SOC 2 Control Mapping

ARX is deployed on Aptible, a SOC 2 Type II certified hosting infrastructure. This architecture creates a shared responsibility model for SOC 2 compliance. Some controls are fully inherited from Aptible, some are partially inherited (shared between Aptible and ARX), and some are the responsibility of the tenant organization operating agents on the platform.

This document maps the relevant SOC 2 Trust Service Criteria to their implementation in the ARX platform and clarifies the responsibility boundary for each control.

Responsibility Model

The SOC 2 responsibility model for ARX has three layers:

Layer Responsible Party Examples
Infrastructure Aptible (fully inherited) Physical security, network segmentation, OS patching, backup encryption, infrastructure monitoring.
Platform ARX (partially inherited) Authentication, authorization, audit logging, policy enforcement, encryption, change management for agents.
Tenant Customer organization Agent code, connector credential management, policy rule definitions, approval workflow staffing, incident response procedures.

When an auditor evaluates a tenant's SOC 2 posture for AI agent operations, the tenant can point to Aptible's SOC 2 Type II report for infrastructure controls and ARX's platform controls for the application layer. The tenant is responsible for configuring and operating the platform correctly.

CC6.1 -- Logical and Physical Access Controls

Criteria: The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events.

Fully Inherited from Aptible

ARX Platform Controls

Tenant Responsibility

Evidence: Audit log entries with action_type values of connector.called, agent.created, policy.created, and related actions demonstrate that access controls are enforced for every operation.

CC6.2 -- Prior to Issuing System Credentials and Granting System Access

Criteria: Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users.

ARX Platform Controls

Tenant Responsibility

Evidence: Audit log entries with action_type of policy.evaluated demonstrate that runtime authorization is applied to every connector operation.

CC6.3 -- Authorizes Access to Protected Information Assets

Criteria: The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design.

ARX Platform Controls

Tenant Responsibility

Evidence: Audit log entries with policy_verdict field values of PERMIT, ESCALATE, and DENY demonstrate that authorization decisions are made for every connector operation. Approval records provide evidence of human review for high-risk actions.

CC7.1 -- Monitoring System Components for Anomalies

Criteria: To meet its objectives, the entity uses detection and monitoring procedures to identify changes to configurations that result in the introduction of new vulnerabilities, and susceptibilities to newly discovered vulnerabilities.

Fully Inherited from Aptible

ARX Platform Controls

Tenant Responsibility

Evidence: Audit log entries with action_type of drift.detected and metadata containing severity classification provide evidence of continuous monitoring. SIEM integration records demonstrate real-time event forwarding.

CC7.2 -- Monitoring System Components for Anomalous Activity

Criteria: The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and errors affecting the entity's ability to meet its objectives; anomalies are analyzed to determine whether they represent security events.

ARX Platform Controls

Tenant Responsibility

Evidence: Audit log entries with action_type of agent.suspended and metadata containing drift context provide evidence of automated anomaly response. Approval records for ESCALATE verdicts demonstrate human analysis of flagged operations.

CC8.1 -- Authorization and Management of Changes

Criteria: The entity authorizes, designs, develops, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives.

Fully Inherited from Aptible

ARX Platform Controls

Tenant Responsibility

Evidence: The agent_versions table provides a complete history of all agent deployments. Audit log entries for agent.deployed and agent.rolled_back actions demonstrate tracked change management.

A1.2 -- Recovery and Availability Monitoring

Criteria: The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up, and recovery infrastructure and processes to meet its objectives.

Fully Inherited from Aptible

ARX Platform Controls

Tenant Responsibility

Evidence: Compliance package records with generated_at timestamps demonstrate regular evidence generation. Audit log export records demonstrate that evidence is available for offline archival.

Summary Matrix

Control Aptible (Inherited) ARX Platform Tenant Responsibility
CC6.1 Network access, infrastructure access RLS tenant isolation, RBAC, API key scoping, connector scope binding Role assignment, least-privilege policies
CC6.2 -- User registration via Auth, role assignment, API key issuance, policy engine Onboarding process, access reviews
CC6.3 -- Policy engine, human-in-the-loop approvals, declared intent manifests Policy rules, approval queue staffing, intent manifests
CC7.1 Infrastructure monitoring, IDS Immutable audit trail, SIEM fan-out, drift detection, webhooks SIEM configuration, alert review, intent maintenance
CC7.2 -- Dynamic risk scoring, drift severity, auto-suspension, CISO registry Risk thresholds, drift triage, incident investigation
CC8.1 Infrastructure change management Agent versioning, deployment audit logging, role-restricted deployment Change management process, version review
A1.2 Backups, HA, failover, encryption at rest Audit retention, package versioning, export capabilities Retention configuration, evidence archival