, approval decision, and policy violation is logged with full actor context. Data is append-only — it cannot be modified or deleted.

Access Controls: 3-Level RBAC

SOC 2 requires that access to systems and data is restricted based on roles. A 3-level RBAC hierarchy ensures least-privilege access:

  • Platform level — Global admins manage platform-wide settings and policies
  • Organization level — Org owners manage their organization, billing, SSO, and gateway
  • Tenant level — 6 granular roles (Owner, Admin, Developer, Operator, Member, Viewer) control workspace access

Encryption Standards

All credentials (LLM API keys, SSO secrets, tenant data) are encrypted with AES-256-GCM using a key derivation hierarchy. The platform KEK is stored in GCP Secret Manager with FIPS 140-2 Level 3 HSM backing. Tenant keys are derived via SHA-256 from the KEK plus tenant ID.

Audit Preparation Checklist

  • Verify audit trail retention is set to 365+ days
  • Confirm all admin actions require authenticated sessions
  • Review RBAC roles — ensure no over-privileged accounts
  • Check that all LLM credentials are encrypted (never stored in plaintext)
  • Validate data residency — ensure tenant data stays in designated region
  • Test kill-switch activation and recovery procedure
  • Export audit logs for the review period and verify completeness
  • Document change-management procedure for policy and model allow-list updates
  • Confirm SSO is enforced for all human users and SCIM deactivation is tested
Without Dobby

Audit preparation takes weeks. The team manually collects logs from 5 different systems, creates spreadsheets of access records, and hopes nothing was missed.

With Dobby

Audit preparation takes hours. The audit trail is a single query. RBAC is enforced by the platform. Encryption is automatic. The auditor gets a clean, consistent dataset.

Enterprise SSO (Okta, Azure AD, Google Workspace, and 4 more providers) plus SCIM 2.0 provisioning means user lifecycle is managed centrally. Offboarded users lose access immediately — no manual cleanup needed.

Frequently Asked Questions

Are AI agents in scope for SOC 2 Type II?

If the agent touches customer data, makes decisions on behalf of the service, or has access to systems used to deliver the service, yes. Auditors will expect evidence of access controls, change management, and monitoring for the agent the same way they expect it for any production service.

Does SOC 2 require human approval for every AI action?

No. SOC 2 requires that controls match the risk. Low-risk, reversible actions can run autonomously with logging. High-risk or production-changing actions should require approval. The control that matters is that the policy is documented, enforced, and auditable.

Can I use Dobby as evidence in a SOC 2 audit?

Yes — the audit trail, RBAC configuration, approval logs, SSO/SCIM events, and kill-switch activations are all queryable and exportable. Most customers pair this with the SOC 2 report for Dobby itself as a sub-processor.

Related Features

Ready to try this yourself?

Start free — no credit card required.

Book a Demo
SOC 2 Compliance for AI Agents: The Complete Mapping — Dobby Academy