Back to Blog
Insights13 min read

What Does a CSA2 Audit Cover?

A

Alexander Sverdlov

Security Analyst

3/28/2026
What Does a CSA2 Audit Cover?

CSA STAR · Audit Deep Dive · March 2026

If you are preparing for a CSA STAR Level 2 audit, you need to know exactly what the auditors will examine, what evidence they expect, and who from your team needs to be in the room. Here is the complete breakdown based on real audit engagements.

💫 Key Takeaways

  • CSA STAR Level 2 audits evaluate your controls against all 17 domains of the Cloud Controls Matrix (CCM) v4
  • The audit is conducted as an extension of either SOC 2 (Attestation) or ISO 27001 (Certification)
  • Auditors review policies, technical configurations, evidence artifacts, and interviews with your team
  • A typical Level 2 audit takes 5-15 days of on-site or remote fieldwork, depending on scope
  • The most common findings involve identity management, change control, and logging gaps
  • You will need involvement from security, engineering, DevOps, HR, and executive leadership

I have guided dozens of organizations through CSA STAR Level 2 audits, and the question I hear most often during the kickoff call is always some variation of: “So what exactly are they going to look at?”

It is a fair question. The Cloud Controls Matrix has 197 control specifications across 17 domains, and the prospect of an auditor methodically working through all of them can feel overwhelming. But once you understand the structure, the process becomes much more manageable - and honestly, most organizations find fewer surprises than they expected.

Let me walk you through exactly what a CSA2 audit covers, domain by domain, day by day, and person by person.

🛠

The Framework

All 17 CCM v4 Control Domains Explained

The Cloud Controls Matrix version 4 organizes security controls into 17 domains. Each domain contains multiple control specifications that the auditor will evaluate. Here is what each domain covers and why it matters:

# Domain What Auditors Examine
1 Audit & Assurance (A&A) Internal audit programs, audit planning, independent assessments, compliance monitoring
2 Application & Interface Security (AIS) Secure SDLC, API security, application vulnerability management, security testing
3 Business Continuity & Operational Resilience (BCR) BC/DR plans, RTOs/RPOs, backup strategies, resilience testing
4 Change Control & Configuration Management (CCC) Change management processes, configuration baselines, unauthorized change detection
5 Cryptography, Encryption & Key Mgmt (CEK) Encryption at rest and in transit, key lifecycle management, cryptographic standards
6 Datacenter Security (DCS) Physical security controls, environmental protections, asset management
7 Data Security & Privacy Lifecycle Mgmt (DSP) Data classification, data flow mapping, privacy controls, data retention and deletion
8 Governance, Risk & Compliance (GRC) Risk management framework, policy governance, regulatory compliance tracking
9 Human Resources Security (HRS) Background checks, security training, acceptable use policies, offboarding procedures
10 Identity & Access Management (IAM) Access provisioning, MFA, privileged access management, access reviews
11 Interoperability & Portability (IPY) Data portability, API standards, vendor lock-in avoidance
12 Infrastructure & Virtualization Security (IVS) Network segmentation, virtualization hardening, cloud infrastructure configurations
13 Logging & Monitoring (LOG) Security logging, log integrity, monitoring alerting, SIEM configuration, log retention
14 Security Incident Mgmt, E-Discovery & Forensics (SEF) Incident response plans, breach notification procedures, forensic capabilities
15 Supply Chain Management, Transparency & Accountability (STA) Third-party risk management, vendor assessments, supply chain security
16 Threat & Vulnerability Management (TVM) Vulnerability scanning, penetration testing, threat intelligence, patch management
17 Universal Endpoint Management (UEM) Endpoint security, mobile device management, endpoint detection and response

Not all 17 domains carry equal weight in every audit. The auditor will scope the assessment based on your service model (IaaS, PaaS, SaaS), your infrastructure architecture, and the shared responsibility model with your cloud provider. If you are a pure SaaS company running on AWS, for instance, the Datacenter Security (DCS) domain will be largely addressed by your cloud provider’s certifications, while Identity & Access Management (IAM) and Application Security (AIS) will be heavily scrutinized.

🔍

Auditor Perspective

What Auditors Actually Look For

Understanding the auditor’s mindset is half the battle. They are not trying to catch you out - they are trying to determine whether your controls are (a) designed effectively and (b) operating as intended over the review period. For each control specification, the auditor evaluates three things:

1. Policy and documentation. Is there a formal, approved policy that addresses this control? Is it current, communicated to relevant personnel, and reviewed at least annually?

2. Implementation evidence. Can you demonstrate that the policy is actually implemented? This means screenshots, configuration exports, system logs, or tool outputs that show the control is in place - not just written down.

3. Operating effectiveness. Has the control been functioning consistently over the review period? The auditor will sample evidence from multiple points in time to verify that the control was not just implemented for the audit but has been operating continuously.

What Trips Companies Up

The most common audit finding I see is not a missing control - it is a control that exists on paper but is not consistently followed. For example: you have an access review policy requiring quarterly reviews, but the last review was seven months ago. Or you have a change management process documented, but your git history shows multiple production deployments that bypassed the approval workflow. Auditors are very good at spotting these gaps between policy and practice.

📁

Evidence Guide

Evidence Requirements: What to Prepare

The evidence request list for a CSA2 audit is substantial. Here is a representative breakdown of what auditors typically request across the most scrutinized domains:

Domain Typical Evidence Requested
IAM User access lists, MFA configuration screenshots, privileged account inventory, access review records, onboarding/offboarding tickets
CCC Change management tickets (sample of 25+), approval workflows, rollback procedures, emergency change records
LOG SIEM dashboard screenshots, log retention configuration, alerting rules, sample incident alerts, log integrity controls
CEK Encryption configuration for databases and storage, TLS certificate inventory, key rotation schedules, KMS policies
AIS SDLC documentation, code review records, SAST/DAST scan results, penetration test reports, vulnerability remediation tracking
DSP Data classification policy, data flow diagrams, privacy impact assessments, data retention schedules, deletion procedures
HRS Security awareness training records, background check policy, acceptable use policy acknowledgments, offboarding checklists

A well-prepared organization will have 80-150 evidence artifacts ready before the audit begins. This sounds daunting, but most of this evidence already exists in your systems - it just needs to be collected, organized, and mapped to the CCM controls. This is where readiness consulting pays for itself: a good consultant will provide you with a complete evidence request list mapped to your specific scope months before the auditor arrives.

📅

The Process

How the Audit Works: Day by Day

While every audit is different, here is a typical timeline for a mid-sized SaaS organization going through a CSA STAR Level 2 Certification (ISO 27001 path) audit:

Pre-Audit (4-8 weeks before): The audit firm provides a formal evidence request list. You collect and upload evidence to a shared secure repository. The lead auditor reviews documentation and prepares their testing plan. Any obvious gaps are flagged early so you can address them before fieldwork begins.

Day 1 - Opening Meeting & Management Review: The auditor meets with executive leadership and the security team lead. They confirm audit scope, review organizational context, and discuss any significant changes since the last audit (or since readiness assessment). They typically begin with GRC, A&A, and HRS domains - the governance layer.

Days 2-3 - Technical Deep Dive: The auditor works with your engineering and DevOps teams to review technical controls. This covers IAM, CEK, IVS, LOG, AIS, and CCC. Expect live walkthroughs of your cloud console, CI/CD pipelines, monitoring dashboards, and access management systems. The auditor will ask to see specific configurations in real time.

Days 4-5 - Data, Privacy, and Operations: Focus shifts to DSP, BCR, SEF, TVM, STA, and UEM. The auditor reviews data handling practices, backup and recovery procedures, incident response plans, vulnerability management processes, and third-party risk management. They will interview team members responsible for each area.

Days 6-7 - Follow-up Testing & Sampling: The auditor conducts additional testing on any areas where initial evidence was insufficient. They pull samples from change management tickets, access review logs, and incident records to verify operating effectiveness over time.

Day 8 - Closing Meeting: The lead auditor presents preliminary findings, including any nonconformities (major or minor) and observations. You have an opportunity to discuss findings and provide additional evidence before the final report is issued. The final report typically arrives 4-6 weeks after fieldwork.

Duration Varies

The 8-day timeline above is representative for a mid-sized SaaS company with 50-200 employees. Smaller organizations may complete fieldwork in 5 days; larger or more complex environments (multi-cloud, multiple data centers, complex data processing) may require 10-15 days. Your audit firm will provide a detailed schedule during the planning phase.

👥

Your Team

Who Needs to Be Involved

A CSA2 audit is not just a security team exercise. You will need availability from multiple functions:

Role Domains Involved Time Commitment
CISO / Security Lead All domains - primary audit liaison Full audit duration
CTO / VP Engineering AIS, CCC, IVS, LOG 2-3 days
DevOps / Platform Engineer IVS, CCC, LOG, CEK 2-3 days
HR Manager HRS Half day
CEO / COO GRC, BCR (opening/closing meetings) Half day
DPO / Privacy Officer DSP, GRC 1 day

The key is to brief all participants before the audit. People who have never been through a security audit often worry about saying the wrong thing. Reassure them: the auditor wants honest answers. If a control is not fully implemented, it is better to say so than to improvise an answer that does not hold up under follow-up questions.

Lessons Learned

Most Common Audit Findings

After guiding numerous organizations through CSA2 audits, I have seen certain findings appear repeatedly. Addressing these proactively during your readiness phase will dramatically smooth the audit:

Incomplete access reviews. Policy says quarterly; reality is ad hoc. Auditors will pull your access review records and cross-reference dates. Set up calendar reminders and keep documented evidence of every review cycle.

Change management bypasses. Emergency changes deployed without following the documented approval process. Have a formal emergency change procedure and make sure emergency changes are retrospectively documented and approved.

Logging gaps. Not all critical systems are sending logs to your SIEM, or log retention does not meet policy requirements. Audit your log sources before the auditor does.

Stale accounts. Former employees or contractors with active accounts discovered during the audit. Run an access reconciliation before fieldwork begins.

Missing encryption. Data at rest encryption not enabled on all datastores, or TLS certificates expired or using deprecated protocols. Audit your encryption posture proactively.

Incomplete vendor assessments. Third-party risk management policy exists but vendor risk assessments are not current or do not cover all critical vendors. Identify your critical vendors and ensure assessments are up to date before the audit.

🔗

Scope Overlap

How CSA2 Relates to SOC 2 and ISO 27001 Audit Scopes

If you already hold SOC 2 or ISO 27001, a significant portion of the CSA2 audit scope will be familiar. Here is how they overlap:

ISO 27001 overlap: Approximately 70-80% of CCM controls map directly to ISO 27001 Annex A controls. If you have a mature ISMS, the incremental effort for CSA STAR Certification focuses on cloud-specific controls that go beyond what ISO 27001 covers - particularly in areas like multi-tenancy, virtualization security, data portability, and cloud-specific identity management.

SOC 2 overlap: The SOC 2 Trust Services Criteria (Security, Availability, Confidentiality, Processing Integrity, Privacy) align with roughly 60-70% of CCM domains. The CSA STAR Attestation audit extends the SOC 2 examination with CCM-specific testing, adding depth in areas like interoperability, supply chain security, and cloud infrastructure controls.

The net result: If you have one or both of these certifications, your CSA2 preparation is primarily about filling the cloud-specific gaps and aligning your existing evidence with CCM control specifications. You are not starting from zero - you are extending what you already have.

FAQ

Frequently Asked Questions

How many evidence artifacts should we prepare?

For a typical mid-sized SaaS organization, expect to prepare 80-150 evidence artifacts. This includes policy documents, configuration screenshots, log samples, training records, access review documentation, change management tickets, and more. A readiness consultant can provide you with a precise evidence request list mapped to your specific scope and CCM domains.

What happens if the auditor finds a major nonconformity?

A major nonconformity means a control is either missing or fundamentally ineffective. For the ISO 27001 path, you typically have 90 days to remediate the finding and provide evidence of correction before the certification can be issued. For the SOC 2 path, the finding will be reported as an exception in the audit report. This is why readiness assessments are critical - you want to find and fix these issues before the audit, not during it.

Can the audit be conducted remotely?

Yes. Since the COVID era, remote audits have become standard practice for cloud-native organizations. The auditor will conduct interviews via video conference and review evidence through a secure shared repository. For cloud-native companies with no physical data centers, a fully remote audit is completely normal. Some auditors may request a brief on-site visit for larger organizations, but this is increasingly optional.

Do we need to audit controls our cloud provider is responsible for?

No. The CCM is designed around the shared responsibility model. Controls that fall entirely within your cloud provider’s responsibility (such as physical datacenter security for AWS, Azure, or GCP) are typically addressed by referencing your provider’s own CSA STAR listing, SOC 2 report, or ISO 27001 certificate. However, you are responsible for demonstrating that you have reviewed and rely on these provider certifications as part of your own supply chain management.

Should we choose the SOC 2 path or the ISO 27001 path for Level 2?

It depends on your market. If you primarily serve US-based customers, the SOC 2 path (CSA STAR Attestation) may be more valuable since SOC 2 is the dominant standard in North America. If you serve European or global customers, the ISO 27001 path (CSA STAR Certification) is generally preferred since ISO 27001 is the global standard and is specifically referenced in EU regulations like NIS2. If you serve both markets, consider pursuing both paths or starting with ISO 27001 + CSA STAR, which tends to have broader international recognition.

How often do we need to be re-audited?

For the ISO 27001 path, the certification cycle is three years with annual surveillance audits (lighter-touch audits in years two and three). For the SOC 2 path, you typically need a new examination each year covering the most recent 12-month period. In both cases, maintaining the certification requires ongoing effort - it is not something you achieve once and forget.

Preparing for a CSA2 Audit? Start with a Readiness Assessment.

The difference between a smooth audit and a painful one is preparation. We help organizations identify gaps, build evidence, and get audit-ready.

Our CSA STAR readiness engagements cover: gap analysis against all 17 CCM domains, evidence preparation guidance, team briefing, and auditor coordination support.

Published: March 2026 · Author: Alexander Sverdlov

This article is for informational purposes only and does not constitute legal or professional advice. CSA STAR audit scope and requirements may vary based on your organization’s specific context, service model, and chosen audit path. Contact us for a tailored readiness assessment.

Alexander Sverdlov

Alexander Sverdlov

Founder of Atlant Security. Author of 2 information security books, cybersecurity speaker at the largest cybersecurity conferences in Asia and a United Nations conference panelist. Former Microsoft security consulting team member, external cybersecurity consultant at the Emirates Nuclear Energy Corporation.