Compliance & Security

SOC 2 and Cloud Fax: What Your Auditor Will Ask

Preparing for SOC 2 certification? Learn how cloud fax fits into Trust Services Criteria and what controls auditors expect to see.

Farjad Fani
Farjad Fani
Enterprise Fax Consultant
October 28, 2024
9 min read
SOC 2 compliance audit security controls trust services
SOC 2 and Cloud Fax: What Your Auditor Will Ask

SOC 2 certification has become table stakes for enterprise software vendors and service providers. If your organization handles customer data and uses fax, your auditor will have questions. Here’s what to expect and how to prepare.

SOC 2 and Fax: The Basics

Trust Services Criteria Relevant to Fax

SOC 2 audits evaluate controls against five Trust Services Criteria. Four are relevant to fax operations:

Security (Required)

  • Access controls
  • Encryption
  • Network protection
  • Change management

Availability

  • System uptime
  • Disaster recovery
  • Incident response
  • Backup procedures

Confidentiality

  • Data classification
  • Encryption requirements
  • Access restrictions
  • Disposal procedures

Privacy

  • Personal information handling
  • Consent management
  • Data subject rights
  • Retention policies

Where Fax Enters the Picture

Fax creates SOC 2 considerations when:

  • Customer data is transmitted via fax
  • Fax is part of business processes
  • Third-party fax services handle data
  • Fax records require retention

Auditor Questions by Category

Security Controls

Access Management

Auditor will ask:

  • Who has access to fax systems?
  • How is access provisioned and deprovisioned?
  • Are there unique user IDs?
  • Is multi-factor authentication implemented?

Evidence to prepare:

  • User access list with roles
  • Access request/approval records
  • MFA configuration documentation
  • Access review records

Encryption

Auditor will ask:

  • Is fax data encrypted in transit?
  • Is fax data encrypted at rest?
  • What encryption standards are used?
  • How are encryption keys managed?

Evidence to prepare:

  • Encryption configuration documentation
  • TLS certificate information
  • Key management procedures
  • Encryption audit logs

Logging and Monitoring

Auditor will ask:

  • What fax activities are logged?
  • How long are logs retained?
  • Who reviews logs?
  • How are anomalies detected?

Evidence to prepare:

  • Log configuration settings
  • Sample log entries
  • Log review procedures
  • Monitoring alert configuration

Availability Controls

System Uptime

Auditor will ask:

  • What is the uptime SLA?
  • How is uptime measured?
  • What were actual uptime metrics?
  • How are outages handled?

Evidence to prepare:

  • SLA documentation
  • Uptime monitoring reports
  • Incident records
  • Post-incident reviews

Business Continuity

Auditor will ask:

  • What happens if the fax system fails?
  • Is there disaster recovery capability?
  • How quickly can service be restored?
  • When was DR last tested?

Evidence to prepare:

  • Business continuity plan
  • Disaster recovery procedures
  • DR test results
  • Recovery time documentation

Confidentiality Controls

Data Protection

Auditor will ask:

  • How is confidential information identified?
  • What protections exist for confidential faxes?
  • Who can access confidential fax data?
  • How is confidentiality enforced?

Evidence to prepare:

  • Data classification policy
  • Access control matrix
  • Confidentiality controls documentation
  • Training records

Data Disposal

Auditor will ask:

  • How long is fax data retained?
  • How is fax data disposed of?
  • Is disposal documented?
  • Are retention policies enforced?

Evidence to prepare:

  • Retention policy
  • Disposal procedures
  • Disposal records
  • Automated retention configuration

Vendor Management

Third-Party Risk

Auditor will ask:

  • Who is your fax service provider?
  • Does the vendor have SOC 2?
  • How do you assess vendor security?
  • What’s in the service agreement?

Evidence to prepare:

  • Vendor SOC 2 report
  • Vendor assessment documentation
  • Service agreement/contract
  • Security questionnaire responses

Cloud vs. On-Premise Considerations

Cloud Fax (SaaS)

Advantages for SOC 2:

  • Vendor maintains infrastructure controls
  • SOC 2 reports often available
  • Encryption typically built-in
  • Access controls integrated

Auditor focus areas:

  • Vendor due diligence
  • Data handling agreements
  • Access management
  • Integration security

On-Premise Fax

Your responsibility:

  • All infrastructure controls
  • Physical security
  • Encryption implementation
  • Backup and recovery
  • All monitoring and logging

Auditor focus areas:

  • Direct control evidence
  • Change management
  • Vulnerability management
  • Capacity planning

Control Matrix: Fax Operations

Control AreaControl DescriptionEvidence Required
Access ControlUnique user IDs for fax accessUser list, ID policy
Role-based permissionsRole definitions, access matrix
Access reviews performedReview records, cadence
MFA for administrative accessMFA configuration
EncryptionTLS 1.2+ for transmissionCertificate, configuration
AES-256 for storageEncryption settings
Key rotation performedKey management records
LoggingAll fax activities loggedLog configuration, samples
Logs retained per policyRetention settings
Log integrity protectedTamper protection config
MonitoringUptime monitoring activeMonitoring dashboards
Security alerts configuredAlert configuration
Anomaly detection in placeDetection rules
Vendor MgmtVendor SOC 2 reviewedReview documentation
Security requirements in contractContract excerpt
Ongoing monitoring performedAssessment records

Common Audit Findings

Finding 1: Incomplete Access Reviews

Problem: Fax system access not included in quarterly access reviews.

Solution: Add fax systems to access review scope. Document review of all users with fax access, including administrators.

Finding 2: Missing Encryption Documentation

Problem: Cannot demonstrate encryption in transit for fax transmissions.

Solution: Obtain TLS configuration documentation from provider. For on-premise, document encryption settings and certificate management.

Finding 3: Insufficient Logging

Problem: Fax logs don’t capture required security events.

Solution: Enable comprehensive logging including:

  • User authentication events
  • Configuration changes
  • Transmission records
  • Access to stored faxes

Finding 4: Vendor Assessment Gaps

Problem: No documented assessment of fax service provider.

Solution: Obtain vendor SOC 2 report. Document review and acceptance. Include fax vendor in annual vendor assessment program.

Preparing for Your Audit

90 Days Before

  • Inventory all fax systems and services
  • Request vendor SOC 2 reports
  • Review current control documentation
  • Identify gaps in evidence collection

60 Days Before

  • Implement any missing controls
  • Update policy documentation
  • Begin evidence collection
  • Conduct internal assessment

30 Days Before

  • Complete evidence compilation
  • Perform control testing
  • Address any identified issues
  • Prepare walkthrough materials

During Audit

  • Provide requested evidence promptly
  • Schedule system demonstrations
  • Clarify questions immediately
  • Document auditor requests

The Cloud Fax Advantage

Modern cloud fax platforms simplify SOC 2 compliance:

RequirementCloud FaxOn-Premise
Vendor SOC 2AvailableN/A
EncryptionBuilt-inMust implement
Access controlsIntegratedMust configure
Audit loggingAutomaticMust enable
Uptime SLAContractualSelf-measured
DR capabilityIncludedMust build

Selecting a SOC 2-certified cloud fax provider transfers significant control responsibility and provides ready evidence for your audit.

The Bottom Line

Fax operations don’t have to be a SOC 2 weak point. Whether you use cloud or on-premise fax, the key is treating fax with the same control rigor as any other system handling customer data.

The organizations that sail through SOC 2 audits are those that proactively identify fax in scope and implement appropriate controls—not those surprised when the auditor asks about that fax machine in the corner.


Preparing for SOC 2 and need help with fax controls? Let’s discuss your compliance requirements.

Farjad Fani

About the Author

Farjad Fani is an enterprise fax consultant with 25+ years of experience. He built onlinefaxes.com and sold over 100,000 customers to eFax. Today, he helps healthcare, finance, and government organizations modernize their fax infrastructure while maintaining compliance.

Get in touch

Ready to Modernize Your Fax Infrastructure?

Let's discuss your specific challenges and find the right solution for your organization.

Get in Touch
Let's Talk
Before You Go

Let's Connect

Have questions about your fax infrastructure? I respond personally within 24 hours.