SOC 2 Compliance Controls on GCP for the PCA Exam

GCP Study Hub
Ben Makansi
December 28, 2025

SOC 2 comes up on the Professional Cloud Architect exam in the form of a multi-tenant SaaS scenario where you need to design infrastructure that an outside auditor can sign off on. The question usually is not asking you to recite the certification process. It is asking which Google Cloud controls actually satisfy the SOC 2 Type II requirements at the infrastructure level.

SOC stands for System and Organization Controls. SOC certification verifies the security of your application. SOC Type 2 specifically verifies that your controls actually work over a sustained time period, typically 6 to 12 months. That second part matters for the exam framing because Type 2 is not a one-time check. The auditor needs evidence that the controls have been in place and operating consistently across the audit window.

The four requirements I keep in mind for any SOC 2 question are clear tenant isolation, data residency, protection against cross-tenant data access or exfiltration, and auditability. These need to be enforced at the infrastructure level, not just in application code. An auditor is not going to take your word that your application logic prevents Customer A from reading Customer B's data. They want to see Google Cloud configurations that make it impossible.

The reference architecture

The pattern I would draw on a whiteboard, and the one that maps to how the Professional Cloud Architect exam expects you to answer, has three concentric layers.

The outermost layer is Organization Policies. This is where you enforce data residency with strict resource location constraints. If your contract with a European customer says their data has to stay in the EU, an Organization Policy at the org or folder level requires that all resources be created in EU regions. The auditor can pull that policy as evidence that residency is enforced by the platform, not by a code review checklist.

Inside that, you have a VPC Service Controls perimeter. This blocks unauthorized data exfiltration. VPC Service Controls creates a security perimeter around Google-managed services like Cloud Storage, BigQuery, and Pub/Sub. Even if a credential leaks or a developer inside the perimeter tries to copy data to an external bucket, the perimeter blocks the API call. For SOC 2 this is the control that demonstrates protection against exfiltration through Google Cloud APIs, which is exactly what auditors are looking for in a multi-tenant data plane.

Inside the perimeter, each customer gets their own project. The project for Customer A contains a VPC for network isolation, Customer A's data, and audit logs scoped to that project. Same for Customer B and Customer C. The cross-tenant access boundary is the project boundary plus IAM. Customer A's service account has no roles in Customer B's project, so cross-tenant access is blocked at the IAM layer before any application code is involved.

Why each layer matters

It is worth being explicit about which SOC 2 requirement each layer satisfies, because that is how the exam questions are usually scored.

  • Organization Policies satisfy data residency. Resource location constraints make it impossible to provision resources outside approved regions.
  • VPC Service Controls satisfy exfiltration protection. The perimeter prevents data from leaving through Google Cloud APIs.
  • Per-customer projects with separate VPCs satisfy tenant isolation. The project is the IAM boundary, and the VPC is the network boundary.
  • Audit logs in each project satisfy auditability. Cloud Audit Logs record who accessed what and when, which is what the SOC 2 auditor will sample during the audit window.

This is a defense-in-depth design. You have multiple layers of infrastructure controls that an auditor can verify independently. If one layer fails or is misconfigured, the others still hold. That redundancy is part of why this pattern works for Type 2, where the auditor is looking at sustained operation rather than a snapshot.

What to watch for in PCA questions

When a Professional Cloud Architect question mentions SOC 2, look for the four requirements in the prompt and match each one to the right control. If the scenario emphasizes EU data residency, the answer involves Organization Policies with resource location constraints. If it emphasizes preventing a contractor from copying customer data to a personal storage bucket, the answer involves VPC Service Controls. If it emphasizes that one customer must never see another customer's data, the answer involves separate projects per tenant. And if it emphasizes evidence for the audit, the answer involves Cloud Audit Logs.

The trap answer is usually something that solves the problem in application code, like a row-level security check in the database. That can be part of the solution, but it is not what an SOC 2 auditor is going to accept as the primary control. Infrastructure-level enforcement is what wins.

My Professional Cloud Architect course covers SOC 2 architecture patterns, VPC Service Controls perimeter design, and Organization Policy enforcement alongside the rest of the advanced architecture material.

arrow