What’s Included
Access control, change management, incident response, and risk-monitoring workflows, each with control references and operating cadence.
Process Library Hub
A launch-ready hub for the core workflows behind a SOC 2 program. Use it to understand process coverage across access control, change management, incident response, and risk monitoring, then expand into the full template library.
This page works as an answer-first overview of the operating workflows that support a SOC 2 program. It shows how the process library is organized, which teams are involved, what control families each process touches, and where teams should begin implementation.
Access control, change management, incident response, and risk-monitoring workflows, each with control references and operating cadence.
Security leads, IT admins, engineering managers, HR, compliance owners, and auditors who need a shared operating map.
Start with the framework map, follow the recommended implementation sequence, then drill into the process groups below.
How SOC 2 processes connect across trust service criteria. Click any process to view the full diagram and template.
Full SOC 2 Framework Process Map
Interactive SVG diagram - click any node to navigate
Grouped by control category. Each process links to a full diagram, step-by-step instructions, and an editable Creately template.
Start with these five processes to build a solid SOC 2 foundation, then expand to full coverage.
Access Review
Establish who has access to what. Foundation for all access controls.
Employee Onboarding & Offboarding
Ensure access is granted and revoked with every personnel change.
Change Management
All system changes go through a documented review and approval process.
Incident Response
Detect, respond to, and learn from security incidents systematically.
Risk Assessment
Identify and prioritize risks across your organization annually.
People you'll need involved across your SOC 2 compliance program.
This page groups core SOC 2 operational workflows into access control, change management, incident response, and risk monitoring so teams can understand the process landscape and implementation order.
Security leaders, IT administrators, engineering managers, HR teams, compliance owners, and auditors can use this page as a shared operating map for a SOC 2 program.
Most teams should begin with access review, onboarding and offboarding, change management, incident response, and risk assessment before expanding into the full process library.
Get all 60 SOC 2 process templates
Pre-built, customizable Creately templates. Open in the BPMN editor and adapt for your team.