August 30, 2023

SOC 2 Controls CC9: Risk Mitigation

The ninth SOC-2 requirement in the CC-series is Risk Mitigation.

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

CC9.1

SOC 2 CC9.1 requires that your organisation identifies, selects, and develops risk mitigation activities for risks arising from potential business disruptions.

CC9.1 highlights the following points of focus:

Contemplates Mitigation of Risks of Business Disruption

Risk mitigation activities should include the development of prepared policies, procedures, communications, and other processing solutions to react to, alleviate, and recover from security events that disrupt your organisation’s operations. Those policies and procedures should include monitoring processes, information, and communications to meet your objectives during reaction, mitigation, and recovery endeavours.

Considers the Use of Insurance to Mitigate Financial Impact Risks

Your organisation’s risk management activities should consider the use of insurance to counteract the financial impact of loss incidents that would otherwise harm the ability of your organisation to meet its objectives.

CC9.2

SOC 2 CC9.2 requires that your organisation assesses and manages risks associated with vendors and business partners.

CC9.2 highlights the following points of focus:

Establishes Conditions for Vendor and Business Partner Engagements

Your organisation should determine specific requirements for any vendor and business partner engagements. This includes (1) scope of services and product specifications, (2) roles and responsibilities, (3) compliance requirements, and (4) service levels.

Evaluates Vendor and Business Partner Risks

The organisation should periodically assess the risks that its vendors and business partners (and those organisations’ vendors and business partners) signify to the achievement of its objectives.

Allocates Responsibility and Accountability for Managing Vendors and Business Partners

Your management team should assign responsibility and accountability for the supervision of risks associated with your organisation’s vendors and business partners.

Creates Communication Procedures for Vendors and Business Partners

The organisation should establish communication and resolution protocols for service or product issues related to vendors and business partners.

Creates Exception Handling Procedures From Vendors and Business Partners

Your organisation should establish exception-handling procedures for any service or product issues related to your organisation’s vendors and business partners.

Evaluates Vendor and Business Partner Performance

The organisation should assess the performance of vendors and business partners periodically.

Applies Procedures for Focusing on Issues Detected During Vendor and Business Partner Assessments

Your organisation should implement procedures for addressing issues identified with vendor and business partner relationships.

Employs Procedures for Terminating Vendor and Business Partner Relationships

The organisation should apply procedures for terminating vendor and business partner relationships.

Obtains Confidentiality Commitments from Vendors and Business Partners

Your organisation should acquire confidentiality commitments consistent with your confidentiality commitments and obligations from vendors and business partners who have access to confidential information.

Evaluates Compliance With Confidentiality Commitments of Vendors and Business Partners

The organisation should periodically and, as needed, assess vendors' and business partners' compliance with your confidentiality commitments and requirements.

Attains Privacy Commitments from Vendors and Business Partners

Your organisation should obtain privacy commitments, consistent with the organisation’s privacy commitments and requirements, from vendors and business partners who have access to personal information.

Evaluates Compliance with Privacy Commitments of Vendors and Business Partners

Periodically and as needed, your organisation should assess compliance by vendors and business partners with your privacy commitments and requirements.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Getting Started
IT and Services
Financial Services
Professional Services
Growth