SOC 2
How a Dr.Who Domain Audit Report maps to SOC 2.
The 15 dossier checks map to specific SOC 2 Trust Services Criteria. Buy a signed pack and your auditor sees the mapping in the cover letter — no manual cross-walk required.
Per-control mapping
| Check | Control | Evidence |
|---|---|---|
| CC6.6 | Authoritative DNS records demonstrate domain ownership and DNS hygiene. | |
| CC6.7 | SPF prevents unauthorised servers from sending mail as your domain. | |
| CC6.1 | CORS policy controls cross-origin access to application data. | |
| CC7.1 | Public-surface inventory aids vulnerability management. | |
| CC7.2 | TLS-RPT delivers operational telemetry on email transport failures. | |
| CC1.4 | Domain registration data documents ownership and expiry. |
The pack manifest cites the same controls per finding. See methodology v1.