{"id":8290,"date":"2025-12-16T11:19:29","date_gmt":"2025-12-16T05:49:29","guid":{"rendered":"https:\/\/mitigata.com\/blog\/?p=8290"},"modified":"2026-02-04T15:18:25","modified_gmt":"2026-02-04T09:48:25","slug":"soc2-type2-controls-list","status":"publish","type":"post","link":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/","title":{"rendered":"SOC 2 Type 2 Controls Explained: Security &#038; Compliance Checklist"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8290\" class=\"elementor elementor-8290\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e466185 e-flex e-con-boxed e-con e-parent\" data-id=\"e466185\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f14c71 elementor-widget elementor-widget-text-editor\" data-id=\"1f14c71\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ever been asked, \u201cDo you have SOC 2 Type 2?\u201d and felt that quiet panic?<\/p><p>Or wondered why investors care so much about a compliance report that most founders don\u2019t fully understand?<\/p><p>If you are running a tech company today, SOC 2 is your golden ticket to crack global markets, particularly in finance and healthcare sectors, where data security is completely non-negotiable.\u00a0<\/p><p>Over <b>60% of <\/b><a href=\"https:\/\/mitigata.com\/blog\/cyber-insurance-for-fintech\/\"><b>fintech startups<\/b><\/a> hit compliance walls early in their growth journey, forcing them to scramble for SOC 2 Type 2 reports just to maintain investor confidence and close enterprise deals.<\/p><p>And it&#8217;s not just fintech. A <b>2025 compliance survey<\/b> revealed that SOC 2 now ranks among the top three &#8220;most important&#8221; security frameworks across all industries and revenue bands.\u00a0<\/p><p>In this blog, we&#8217;ll break down the complete SOC 2 Type 2 controls list, explore the specific security controls and reveal the common compliance controls companies miss.<\/p><h2><b>How Mitigata Helps You Meet SOC 2 Compliance Requirements Faster<\/b><\/h2><p>Most compliance tools are built by teams that have never faced a real audit. Mitigata is different. We are certified to ISO 27001, HIPAA, GDPR, and SOC 2. We do not just explain compliance. We have lived it, passed audits, and refined what actually works.<\/p><p>Here is how Mitigata helps you move faster:<\/p><p><b>Guided SOC 2 readiness workflow<\/b><\/p><p>Step-by-step guidance for every SOC 2 control, with clear instructions, templates, and evidence requirements.<\/p><p><b>Human support + automation<\/b><\/p><p>Automation handles evidence collection and monitoring, while experienced compliance experts support you when you need clarity.<\/p><p><b>Clear audit preparation<\/b><\/p><p>All evidence is organised, mapped to controls, and ready for auditors, reducing last-minute stress.<\/p><p><b>Complete <\/b><a href=\"https:\/\/mitigata.com\/blog\/best-grc-tools-solutions\/\"><b>GRC automation<\/b><\/a><b> platform<\/b><\/p><p>Manage SOC 2, ISO 27001, HIPAA, and GDPR in one place as your compliance needs grow.<\/p><p><b>Transparent, market-friendly pricing<\/b><\/p><p>Pricing that scales with your company, without hidden costs or surprises.<\/p><p><b>Trusted auditor partnerships and 500+ tools<\/b><\/p><p>Work with top auditors and access built-in tools for risk management, policies, vendors, and incident response.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2e1743 e-flex e-con-boxed e-con e-parent\" data-id=\"b2e1743\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ef83267 e-con-full e-flex e-con e-child\" data-id=\"ef83267\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b6c1c6 elementor-widget elementor-widget-heading\" data-id=\"6b6c1c6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">See All Your Risks Clearly on a \n<span style=\"color:#04DB7F\">Single Dashboard<\/span>\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ab9919 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4ab9919\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02bde44 elementor-widget elementor-widget-text-editor\" data-id=\"02bde44\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Track open risks, control status, vendor assessments, and audits instantly with Mitigata\u2019s cost-effective and scalable GRC platform.<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae824bc elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ae824bc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mitigata.com\/bookDemo\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to Our Experts today!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92c5fc7 e-con-full e-flex e-con e-child\" data-id=\"92c5fc7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3824640 elementor-widget elementor-widget-image\" data-id=\"3824640\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/06\/Green-and-White-Modern-Computer-Service-Repair-Logo.png\" class=\"attachment-medium size-medium wp-image-3615\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1699520 e-flex e-con-boxed e-con e-parent\" data-id=\"1699520\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d63f1dd elementor-widget elementor-widget-text-editor\" data-id=\"d63f1dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><b>What Are SOC 2 Compliance Controls?<\/b><\/h2><p>SOC 2 controls are specific security measures and processes your organisation implements to protect customer data and systems.<\/p><p>Controls can be:<\/p><ul><li>Preventive (stopping bad things from happening, like firewall rules)<\/li><li>Detective (catching bad things when they happen, like intrusion detection)<\/li><li>Corrective (fixing bad things after they happen, like incident response)<\/li><\/ul><p>Your job isn&#8217;t to implement every possible control. It&#8217;s to implement the right controls for your specific risk profile and document that they&#8217;re working effectively over time.<\/p><p><img decoding=\"async\" class=\"alignnone size-full wp-image-8294\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Blog-graphics-14.png\" alt=\"SOC 2 controls\" width=\"1100\" height=\"650\" \/><\/p><blockquote><p>Are you counted among those 60% of GRC users who manage compliance manually? It\u2019s high time to check these popular automated <a href=\"https:\/\/mitigata.com\/blog\/best-grc-tools-solutions\/\"><i><b>GRC tools in India<\/b><\/i><\/a><\/p><\/blockquote><h3><b>SOC 2 Type 2 vs Type 1<\/b><\/h3><p>SOC 2 Type 1 is a point-in-time assessment. An auditor examines your controls on a specific date and confirms they&#8217;re designed appropriately. It&#8217;s a snapshot. It proves you had your security house in order on inspection day.<\/p><p>SOC 2 Type 2 is the real deal. It covers a period of time, usually 3, 6, or 12 months. The auditor doesn&#8217;t just check if your controls exist. They verify that you&#8217;ve been operating those controls consistently and effectively throughout the entire audit period.<\/p><table style=\"width: 100%; border-collapse: collapse; font-family: Arial, sans-serif;\"><thead><tr style=\"background-color: #04db7f; color: #000;\"><th style=\"padding: 10px; border: 1px solid #ddd; text-align: left;\">Requirement Category<\/th><th style=\"padding: 10px; border: 1px solid #ddd; text-align: left;\">SOC 2 Type 1<\/th><th style=\"padding: 10px; border: 1px solid #ddd; text-align: left;\">SOC 2 Type 2<\/th><\/tr><\/thead><tbody><tr><td style=\"padding: 10px; border: 1px solid #ddd;\">Control design<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Yes<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Yes<\/td><\/tr><tr><td style=\"padding: 10px; border: 1px solid #ddd;\">Control operation over time<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">No<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Yes<\/td><\/tr><tr><td style=\"padding: 10px; border: 1px solid #ddd;\">Evidence required<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Light<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Heavy<\/td><\/tr><tr><td style=\"padding: 10px; border: 1px solid #ddd;\">Audit duration<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Short<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Longer<\/td><\/tr><tr><td style=\"padding: 10px; border: 1px solid #ddd;\">Market value<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">Moderate<\/td><td style=\"padding: 10px; border: 1px solid #ddd;\">High<\/td><\/tr><\/tbody><\/table><h2><b>SOC 2 Type 2 Controls List<\/b><\/h2><p>Here&#8217;s a comprehensive breakdown of the SOC 2 Type 2 controls organised by category.<\/p><h3><b>Key SOC 2 security controls list:<\/b><\/h3><ul><li>User access management and role-based access<\/li><li>Multi-factor authentication for critical systems<\/li><li>Secure onboarding and offboarding of employees<\/li><li>Change management approvals<\/li><li><a href=\"https:\/\/mitigata.com\/blog\/create-incident-response-plan\/\">Incident response planning<\/a> and testing<\/li><li><a href=\"https:\/\/mitigata.com\/blog\/cyber-security-training-for-employees\/\">Security awareness training<\/a><\/li><li><a href=\"https:\/\/mitigata.com\/blog\/cyber-security-training-for-employees\/\">Vendor risk management<\/a><\/li><\/ul><p>Example: If an engineer leaves the company, the control requires proof that their access was removed promptly across all systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4362b8 e-flex e-con-boxed e-con e-parent\" data-id=\"c4362b8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-781b5df e-con-full e-flex e-con e-child\" data-id=\"781b5df\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea71f2a elementor-widget elementor-widget-heading\" data-id=\"ea71f2a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">From Policy to Proof\n<span style=\"color:#04DB7F\"> Manage Everything in<\/span> One Place\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45c8a9a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"45c8a9a\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06dbbf5 elementor-widget elementor-widget-text-editor\" data-id=\"06dbbf5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mitigata GRC streamlines compliance tasks so you save time, reduce errors, and focus on what really matters.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ab7a19 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"8ab7a19\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mitigata.com\/bookDemo\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to Our Experts today!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e373fcd e-con-full e-flex e-con e-child\" data-id=\"e373fcd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38996ff elementor-widget elementor-widget-image\" data-id=\"38996ff\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/06\/Green-and-White-Modern-Computer-Service-Repair-Logo.png\" class=\"attachment-medium size-medium wp-image-3615\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-557a496 e-flex e-con-boxed e-con e-parent\" data-id=\"557a496\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d34976b elementor-widget elementor-widget-text-editor\" data-id=\"d34976b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Availability Controls<\/b><\/h3><p>These controls ensure systems stay up and recover quickly.<\/p><ul><li>Uptime monitoring<\/li><li>Incident response for outages<\/li><li>Backup and recovery testing<\/li><li>Capacity planning<\/li><\/ul><p>Example: Showing logs from backup tests performed quarterly can satisfy availability control requirements.<\/p><h3><b>Confidentiality Controls<\/b><\/h3><p>These protect sensitive or restricted data.<\/p><ul><li>Data classification policies<\/li><li>Encryption at rest and in transit<\/li><li>Restricted access to confidential data<\/li><li>Secure data disposal<\/li><\/ul><p>Example: Evidence that customer financial data is encrypted and access is limited to approved roles.<\/p><blockquote><p>Most companies confuse <b><a href=\"https:\/\/mitigata.com\/blog\/digital-forensics-vs-incident-response\/\"><b>digital forensics and incident response<\/b><\/a>, <\/b>but the difference can make or break recovery. Do you know what your business needs first?<\/p><\/blockquote><h3><b>Processing Integrity Controls<\/b><\/h3><p>These ensure systems process data accurately.<\/p><ul><li>Input validation checks<\/li><li>Error handling procedures<\/li><li>Change approvals for system updates<\/li><li>Monitoring and alerting<\/li><\/ul><h3><b>Privacy Controls (If Applicable)<\/b><\/h3><p>Required if you handle personal data.<\/p><ul><li>Privacy notices<\/li><li>Consent management<\/li><li>Data retention rules<\/li><li>Data subject request handling<\/li><\/ul><h2><b>Common SOC 2 Compliance Controls Companies Miss<\/b><\/h2><p>Here are the most common issues SOC 2 compliance auditors flag:<\/p><p><b>Access reviews without evidence<\/b><b><br \/><\/b>Many teams regularly review user access, but fail to document it. Auditors need proof, not promises. This usually means screenshots, approval records, or system-generated logs showing who reviewed access, when it was done, and what actions were taken.<\/p><p><b>Vendor risk management gaps<\/b><b><br \/><\/b>Vendor assessments are often treated as a one-time activity during onboarding. SOC 2 expects ongoing monitoring. Auditors look for periodic reviews, updated risk assessments, and evidence that high-risk vendors are re-evaluated regularly.<\/p><p><b>Change management shortcuts<\/b><b><br \/><\/b>Emergency fixes happen, especially in fast-moving teams. The problem arises when changes are pushed without approvals or documentation. SOC 2 requires proof that even urgent changes are reviewed, tested, and logged after the fact.<\/p><p><b>Incident response plans that are never tested<\/b><b><br \/><\/b>Having an incident response policy is not enough. Auditors expect evidence of testing, such as tabletop exercises or simulations. Without proof that the plan was practised, the control is considered weak.<\/p><p><b>Overlooking internal tools and scripts<\/b><b><br \/><\/b>Internal dashboards, scripts, and admin tools often handle sensitive data but are excluded from security reviews. Auditors expect these tools to follow the same access controls, logging, and monitoring as customer-facing systems.<\/p><blockquote><p>Why are cyber insurance approvals getting tougher? Discover the <a href=\"https:\/\/mitigata.com\/blog\/cyber-insurance-application-process\/\"><b>application pitfalls<\/b><\/a> most businesses never notice.<\/p><\/blockquote><h2><b>Tools That Help Manage SOC 2 Controls<\/b><\/h2><p>Sure, using spreadsheets for SOC 2 is an option, but it involves a lot of hassles and mistakes. The following are the must-have tools for your SOC 2 compliance:<\/p><p><b>GRC Platforms:<\/b> Integrate control frameworks, automate evidence collection, monitor status, and create audit packs.<\/p><p><b>Identity and Access Management (<\/b><a href=\"https:\/\/mitigata.com\/blog\/choosing-iam-tool\/\"><b>IAM)<\/b><\/a><b>: <\/b>Unifies the authentication and access control procedures.<\/p><p><a href=\"https:\/\/mitigata.com\/blog\/step-by-step-guide-to-implementing-siem-for-enterprises\/\"><b>SIEM<\/b><\/a><b> &#8211; <\/b>Gather logs from various sections of your system, determine the security events that occurred, and retain the trails for audits.<\/p><p><b>Vulnerability Management: <\/b>Entails regularly scanning your systems for flaws and keeping records of the efforts taken to remedy them.<\/p><p><b>Endpoint Detection and Response (<\/b><a href=\"https:\/\/mitigata.com\/blog\/top-10-edr-solutions-in-india\/\"><b>EDR<\/b><\/a><b>):<\/b> Ensure that the endpoints are not vulnerable to threats, and at the same time, allow the monitoring of endpoint activities.<\/p><p><b>Change Management and Ticketing: <\/b>The whole process of change requests, approvals, testing, and finally, the implementation.<\/p><p><b>Vendor Risk Management:<\/b> Facilitate the evaluation and continuous observation of the security posture of the vendors.<\/p><p><strong data-start=\"6203\" data-end=\"6215\">Pro tip:<\/strong><br data-start=\"6215\" data-end=\"6218\" \/>Auditors prefer tools that automatically generate audit-ready evidence rather than manual uploads.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d0208c e-flex e-con-boxed e-con e-parent\" data-id=\"8d0208c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f945047 e-con-full e-flex e-con e-child\" data-id=\"f945047\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-731e1e0 elementor-widget elementor-widget-heading\" data-id=\"731e1e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ready to simplify compliance and \n<span style=\"color:#04DB7F\"> cut manual work?<\/span> \n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35b5a17 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"35b5a17\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35f4f4e elementor-widget elementor-widget-text-editor\" data-id=\"35f4f4e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mitigata\u2019s GRC automation tool keeps your controls monitored, evidence organised, and audits stress-free.<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78d5f0f elementor-align-left elementor-widget elementor-widget-button\" data-id=\"78d5f0f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mitigata.com\/bookDemo\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to Our Experts today!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eda8f74 e-con-full e-flex e-con e-child\" data-id=\"eda8f74\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b816e3 elementor-widget elementor-widget-image\" data-id=\"8b816e3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/06\/Green-and-White-Modern-Computer-Service-Repair-Logo.png\" class=\"attachment-medium size-medium wp-image-3615\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f22976e e-flex e-con-boxed e-con e-parent\" data-id=\"f22976e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75a04b2 elementor-widget elementor-widget-text-editor\" data-id=\"75a04b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Conclusion<\/b><\/h3><p>Understanding your SOC 2 compliance control list, implementing proper security measures, and avoiding common compliance issues will help you win deals with confidence.<\/p><p><a href=\"https:\/\/mitigata.com\/bookDemo\">Schedule a demo<\/a> with Mitigata today to turn SOC 2 into a growth booster.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62c8943 e-flex e-con-boxed e-con e-parent\" data-id=\"62c8943\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e84c7cf elementor-widget elementor-widget-html\" data-id=\"e84c7cf\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"application\/ld+json\">\r\n{\r\n  \"@context\": \"https:\/\/schema.org\/\", \r\n  \"@type\": \"Product\", \r\n  \"name\": \"SOC 2 Type 2 Controls Explained: Security & Compliance Checklist\",\r\n  \"image\": \"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png\",\r\n  \"description\": \"Looking for a SOC 2 Type 2 controls list? See required security and compliance controls, examples, and implementation tips.\",\r\n  \"aggregateRating\": {\r\n    \"@type\": \"AggregateRating\",\r\n    \"ratingValue\": \"4.8\",\r\n    \"bestRating\": \"5\",\r\n    \"worstRating\": \"4.5\",\r\n    \"ratingCount\": \"51902\"\r\n  }\r\n}\r\n<\/script>\r\n\r\n<meta name=\"author\" content=\"Deepthi Sree\">\r\n<meta name=\"publisher\" content=\"Mitigata\">\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ever been asked, \u201cDo you have SOC 2 Type 2?\u201d and felt that quiet panic? Or wondered why investors care&hellip;<\/p>\n","protected":false},"author":16,"featured_media":8291,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[303],"class_list":["post-8290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-soc-2-compliance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SOC 2 Type 2 Controls Explained: Security &amp; Compliance Checklist<\/title>\n<meta name=\"description\" content=\"Looking for a SOC 2 Type 2 controls list? See required security and compliance controls, examples, and implementation tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOC 2 Type 2 Controls Explained: Security &amp; Compliance Checklist\" \/>\n<meta property=\"og:description\" content=\"Looking for a SOC 2 Type 2 controls list? See required security and compliance controls, examples, and implementation tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/\" \/>\n<meta property=\"og:site_name\" content=\"Mitigata Cyber insurance &amp; security blogs\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-16T05:49:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-04T09:48:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2202\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"areena g\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mitigata\" \/>\n<meta name=\"twitter:site\" content=\"@mitigata\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"areena g\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/\"},\"author\":{\"name\":\"areena g\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba\"},\"headline\":\"SOC 2 Type 2 Controls Explained: Security &#038; Compliance Checklist\",\"datePublished\":\"2025-12-16T05:49:29+00:00\",\"dateModified\":\"2026-02-04T09:48:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/\"},\"wordCount\":1269,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png\",\"keywords\":[\"soc 2 compliance\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/\",\"url\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/\",\"name\":\"SOC 2 Type 2 Controls Explained: Security & Compliance Checklist\",\"isPartOf\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png\",\"datePublished\":\"2025-12-16T05:49:29+00:00\",\"dateModified\":\"2026-02-04T09:48:25+00:00\",\"description\":\"Looking for a SOC 2 Type 2 controls list? See required security and compliance controls, examples, and implementation tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage\",\"url\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png\",\"contentUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png\",\"width\":2202,\"height\":800,\"caption\":\"SOC 2 Type 2 controls\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mitigata.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOC 2 Type 2 Controls Explained: Security &#038; Compliance Checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mitigata.com\/blog\/#website\",\"url\":\"https:\/\/mitigata.com\/blog\/\",\"name\":\"Mitigata Cyber insurance & security blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#organization\"},\"alternateName\":\"Mitigata - smart cyber insurance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mitigata.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mitigata.com\/blog\/#organization\",\"name\":\"Mitigata: Smart Cyber insurance\",\"url\":\"https:\/\/mitigata.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png\",\"contentUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png\",\"width\":648,\"height\":280,\"caption\":\"Mitigata: Smart Cyber insurance\"},\"image\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/mitigata\",\"https:\/\/www.instagram.com\/mitigata_insurance\/\",\"https:\/\/www.linkedin.com\/company\/mitigata-insurance\/\"],\"legalName\":\"Mitigata Insurance Broker private limited\",\"foundingDate\":\"2021-07-30\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba\",\"name\":\"areena g\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g\",\"caption\":\"areena g\"},\"description\":\"Areena is a content and marketing professional with over three years of experience. She enjoys building content strategies and writing pieces that speak clearly to the audience and support real business goals. Her strength lies in turning complex topics into meaningful, reader-friendly content.\",\"sameAs\":[\"https:\/\/mitigata.com\/\"],\"url\":\"https:\/\/mitigata.com\/blog\/author\/areena\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SOC 2 Type 2 Controls Explained: Security & Compliance Checklist","description":"Looking for a SOC 2 Type 2 controls list? See required security and compliance controls, examples, and implementation tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/","og_locale":"en_US","og_type":"article","og_title":"SOC 2 Type 2 Controls Explained: Security & Compliance Checklist","og_description":"Looking for a SOC 2 Type 2 controls list? See required security and compliance controls, examples, and implementation tips.","og_url":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/","og_site_name":"Mitigata Cyber insurance &amp; security blogs","article_published_time":"2025-12-16T05:49:29+00:00","article_modified_time":"2026-02-04T09:48:25+00:00","og_image":[{"width":2202,"height":800,"url":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png","type":"image\/png"}],"author":"areena g","twitter_card":"summary_large_image","twitter_creator":"@mitigata","twitter_site":"@mitigata","twitter_misc":{"Written by":"areena g","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#article","isPartOf":{"@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/"},"author":{"name":"areena g","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba"},"headline":"SOC 2 Type 2 Controls Explained: Security &#038; Compliance Checklist","datePublished":"2025-12-16T05:49:29+00:00","dateModified":"2026-02-04T09:48:25+00:00","mainEntityOfPage":{"@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/"},"wordCount":1269,"commentCount":0,"publisher":{"@id":"https:\/\/mitigata.com\/blog\/#organization"},"image":{"@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage"},"thumbnailUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png","keywords":["soc 2 compliance"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/","url":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/","name":"SOC 2 Type 2 Controls Explained: Security & Compliance Checklist","isPartOf":{"@id":"https:\/\/mitigata.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage"},"image":{"@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage"},"thumbnailUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png","datePublished":"2025-12-16T05:49:29+00:00","dateModified":"2026-02-04T09:48:25+00:00","description":"Looking for a SOC 2 Type 2 controls list? See required security and compliance controls, examples, and implementation tips.","breadcrumb":{"@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#primaryimage","url":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png","contentUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/12\/Frame-146-1.png","width":2202,"height":800,"caption":"SOC 2 Type 2 controls"},{"@type":"BreadcrumbList","@id":"https:\/\/mitigata.com\/blog\/soc2-type2-controls-list\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mitigata.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SOC 2 Type 2 Controls Explained: Security &#038; Compliance Checklist"}]},{"@type":"WebSite","@id":"https:\/\/mitigata.com\/blog\/#website","url":"https:\/\/mitigata.com\/blog\/","name":"Mitigata Cyber insurance & security blogs","description":"","publisher":{"@id":"https:\/\/mitigata.com\/blog\/#organization"},"alternateName":"Mitigata - smart cyber insurance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mitigata.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mitigata.com\/blog\/#organization","name":"Mitigata: Smart Cyber insurance","url":"https:\/\/mitigata.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png","contentUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png","width":648,"height":280,"caption":"Mitigata: Smart Cyber insurance"},"image":{"@id":"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/mitigata","https:\/\/www.instagram.com\/mitigata_insurance\/","https:\/\/www.linkedin.com\/company\/mitigata-insurance\/"],"legalName":"Mitigata Insurance Broker private limited","foundingDate":"2021-07-30","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba","name":"areena g","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g","caption":"areena g"},"description":"Areena is a content and marketing professional with over three years of experience. She enjoys building content strategies and writing pieces that speak clearly to the audience and support real business goals. Her strength lies in turning complex topics into meaningful, reader-friendly content.","sameAs":["https:\/\/mitigata.com\/"],"url":"https:\/\/mitigata.com\/blog\/author\/areena\/"}]}},"_links":{"self":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts\/8290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/comments?post=8290"}],"version-history":[{"count":14,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts\/8290\/revisions"}],"predecessor-version":[{"id":9279,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts\/8290\/revisions\/9279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/media\/8291"}],"wp:attachment":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/media?parent=8290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/categories?post=8290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/tags?post=8290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}