Enterprise LLM Security: A SOC 2 Compliance Framework
SOC 2 Type II is the standard compliance framework for cloud services used by enterprise customers with non-trivial security requirements. LLM API infrastructure is increasingly subject to the same scrutiny as other enterprise software, and auditors are becoming more specific in their questions about how AI inference requests are logged, secured, and controlled.
Trust Services Criteria Relevant to LLM Infrastructure
SOC 2 examines five Trust Services Criteria. For LLM infrastructure, the most relevant are Security (CC6: Logical Access Controls, CC7: System Operations), Availability (A1: Capacity and Performance Monitoring), and Confidentiality (C1: Confidential Information Management). Privacy criteria become relevant when inference requests include personal data.
Audit Logging Requirements
Auditors expect a tamper-evident, complete log of every API request. For LLM infrastructure this means: timestamp, caller identity, model requested, model served (may differ with routing), token counts, and a unique request ID that correlates with application logs. Logs must be retained for the audit period (typically 12 months) and must be protected against modification by the principals whose actions are logged.
Access Controls
Access to LLM API credentials must follow the principle of least privilege. Each service or user should have a scoped API key with only the models and capabilities required for their function. Key rotation on a schedule and immediate revocation capability are baseline requirements. Multi-factor authentication for console access to the API key management interface is expected.
Preparing for the Audit
The most efficient way to prepare is to run a mock audit six weeks before the actual audit window. Identify control gaps, remediate them, and then generate the evidence documentation auditors will request. Common gaps we see in LLM-specific controls are missing log retention policies, lack of formal incident response procedures for model availability incidents, and insufficient key rotation documentation.