Webinar: Database audits taking weeks? See how Liquibase Secure makes you audit-ready from day one.

SOC 2 Compliance for Database Security: Trust Services Criteria Best Practices

Guide

Table of contents

Understanding SOC 2 Compliance

SOC 2 (System and Organization Controls 2) is an auditing standard developed by the American Institute of CPAs (AICPA) that evaluates an organization's information systems relevant to security, availability, processing integrity, confidentiality, and privacy. SOC 2 compliance is essential for service organizations, particularly SaaS companies, cloud service providers, and technology vendors serving enterprise customers.

Unlike regulatory requirements such as HIPAA or GDPR, SOC 2 is a voluntary framework. However, enterprise customers increasingly require SOC 2 reports before engaging with technology vendors, making compliance a business necessity. Organizations undergo annual audits (SOC 2 Type II) to demonstrate that controls are not only designed properly but also operating effectively over time.

Two Types of SOC 2 Reports:

  • Type I: Evaluates the design of controls at a specific point in time
  • Type II: Evaluates the design and operating effectiveness of controls over a period (typically 6-12 months)

Trust Services Criteria (TSC):

  • Security (required for all SOC 2 audits)
  • Availability
  • Processing Integrity
  • Confidentiality
  • Privacy

Organizations select which criteria apply to their services. Most technology vendors pursue Security as a baseline, with additional criteria selected based on the nature of their services and customer commitments.

Database-Specific SOC 2 Requirements and Liquibase Secure Support

1. Security: Logical and Physical Access Controls (CC6.1)

Requirement: The entity implements logical access controls to restrict access to information assets, including data, software, functions, and IT infrastructure, to authorized and authenticated users, and to meet the entity's objectives.

How Liquibase Secure Supports This: Liquibase Secure integrates with enterprise identity providers and existing access control systems to enforce role-based access to database change processes. Separation of duties ensures developers cannot directly deploy changes to production environments. Policy Checks validate that database changes do not grant unauthorized privileges or weaken existing access controls. Structured Logging captures complete audit trails documenting all access to database change systems, including authentication events and authorization decisions.

2. Security: Monitoring of Controls (CC7.2)

Requirement: The entity monitors system components and the operation of those controls to detect anomalies that are indicative of malicious acts, natural disasters, errors, and operating failures, and takes action to address such events.

How Liquibase Secure Supports This: Drift Detection continuously monitors database environments for unauthorized changes that occur outside approved workflows. When out-of-process modifications are identified, teams receive immediate alerts enabling rapid investigation and corrective action. Structured Logging provides comprehensive records supporting forensic analysis of control failures and security incidents. Observability features enable integration with SIEM platforms for centralized security monitoring.

3. Security: Change Management (CC8.1)

Requirement: The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.

How Liquibase Secure Supports This: Complete change governance through automated Flows ensures every database change follows documented procedures. Policy Checks validate changes before deployment. Testing gates integrated into Flows enforce quality standards. Approval workflows provide documented authorization for all changes. Version-controlled changelogs serve as comprehensive change documentation. This addresses all aspects of CC8.1 for database modifications.

4. Availability: System Monitoring (A1.2)

Requirement: The entity monitors system components to identify anomalies that are indicative of malicious acts, natural disasters, errors, and operating failures, and takes action to address such events.

How Liquibase Secure Supports This: Policy Checks prevent database changes that could negatively impact availability, such as operations causing extended locks, missing indexes on large tables, or schema modifications without proper capacity planning. Rollback capabilities built into Flows support rapid recovery from changes that unexpectedly impact availability. Structured Logging documents all changes for availability incident investigation and root cause analysis.

5. Processing Integrity: Processing Accuracy and Completeness (PI1.5)

Requirement: The entity implements policies and procedures to store inputs, items in processing, and outputs completely, accurately, and timely in accordance with system specifications to meet the entity's objectives.

How Liquibase Secure Supports This: Policy Checks validate that database changes maintain data integrity constraints, including foreign keys, check constraints, and unique constraints. Quality gates prevent modifications that could compromise data accuracy or completeness. Version-controlled change management ensures database schema evolution supports processing integrity objectives by preventing ad hoc changes that bypass validation.

6. Confidentiality: Encryption (C1.1)

Requirement: The entity protects confidential information through encryption and other protective methods as it is transmitted and stored.

How Liquibase Secure Supports This: Policy Checks validate that tables storing confidential data maintain appropriate encryption configurations and that new tables containing sensitive data types are created with encryption enabled. Automated validation ensures database changes do not inadvertently weaken encryption controls. Drift Detection identifies unauthorized modifications to security configurations protecting confidential information.

7. Common Criteria: Audit Logging and Review (CC7.3)

Requirement: The entity evaluates security events to determine whether they could or have impaired the entity's ability to meet its objectives (security incidents) by compromising the confidentiality, integrity, or availability of data.

How Liquibase Secure Supports This: Structured Logging captures all database changes with tamper-evident records that can be exported for auditor review. Every schema modification, configuration change, and privilege update is logged with complete who/what/when/where details. Logs can be exported to external systems for long-term retention and integrated with SIEM platforms for real-time security event correlation and analysis.

Control Objective Matrix


Trust Services Criterion
Control Objective
Liquibase Secure Feature
CC6.1 Access Controls
Restrict database change access to authorized users
RBAC integration, Secrets Management
CC6.1 Access Controls
Prevent unauthorized privilege escalation
Policy Checks
CC7.2 Monitoring
Detect unauthorized database changes
Drift Detection
CC7.3 Logging
Maintain audit trail of all changes
Structured Logging
CC8.1 Change Management
Authorize and document all changes
Flows (approval workflows)
CC8.1 Change Management
Validate changes before deployment
Policy Checks
A1.2 Availability
Prevent changes impacting availability
Policy Checks
PI1.5 Integrity
Maintain data integrity constraints
Policy Checks
C1.1 Confidentiality
Validate encryption configurations
Policy Checks, Drift Detection

Best Practice Evidence Checklist for Auditors

Liquibase Secure generates the following evidence types required for SOC 2 audits:

  • Control design documentation: Policies embedded in automated workflows demonstrating how controls are designed to operate
  • Control operating effectiveness evidence: Structured Logs showing controls operated throughout the audit period
  • Exception reporting: Drift Detection alerts demonstrating responsive monitoring and control failure identification
  • Change authorization evidence: Approval records from Flows for all database modifications
  • Access control evidence: Authentication and authorization logs showing enforcement of least-privilege access
  • Incident response documentation: Audit trails supporting investigation and remediation of security incidents
  • Segregation of duties evidence: Role assignments and approval workflows demonstrating separation of duties

All evidence can be exported in formats suitable for auditor review and retained according to compliance requirements.

Benefits Liquibase Secure Brings to SOC 2 Compliance

Streamlined SOC 2 Audit Process

Organizations implementing Liquibase Secure reduce SOC 2 audit preparation effort. Automated evidence generation provides auditors with comprehensive documentation of database change controls, reducing manual evidence collection requirements and accelerating audit completion.

Continuous Control Monitoring

SOC 2 Type II reports evaluate controls over time, not just at a single point. Liquibase Secure maintains continuous compliance through automated policy enforcement and real-time monitoring, ensuring controls operate effectively throughout the entire audit period rather than requiring manual testing at intervals.

Reduced Risk of Audit Exceptions

By enforcing SOC 2 control requirements at the point of database change, Liquibase Secure prevents control failures before they occur. This proactive approach reduces the risk of audit exceptions and control deficiencies in SOC 2 reports.

Enhanced Customer Trust

Enterprise customers require SOC 2 reports before engaging with vendors. Organizations with clean SOC 2 reports featuring documented database security controls differentiate themselves in competitive markets. Liquibase Secure provides evidence of comprehensive database governance that strengthens customer confidence during vendor assessments.

Support for Multiple Trust Services Criteria

Liquibase Secure addresses requirements across all five Trust Services Criteria, not just security. Organizations pursuing comprehensive SOC 2 reports covering availability, processing integrity, confidentiality, and privacy find that Liquibase Secure satisfies database-related requirements across multiple categories.

Operational Efficiency

Beyond compliance benefits, automated database governance improves operational efficiency. Teams spend less time on manual reviews and documentation, allowing more focus on development work. Organizations report substantial reductions in compliance-related manual effort.

SOC 2 and Go-to-Market Strategy

For technology companies, SOC 2 compliance is increasingly required for enterprise sales. Liquibase Secure accelerates time-to-market by:

  • Reducing time to SOC 2 readiness: Automated controls accelerate initial certification preparation
  • Enabling enterprise sales: Clean SOC 2 reports remove common procurement barriers
  • Supporting security questionnaires: Comprehensive documentation provides answers to customer security inquiries
  • Demonstrating organizational maturity: Documented database governance signals operational maturity to prospects

Common SOC 2 Control Gaps Addressed by Liquibase Secure

Based on common audit findings, Liquibase Secure addresses these frequent SOC 2 control gaps:

Insufficient change management documentation: Version-controlled changelogs provide comprehensive documentation of what changed, when, and by whom.

Lack of separation of duties: Automated approval workflows in Flows enforce segregation without requiring manual oversight for every change.

Inadequate access controls: Integration with SSO and RBAC systems enforces least-privilege access to database change processes.

Missing audit trails: Structured Logging captures all database activities with complete detail suitable for auditor review.

Ineffective monitoring: Real-time Drift Detection identifies control failures immediately rather than through periodic manual review.

Real-World Application

A Series B SaaS company preparing for its first SOC 2 Type II audit faced challenges demonstrating effective database change controls. Manual approval processes lacked documentation, and no system monitored for unauthorized changes.

After implementing Liquibase Secure, the organization automated approval workflows through Flows, ensuring every production database change had documented authorization. Policy Checks prevented common mistakes that previously resulted in security incidents. Drift Detection identified instances of out-of-process changes during the audit period, with Structured Logging providing complete records of detection and remediation.

The audit was completed without database-related exceptions. Auditors specifically noted the comprehensive database change controls as a strength in the final report. The clean SOC 2 report accelerated enterprise sales cycles by addressing security concerns proactively.

Conclusion

SOC 2 compliance for database environments requires documented access controls, comprehensive audit logging, formal change management, and continuous monitoring. Liquibase Secure embeds these Trust Services Criteria into database delivery workflows, transforming SOC 2 compliance from a manual audit preparation exercise into an automated operational capability.

Technology companies can confidently pursue SOC 2 certification, satisfy enterprise customer requirements, and accelerate go-to-market through comprehensive database governance that demonstrates organizational maturity and security commitment.

Ready to accelerate your SOC 2 compliance preparation with automated database governance? Learn how Liquibase Secure provides the controls, monitoring, and evidence generation that auditors and enterprise customers expect.

Get a Demo