About Us

At Actinode, we're a team of tech enthusiasts dedicated to transforming ideas into innovative solutions. With a strong foundation in technology and creativity, we bring together expertise from various domains to deliver exceptional results. Our mission is to turn your visions into reality through cutting-edge technology and a collaborative approach. Meet the passionate professionals behind Actinode – committed to driving innovation and creating impactful solutions for your business.

Compliance Engineering

Continuous Controls Monitoring: From Annual Audit Panic to Always-On Compliance Evidence

Transformed a scale-up marketplace's SOC 2 Type II preparation from a 10-week annual scramble into a continuous, automated evidence collection system. Cut audit preparation time by 78% and achieved a clean SOC 2 Type II report with no exceptions on the first attempt.

Q3 2025
Scale-Up B2B Marketplace
12 weeks
4 Engineers (2 Full-Stack, 1 DevOps/Security, 1 Compliance Architect)

Overview

Transformed a scale-up marketplace's SOC 2 Type II preparation from a 10-week annual scramble into a continuous, automated evidence collection system. Cut audit preparation time by 78% and achieved a clean SOC 2 Type II report with no exceptions on the first attempt.

Industry

Compliance / Marketplace

Offering

Compliance Engineering and Audit Automation

Business Challenges

A B2B marketplace connecting procurement teams with verified suppliers had made SOC 2 Type II a strategic priority after losing two enterprise deals where the information security questionnaire process stalled. The platform processed sensitive commercial data and handled supplier due diligence on behalf of enterprise buyers — SOC 2 was a commercial prerequisite, not just a compliance aspiration.

The Starting Point:

  • SOC 2 Type I had been completed the prior year, revealing significant gaps in evidence quality for operational controls
  • The engineering team had grown rapidly, introducing deployment process inconsistencies and access management gaps
  • A previous Type II attempt had been abandoned after the auditor's initial evidence request revealed that the team could not produce consistent, timestamped evidence for access reviews, change management, and incident response over the audit period
  • Security tooling existed (SIEM, vulnerability scanner, CI/CD pipeline) but logs and outputs were not being retained in an auditor-accessible format
  • Access reviews were happening informally — no documented process, no records of who reviewed what and when

Business Requirements

The platform needed a compliance posture that would:

  • Continuously collect and retain evidence for all SOC 2 Security trust service criteria controls
  • Automate access review execution and documentation on a quarterly cadence
  • Produce a clean, queryable evidence library that auditors could self-serve from during fieldwork
  • Surface compliance posture deviations in real time rather than discovering them at audit time
  • Require minimal ongoing engineering effort after initial build — the team needed to maintain velocity on product work
  • Support the full 12-month Type II audit period without evidence gaps

Key Results

78%Reduction in audit prep time
ZeroExceptions in SOC 2 Type II report
100%Access review completion rate
47/47Controls with full evidence coverage
70%Fewer auditor evidence requests
97.3%Infrastructure compliance rate

The Challenge

The technical challenge was that evidence for SOC 2 controls exists across many systems — CI/CD platforms, cloud providers, identity providers, ticketing systems, SIEM — and each system stores it in different formats, retains it for different periods, and requires different access for an auditor to retrieve it.

Evidence Fragmentation:

  • Deployment approvals: in GitHub pull request history, accessible only to team members with repo access
  • Access provisioning: in Okta and in a mix of GitHub teams, AWS IAM, and manual Notion pages
  • Vulnerability management: in Snyk and AWS Inspector with no consolidated view or remediation SLA tracking
  • Incident response: in Slack channels and ad-hoc Jira tickets — no consistent record structure
  • Infrastructure configuration compliance: no continuous monitoring, assessed manually before each audit

Process Gaps:

  • Access reviews: quarterly reviews were planned but not consistently executed or documented
  • Change management: not all production changes had associated tickets; some were direct console changes without Terraform
  • Vendor management: no formal process for reviewing third-party service access or BAA status

Audit Timeline Pressure:

The client had committed to enterprise prospects that a current SOC 2 Type II report would be available by a fixed date, creating a hard deadline that constrained the build timeline.

Our Solution

We designed a continuous controls monitoring system in three phases:

Phase 1: Evidence Collection Infrastructure (Weeks 1-4)

  • Deployed a compliance evidence store: a purpose-built S3 bucket with Object Lock enabled, organised by control domain and collection date, with a lifecycle policy ensuring minimum 3-year retention
  • Built automated evidence collectors (Lambda functions on daily/weekly schedules) pulling from:

- GitHub: PR merge records, branch protection configuration snapshots, required reviewer settings

- Okta: user provisioning events, MFA configuration, authentication logs, offboarding timestamps

- AWS: CloudTrail management events, Config compliance rule results, IAM policy snapshots, Security Hub findings

- Snyk: vulnerability scan results, open findings by severity, SLA breach alerts

- PagerDuty: incident records, response timelines, post-mortem links

  • All collected evidence stored as structured JSON with collection timestamp, source system, and control mapping

Phase 2: Access Review Automation (Weeks 3-7)

  • Built a quarterly access review workflow:

- Automated job generates a review package per system (AWS IAM, GitHub teams, Okta groups) listing current access holders and their role/justification

- Review package sent to designated reviewer via email with a structured review form

- Reviewer attests or flags each access record — responses stored in the evidence store with reviewer identity and timestamp

- Non-response after 5 days triggers escalation; unresolved flags trigger access removal after a further 48-hour grace period

  • Evidence output: a dated, reviewer-attested access list per system for every quarter of the audit period

Phase 3: Continuous Compliance Monitoring and Alerting (Weeks 6-12)

  • Deployed AWS Config managed rules for 40+ infrastructure compliance checks (encryption, public access, logging enabled, approved AMIs, required tags)
  • Built a compliance posture dashboard (internal React app + Config aggregator data) showing pass/fail status per control in real time
  • Drift detection: daily Terraform plan against production; non-empty diffs trigger a Slack alert and auto-create a Jira issue for triage
  • Vulnerability SLA enforcement: Snyk webhooks trigger Jira issues on new critical/high findings with SLA due dates automatically populated; overdue issues escalate via PagerDuty
  • Incident record standardisation: Jira template with required fields (timeline, affected systems, root cause, actions, review completed) enforced for all P1 and P2 incidents
  • Evidence completeness check: weekly report showing control areas with coverage gaps (e.g. weeks with no incident records, quarters with incomplete access reviews)

Implementation

1. Automated Evidence Collection from 6 Systems

Built Lambda-based collectors for GitHub, Okta, AWS (CloudTrail, Config, Security Hub), Snyk, and PagerDuty. Each collector runs on a defined schedule, pulls the relevant evidence payload, maps it to the corresponding SOC 2 control reference, and writes a structured JSON record to the immutable evidence store. Collector health monitored via CloudWatch alarms — missed collection triggers an alert before it becomes an audit gap.

2. Structured Access Review Workflow

Replaced informal quarterly access reviews with an automated workflow that generates review packages, routes them to designated reviewers, captures attestations, and archives the completed review record. The workflow covers 6 systems: AWS IAM, GitHub, Okta, Terraform Cloud, PagerDuty, and the application's own admin panel. Review completion rate improved from approximately 60% (estimated, informal) to 100% with documented evidence from Q3 2025 onwards.

3. Infrastructure Compliance as Code

Defined 40 AWS Config managed rules matching the platform's security baseline. Config compliance history is queryable by date — enabling point-in-time compliance posture retrieval for any date in the audit period. Terraform drift detection runs daily, ensuring that configuration departures are caught and documented rather than silently accumulating.

4. Vulnerability SLA Enforcement Pipeline

Connected Snyk and AWS Inspector finding webhooks to a triage workflow that auto-creates Jira issues with severity-based SLA due dates (critical: 48 hours, high: 7 days, medium: 30 days). Overdue issues escalate to PagerDuty. Monthly SLA compliance reports — percentage of findings resolved within SLA by severity — are auto-generated and stored as evidence artefacts.

5. Auditor Evidence Portal

Built a read-only evidence query interface allowing the external auditor to retrieve evidence for any control by date range, without requiring direct system access. Auditor could download evidence packages for sampled controls in structured format. This reduced auditor back-and-forth requests by approximately 70% compared to the prior year's manual evidence delivery process.

6. SOC 2 Type II Audit Support

Provided on-call engineering support during the 4-week auditor fieldwork period. All evidence requests resolved through the portal or automated exports. No control gaps were identified for the 12-month audit period. Final report issued with no exceptions noted across all Security trust service criteria.

Key Features

  • Automated Evidence Collection from 6 Source Systems
  • Immutable Evidence Store with 3-Year Retention
  • Quarterly Access Review Workflow with Attestation Records
  • 40+ AWS Config Compliance Rules with Point-in-Time History
  • Daily Terraform Drift Detection and Alerting
  • Vulnerability SLA Enforcement with Auto-Escalation
  • Read-Only Auditor Evidence Portal
  • Weekly Evidence Completeness Health Check

Results & Impact

  • Audit preparation time reduced from 10 weeks to 2.2 weeks — a 78% reduction
  • Clean SOC 2 Type II report with zero exceptions on the first attempt
  • Access review completion rate improved from approximately 60% (informal, undocumented) to 100% with full attestation records
  • Evidence coverage for all 47 applicable controls across the complete 12-month audit period
  • Auditor back-and-forth evidence requests reduced by approximately 70% via the self-serve evidence portal
  • Two enterprise deals closed within 6 weeks of report publication, directly attributed to compliance status
  • Infrastructure configuration compliance rate of 97.3% maintained across all monitored controls throughout the audit period

Business Benefits

  • Revenue Impact: Two enterprise deals closed directly attributable to SOC 2 report availability — compliance became a revenue enabler
  • Ongoing Cost Reduction: Annual audit preparation now requires 2 weeks of effort rather than 10, reducing engineering distraction and external consultant costs
  • Continuous Assurance: Leadership and enterprise customers can request a point-in-time compliance posture snapshot at any time — not just at audit date
  • Risk Reduction: Continuous controls monitoring surfaces misconfigurations within 24 hours rather than at annual audit — reducing the window of exposure significantly
  • Team Velocity: Engineering team no longer experiences annual pre-audit disruption; compliance evidence collection is automated and runs continuously in the background
  • Competitive Positioning: Current SOC 2 report with continuous monitoring narrative resonates strongly with enterprise procurement and security reviewers

Technologies Used

AWS (Config, CloudTrail, Security Hub, Lambda, S3 Object Lock)GitHub APIOkta APISnykPagerDutyTerraformReactPostgreSQLJira API

Conclusion

Continuous controls monitoring changes the economics of SOC 2 compliance. The cost of building the evidence collection infrastructure is paid back within one audit cycle through reduced preparation time and reduced auditor fees. More importantly, it shifts compliance from a periodic scramble to an always-on operational posture — one that enterprise buyers increasingly ask to verify in real time, not just annually.

Future Enhancements

Roadmap includes extending evidence collection to cover ISO 27001 controls for European market expansion, building a customer-facing trust portal with real-time security posture indicators, and implementing automated penetration test scheduling with finding-to-remediation tracking.

Have a Similar Project in Mind?

Let's discuss how we can help you achieve similar results for your business.