Overview
The Trust Services Criteria (TSC) are a set of professional standards established by the American Institute of Certified Public Accountants (AICPA) for evaluating and reporting on controls at service organizations. TSC forms the basis for SOC 2 (System and Organization Controls 2) audits, which assess the effectiveness of controls relevant to security, availability, processing integrity, confidentiality, and privacy. Wazuh helps organizations monitor technical controls that support TSC compliance.TSC Requirements Coverage
Wazuh maps security events to Trust Services Criteria through therule.tsc field. The compliance requirements are defined in:
Source: plugins/main/common/compliance-requirements/tsc-requirements.ts
Trust Services Categories
Availability (A)
A1.1 - Capacity Management
A1.1 - Capacity Management
- Monitor system resource utilization
- Track capacity trends
- Identify capacity constraints
- Plan for capacity expansion
- Maintain performance levels
- System resource alerts (CPU, memory, disk)
- Performance degradation detection
- Capacity threshold violations
- Service availability monitoring
A1.2 - Environmental Protection and Infrastructure
A1.2 - Environmental Protection and Infrastructure
- Implement environmental protections
- Deploy backup systems
- Maintain recovery infrastructure
- Monitor protection effectiveness
- Test backup and recovery procedures
- Backup success/failure events
- Environmental system failures
- Recovery system status
- Protection mechanism alerts
Common Criteria (CC)
CC5: Control Activities
CC5.1 - Control Activity Design and Implementation
CC5.1 - Control Activity Design and Implementation
- Design effective controls
- Implement risk mitigation measures
- Select appropriate control activities
- Deploy controls consistently
- Monitor control effectiveness
- Control failure events
- Risk mitigation effectiveness
- Control bypass attempts
- Security control violations
CC5.2 - General Controls Over Technology
CC5.2 - General Controls Over Technology
- Implement technology controls
- Maintain security infrastructure
- Deploy protective technologies
- Monitor technology controls
- Technology control failures
- Security technology status
- Control effectiveness metrics
- Technology configuration changes
CC6: Logical and Physical Access Controls
CC6.1 - Logical Access Security
CC6.1 - Logical Access Security
- Deploy access control systems
- Implement authentication mechanisms
- Maintain authorization infrastructure
- Protect information assets
- Monitor access attempts
- Unauthorized access attempts
- Authentication failures
- Access control violations
- Authorization bypasses
- Privilege escalation
CC6.2 - User Registration and Authorization
CC6.2 - User Registration and Authorization
CC6.3 - Authorization and Access Management
CC6.3 - Authorization and Access Management
CC6.4 - Physical Access Controls
CC6.4 - Physical Access Controls
- Restrict physical access
- Control facility entry
- Monitor physical access
- Protect sensitive areas
- Track access to facilities
- Physical access events
- Badge reader logs
- Unauthorized entry attempts
- Facility access violations
CC6.6 - External Threat Protection
CC6.6 - External Threat Protection
- Deploy perimeter security
- Implement firewalls and IDS/IPS
- Monitor external threats
- Block malicious traffic
- Protect against attacks
- External attack attempts
- Firewall blocks
- Intrusion detection alerts
- Malicious traffic detection
- Threat intelligence matches
CC6.7 - Data Transmission Protection
CC6.7 - Data Transmission Protection
- Encrypt data in transit
- Control data movement
- Monitor data transmission
- Prevent unauthorized transfers
- Protect data during movement
- Unencrypted transmissions
- Unauthorized data transfers
- Data exfiltration attempts
- Insecure protocol usage
- Data movement violations
CC6.8 - Malware Prevention and Detection
CC6.8 - Malware Prevention and Detection
- Deploy anti-malware solutions
- Update malware signatures
- Scan for malicious software
- Block malware execution
- Remediate infections
- Malware detection events
- Anti-virus alerts
- Suspicious file execution
- Malicious code indicators
- Ransomware activity
CC7: System Operations
CC7.1 - Vulnerability and Configuration Management
CC7.1 - Vulnerability and Configuration Management
- Monitor configuration changes
- Detect new vulnerabilities
- Track configuration drift
- Identify security weaknesses
- Assess vulnerability exposure
- Configuration changes
- Vulnerability scan results
- Security weakness detection
- Configuration baseline deviations
- Patch status monitoring
CC7.2 - Security Monitoring and Anomaly Detection
CC7.2 - Security Monitoring and Anomaly Detection
- Monitor system operations
- Detect anomalies
- Analyze security events
- Identify malicious activity
- Distinguish events from incidents
- All system security events
- Anomalous behavior patterns
- Malicious activity indicators
- System operational anomalies
CC7.3 - Security Incident Identification
CC7.3 - Security Incident Identification
- Evaluate security events
- Identify security incidents
- Determine impact
- Escalate appropriately
- Prevent further damage
- Security event severity
- Event correlation patterns
- Impact indicators
- Incident classification criteria
CC7.4 - Incident Response
CC7.4 - Incident Response
- Execute incident response
- Contain security incidents
- Remediate vulnerabilities
- Communicate incidents
- Document response actions
- Incident response activities
- Containment actions
- Remediation tracking
- Response timeline
CC8: Change Management
CC8.1 - Change Authorization and Management
CC8.1 - Change Authorization and Management
Processing Integrity (PI)
PI1.4 - Output Completeness and Accuracy
PI1.4 - Output Completeness and Accuracy
- Ensure output completeness
- Verify output accuracy
- Deliver outputs timely
- Meet specification requirements
- Monitor processing integrity
- Processing errors
- Output validation failures
- Delivery failures
- Data integrity violations
PI1.5 - Data Storage Integrity
PI1.5 - Data Storage Integrity
- Store data completely
- Maintain data accuracy
- Ensure timely storage
- Meet storage specifications
- Protect data integrity
- Storage errors
- Data corruption
- Integrity violations
- Storage system failures
Using the TSC Dashboard
Accessing TSC Compliance View
Filter by Criterion
Dashboard Components
The TSC dashboard includes:- Top criteria by alert count - Identifies areas needing attention
- Category distribution - Shows coverage across trust services
- Control effectiveness metrics - Tracks control implementation
- Incident detection rates - Monitors security event trends
plugins/main/public/components/overview/tsc/dashboards/dashboard-panels.ts
Data Source Implementation
The TSC data source filters events by therule.tsc field:
plugins/main/public/components/common/data-source/pattern/events/tsc/tsc-data-souce.ts:5
Event Columns
TSC events table displays:- Timestamp
- Rule description
- TSC criterion (
rule.tscfield) - Alert level
- Trust services category
- Agent information
plugins/main/public/components/overview/tsc/events/tsc-columns.tsx:8
SOC 2 Audit Support
SOC 2 Type I vs. Type II
- Type I - Design
- Type II - Operating Effectiveness
- Document implemented security controls
- Demonstrate control configuration
- Show monitoring capabilities
- Provide control descriptions
Generating SOC 2 Evidence
Export Control Evidence
- Control implementation
- Control effectiveness
- Exception handling
- Incident response
Document Continuous Monitoring
- Uptime reports
- Alert statistics
- Response times
- Coverage metrics
Trust Services Category Mapping
Security (All Organizations)
Criteria: CC6.1, CC6.2, CC6.3, CC6.6, CC6.7, CC6.8, CC7.1, CC7.2, CC7.3, CC7.4 Wazuh Coverage: Comprehensive - all security criteria monitoredAvailability (When Applicable)
Criteria: A1.1, A1.2 Wazuh Coverage: System availability and capacity monitoringProcessing Integrity (When Applicable)
Criteria: PI1.4, PI1.5 Wazuh Coverage: Data integrity monitoring via FIMConfidentiality (When Applicable)
Wazuh Coverage: Encryption monitoring, access control, data protectionPrivacy (When Applicable)
Wazuh Coverage: Access logging, data access monitoring, consent enforcement trackingTSC to Other Framework Mapping
TSC criteria align with other compliance frameworks:| TSC Criterion | NIST 800-53 | PCI DSS | HIPAA |
|---|---|---|---|
| CC6.1 | AC.6 | 8.x | 164.312.a.1 |
| CC6.8 | SI.3 | 5.1, 5.2 | - |
| CC7.1 | SI.2 | 6.2, 11.2 | - |
| CC7.2 | AU.6 | 10.6 | 164.312.b |
| CC8.1 | CM.3 | - | - |
| PI1.5 | SI.7 | 11.5 | 164.312.c.2 |
Requirement Data Structure
The complete TSC requirements mapping:plugins/main/common/compliance-requirements/tsc-requirements.ts:12
Best Practices for SOC 2
Continuous Monitoring
Log Retention
Document Exceptions
Control Testing
Incident Response
Change Management
Common Criteria (CC) Focus
The Common Criteria (CC) apply to all SOC 2 reports:- CC5 - Control Activities (foundational)
- CC6 - Logical and Physical Access (security)
- CC7 - System Operations (monitoring and incident response)
- CC8 - Change Management (integrity)
Related Documentation
- Compliance Overview
- [File Integrity Monitoring(/modules/file-integrity-monitoring) - Supports CC7.1, CC8.1, PI1.5
- [Log Analysis(/modules/threat-hunting) - Supports CC7.2
- [Incident Response(/guides/threat-analysis) - Supports CC7.3, CC7.4
- [Vulnerability Detection(/modules/vulnerability-detection) - Supports CC7.1