SOC 2 Software Timeout Requirements

January 13, 2025

For your organization to be SOC 2 compliant, it needs to satisfy five trust services criteria, ranging from information security to consumer privacy. Security is the first and foremost TSC and supports all other controls. Complying with this pillar goes beyond good password hygiene and multi-factor authentication. You also need to meet SOC 2 software timeout requirements. What does this entail?

What Are SOC 2 Software Timeout Requirements?

What are SOC 2 software  timeout requirements?

SOC 2 requirements related to device and software timeouts appear in CC6: Common Criteria Related to Logical and Physical Access. This family of CC6 security controls requires your organization to implement reasonable user timeouts for any device, software application, platform, database, or network asset that allows access to sensitive information.

Software Timeouts Explained

Software timeouts involve periodically logging out users from a system. Many organizations implement timeouts based on inactivity. After “X” minutes with no user input, the session ends and a new login is required.

Mobile device security can tie timeouts to the lock screen. Every time the lock screen appears, users must begin a new session.

Unique SOC 2 Software Timeout Requirements

SOC 2 security criteria don’t spell out a detailed checklist to follow for compliance. Instead, auditors evaluate the unique risks your organization faces and the effectiveness of security measures in place.

The right session timeout policies for one industry may not be ideal for another. For example, nurses who can access patient medical histories in crowded hospitals may need stricter software timeout settings than IT personnel who monitor network activity in a private office.

What Do SOC 2 Software Timeout Requirements Include?

To create access control policies that are strong but practical for operations, your organization needs to consider several aspects of CC6 guidelines.

CC6.1 Access Control Measures

Login credentials are a part of SOC 2 timeout requirements.

CC6.1 requires your organization to “implement logical access security software, infrastructure, and architectures over protected information assets to protect them from security events.” This involves:

  • Identifying which software contains or connects to protected information
  • Setting up secure controls (e.g., passwords, MFA, and firewalls) to restrict access to authorized personnel
  • Giving authorized users unique login credentials
  • Implementing access control measures on all relevant network devices, including software, APIs, cloud storage systems, CRM platforms, servers, and endpoints, including smartphones and IoT devices

Businesses generally think of access control in terms of online logins, but an increasing number of organizations also need to protect against in-person cybersecurity threats. Cybercriminals can gain access through stolen physical devices just as easily as with stolen credentials.

CC6.2 Creation and Removal of User Credentials

Maintaining software security is an ongoing process, not a “set it and forget it” checklist. CC6.2 explains: “Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity. For those users whose access is administered by the entity, user system credentials are removed when user access is no longer authorized.”

On a large scale, this means vetting new employees, customers, and other software users. Once individuals are no longer authorized — e.g., they no longer work at your company — access credentials should be deleted immediately.

This principle also applies to software timeouts. Once users/devices become inactive, their access to the system should be removed ASAP. This also means prohibiting employees from using “trust this device” or saved credentials to log into your software. 

CC6.3 Principle of Least Privilege

The principle of least privilege is a cornerstone of modern cybersecurity, especially as attack surfaces seem to increase exponentially. This principle means that your company should only allow the minimum amount of access necessary for employees to do their job effectively. For example:

  • Healthcare personnel should only be able to access the protected health information of patients in their care, not every patient in the hospital
  • New employees should not have access to any confidential business records
  • Workers in the accounting department shouldn’t be able to see R&D files, only relevant financial documents

Mobile endpoints are notoriously difficult to secure, so your access and session logout policies need to be especially strict for smartphones, tablets, laptops, and any other devices that can connect to your network or SaaS platform.

CC6.6 External Protections

While other SOC 2 software timeout requirements focus on improper internal access, CC6.6 highlights risks from outside the organization: “The entity implements logical access security measures to protect against threats from sources outside its system boundaries.”

Session timeouts should reasonably consider how unexpected situations can introduce vulnerabilities, such as:

  • Mobile device theft
  • Laptops or smartphones left unattended
  • Deliberate distractions and emergencies
  • Accidental loss of credentials
  • Remote work (e.g., home offices, family members, and visitors)
  • IT-related emails sent to the wrong person

The greater the risks, the stricter your session timeout and user authentication policies need to be for SOC 2 compliance. MFA and monitoring for suspicious logins are a must in high-risk scenarios.

CC6.7 Data Transmission Protections

SOC 2 timeout requirements help to protect data transmissions.

Software timeouts are also helpful for keeping bad actors from exfiltrating sensitive data. CC6.7 requires you to “restrict the transmission, movement, and removal of information to authorized internal and external users and processes.”

This can include automatically requiring credential re-verification for certain actions, even for logged-in users. Anything related to admin settings, network assets, confidential documents, password settings, and the creation of user credentials should trigger this type of automation session timeout.

Data security best practices also include timed lockouts and flagging for failed login attempts. This can help to prevent brute-force attacks, which are more dangerous now that AI systems can rapidly scale login attempts, cracking over 70% of common passwords in a day.

Why Are SOC 2 Software Timeout Requirements Important?

Software timeouts are closely related to following a zero-trust framework. Put simply, you can’t take access control for granted.

Some employees steal. Devices get lost or stolen. Workers can carelessly leave smartphones in the open. Software timeouts help you build strong cybersecurity defenses despite these risks.

How Can You Implement SOC 2 Software Timeout Requirements?

Effective cybersecurity requires detailed visualization and tracking of your organization’s vulnerabilities. Compliance platforms like Compyl help you see where you’re at versus where you need to be. Create custom workflows that carefully follow SOC 2 software timeout requirements. Learn more about Compyls powerful SOC 2 compliance features today.

By clicking “Accept”, you agree to the use of cookies on your device in accordance with our Privacy and Cookie policies