Table of Contents

Reach SOC 2 Compliance in 6 Weeks or Less.

  / ,

  / SOC 2 Encryption Requirements: What Auditors Actually Expect

SOC 2 Encryption Requirements: What Auditors Actually Expect

Contrary to popular belief, SOC 2 does not mandate a strict list of cryptographic controls. Instead, it evaluates whether an organization has implemented appropriate encryption controls based on risk. That distinction matters: auditors care less about whether you check a specific box and more about whether your encryption strategy effectively protects sensitive data.

This guide breaks down how encryption fits into SOC 2 compliance, where auditors look for it, and how to design encryption controls that hold up during a SOC 2 Type I or SOC 2 Type II audit.

SOC 2 Encryption Requirements

What “SOC 2 encryption requirements” really means

The System and Organization Controls 2 (SOC 2) framework was created by the American Institute of Certified Public Accountants (AICPA) to help service organizations demonstrate that their systems are secure and trustworthy.

SOC 2 assessments evaluate controls against the Trust Services Criteria (TSC): Security, Availability, Processing Integrity, Confidentiality, and Privacy. The AICPA’s 2017 Trust Services Criteria (updated with revised points of focus in 2022) is the document auditors reference when evaluating your controls.

But here’s the key nuance:

SOC 2 is a controls report, not a prescriptive encryption standard.

Instead of dictating exact technologies, SOC 2 asks auditors to determine whether controls are appropriately designed and operating effectively to meet the Trust Services Criteria. This means encryption is often expected—especially for sensitive or regulated data—but it’s not universally “required” in every scenario.

Scenario Encryption expectation
Public marketing website TLS likely required
Internal operational logs May depend on risk classification
Customer database with PII Encryption almost always expected

The goal is to demonstrate that encryption controls align with your data classification and risk management strategy. If you can show auditors that your encryption decisions are deliberate, documented, and proportionate to the risk, you’re in strong shape. If you can’t, even if your encryption is technically sound, expect follow-up questions.

How auditors evaluate “appropriate” encryption for your risk profile

SOC 2 audits are risk-based. Auditors don’t walk in with a checklist of mandatory algorithms. Instead, they assess whether your encryption posture makes sense given the data you handle.

They typically ask questions like:

  • What types of data does the system process?
  • How sensitive is that data?
  • What threats could expose it?
  • What encryption controls mitigate those risks?

Organizations that process PII, financial records, or proprietary customer data will be expected to demonstrate stronger encryption controls than a company that only handles non-sensitive internal metrics.

Evidence often includes encryption policies, architecture diagrams, key management procedures, configuration evidence from cloud services, and monitoring and audit logs. The point isn’t just having encryption—it’s having evidence that encryption is in place and working as described. If you’re working from a SOC 2 compliance checklist, make encryption evidence a line item, not an afterthought.

For a SOC 2 Type I, auditors evaluate control design at a single point in time. They’re asking: “Are these controls designed in a way that should work?”

For a SOC 2 Type II, auditors test whether encryption controls operated consistently over time, typically across a 6–12 month period. This is where SOC 2 Type II continuous monitoring becomes essential. It’s one thing to set up encryption correctly on a Tuesday—it’s another to prove it was running properly every day for the last nine months.

The goal is to demonstrate that encryption controls align with your data classification and risk management strategy. If you can show auditors that your encryption decisions are deliberate, documented, and proportionate to the risk, you’re in strong shape. If you can’t—even if your encryption is technically sound—expect follow-up questions.

Criterion

Role of encryption

Key focus

Security (mandatory)

Primary

TLS for network communication, secrets protection, key management, access control enforcement

Confidentiality

Primary

Protecting sensitive data at rest (e.g., AES-256, TDE) and in transit

Privacy

Important

Encrypting PII, credentials, and identity documents; works alongside retention and data minimization controls

Availability

Supporting

Encrypted backups, secure recovery data

Processing Integrity

Supporting

Tamper protection during data transmission and processing

Security is the only mandatory criterion in every SOC 2 audit, but if you’ve included Confidentiality or Privacy in your scope, encryption becomes a central control,not a supporting one. For organizations weighing SOC 2 against other standards, our comparison of ISO 27001 vs SOC 2 can help clarify the differences.

Encryption scope: what auditors will examine

Auditors evaluate encryption within the boundaries you define. That means scoping decisions matter as much as the technical implementation.

A mature SOC 2 environment classifies data into tiers,public, internal, confidential, and regulated,and applies encryption requirements accordingly. Customer data almost always receives the strictest protections, while internal operational metrics may be risk-based. If you haven’t built a formal data classification policy, expect auditors to flag that gap.

Data type

Encryption expectation

Customer database

Mandatory encryption

Employee HR records

Strong encryption

Internal monitoring metrics

Risk-based

Two scoping pitfalls that auditors flag regularly: production data copied into staging or development environments without encryption (if real data is present, it needs production-grade protections), and unclear cloud shared responsibility. Cloud providers operate under shared responsibility models,infrastructure security may be the provider’s job, but data encryption configuration is almost always yours. Organizations using services like AWS KMS, Azure Key Vault, or Google Cloud KMS must demonstrate what the provider manages, what they manage, and how both are verified.

Data in transit and at rest: what you need to encrypt

In transit

The industry standard is TLS 1.2 or TLS 1.3 for any data crossing a network boundary,external APIs, admin portals, and internal microservices where the risk justifies it. The rule is simple: if sensitive data moves between systems, it should be encrypted. Auditors increasingly ask about internal service-to-service traffic, not just external connections. Organizations using service mesh frameworks or zero-trust models are well positioned here.

Don’t overlook remote access (VPNs, bastion hosts, zero-trust gateways), file transfers (SFTP over plain FTP), and certificate lifecycle management,an expired TLS certificate that causes an outage is both an availability problem and evidence that controls aren’t operating effectively.

At rest

Encryption at rest protects stored data from unauthorized access. The most common implementations include:

  • Databases: Transparent Data Encryption (TDE), column-level encryption, or application-level encryption,typically using AES-256
  • Cloud storage: server-side encryption, client-side encryption, or envelope encryption (where a data encryption key is itself encrypted by a key encryption key)
  • Endpoints: full-disk encryption on employee laptops and mobile devices, enforced via MDM
  • Secrets: credentials and API keys stored in dedicated secrets managers (AWS Secrets Manager, HashiCorp Vault) instead of config files or plaintext environment variables
  • Backups: encrypted backups with restricted restore access and defined retention schedules. Some organizations use crypto-shredding,destroying encryption keys to render stored data permanently unreadable

The key question auditors ask isn’t which algorithm you use,it’s whether you can demonstrate it’s actually configured and running where it should be.

Reach SOC 2 Compliance in 6 Weeks or Less

Schedule Your Free SOC 2 Assessment Today

Encryption key management

If there’s one area where SOC 2 audits succeed or fail on encryption, it’s key management. Strong encryption with weak key management is a contradiction,and auditors know it.

They evaluate centralized key management (via services like AWS KMS, Azure Key Vault, Google Cloud KMS, or HSMs for high-security environments), rotation policies (annually at minimum, with revocation capabilities for compromised keys), separation of duties (key administrators, developers, and the security team should have distinct roles and permissions), and audit logging of key creation, usage, and administrative changes.

Customer-Managed Keys (CMK) and Bring Your Own Key (BYOK) are available on many platforms but are not required for SOC 2 compliance. Managed KMS services are typically sufficient.

Cryptography standards auditors commonly expect

While SOC 2 doesn’t mandate specific algorithms, these are the widely accepted baselines:

Cryptographic control

Common standard

Transport encryption

TLS 1.2 or TLS 1.3

Symmetric encryption

AES-256

Hashing

SHA-256

Asymmetric encryption

RSA or ECDSA

Auditors also expect weak and deprecated protocols to be disabled,SSL 3.0, TLS 1.0/1.1, DES, 3DES, MD5, and SHA-1 should not be active. Some organizations in government or regulated sectors adopt FIPS 140-3 validated modules, but most SaaS companies pursuing SOC 2 do not need FIPS certification.

How to document encryption in your SOC 2 control narrative

A common mistake is over-promising encryption controls in policy language. Organizations write aspirational statements that sound impressive but are impossible for auditors to verify,and that creates findings.

Instead, write accurate, testable controls. Compare these two examples:

❌ Poor control language:
"All data is encrypted everywhere."


✅ Better control language:
"Customer data stored in production databases is encrypted at rest using AES-256 with keys managed by the centralized KMS platform. Key rotation occurs annually, and access to keys is restricted to the infrastructure team via IAM role-based policies."

The better version is specific, scoped, and verifiable. An auditor can test each claim: Is the database encrypted? With AES-256? Through KMS? Are keys rotated annually? Is access restricted? That’s five testable assertions instead of one vague promise.

When writing control narratives, use the format: [What data] is protected by [what mechanism] with [what key management] and [what access restriction]. It makes life easier for everyone,your auditor, your security team, and your future self during the next audit cycle.

Final thoughts

Encryption is one of the most visible,and most misunderstood,parts of SOC 2 compliance.

The framework does not prescribe specific algorithms or tools. Instead, auditors evaluate whether your encryption controls appropriately protect sensitive data within your risk environment. Organizations that implement strong data classification, centralized key management, and well-documented encryption policies typically pass SOC 2 encryption reviews with minimal friction.

The organizations that struggle are usually the ones with a gap between policy and practice,where the documentation says one thing and the infrastructure does another. Close that gap, and you’ve solved 80% of the problem.

If you’re preparing for a SOC 2 Type I or Type II audit, start here:

  1. Map where sensitive data exists across your environment
  2. Review transport and storage encryption for gaps and misconfigurations
  3. Validate key management controls, including rotation and access policies
  4. Document evidence before the audit begins, not during it

A proactive assessment can dramatically reduce audit timelines and prevent costly remediation during the examination period. With the right tooling and preparation, you can make SOC 2 happen in weeks, not months. If you’re evaluating compliance platforms, our comparison of Drata vs Vanta can help you choose the right fit.

Learn more about how to prepare your encryption controls for audit, or contact us to identify gaps before auditors do.

FAQ: SOC 2 encryption requirements

Does SOC 2 require encryption at rest?

Not explicitly. However, encryption at rest is generally expected when storing sensitive data such as PII or customer information. An organization that stores customer data without encryption would need an exceptionally strong risk justification.

In most practical scenarios, yes. Secure transport protocols like TLS 1.2 or TLS 1.3 are widely considered baseline security controls. The IETF formally deprecated TLS 1.0 and 1.1 in 2021, and auditors reflect that in their expectations.

TLS 1.2 or TLS 1.3 are considered the secure industry standards. TLS 1.3, the newer protocol, offers improved performance and stronger security defaults.

No. Managed KMS services from cloud providers are usually sufficient for SOC 2 purposes.

Security focuses on protecting systems overall,think of it as the perimeter. Confidentiality focuses specifically on protecting sensitive data within those systems. Encryption supports both criteria, but the evidence auditors request may differ depending on which category they’re evaluating.

Type I evaluates the design of encryption controls at a point in time. Type II evaluates whether those controls actually operated effectively over a sustained period (typically 6–12 months). Type II is the more rigorous assessment and the one most customers and partners look for.

No. Passwords should be hashed (not encrypted),using algorithms like bcrypt, scrypt, or Argon2,and organizations should implement proper secrets management for credentials and API keys. Encryption is reversible; hashing is not. That distinction matters for both security and compliance.

Both frameworks expect encryption as part of a broader security program, but they’re structured differently. ISO 27001 specifies controls in Annex A, while SOC 2 evaluates controls against Trust Services Criteria. For a detailed comparison, see our guide on ISO 27001 vs SOC 2.

Axipro Author

Picture of Pedro Dias

Pedro Dias

Pedro has been writing online for over 10 years. With experience in all things programming, cyber security, and compliance, he is our editor-in-chief at Axipro.

Blog Highlights

Explore More Articles

SOC 2 compliance is a critical trust signal for organizations handling sensitive data. Unlike ISO standards, SOC 2 reports are private attestations issued by licensed CPA firms, making verification essential.  To verify a SOC 2 report, you need to review the auditor’s opinion, audit period, report type, scope, and any control exceptions, then confirm the auditor’s AICPA registration and request a bridge letter if the report is outdated. In today’s cybersecurity-driven business environment, SOC 2 compliance has become one of the most recognized trust signals in the industry. Whether you are a SaaS provider handling customer data or an enterprise evaluating third-party vendors, a SOC 2 report plays a central role in proving that security controls are properly designed and operating effectively. Verifying a SOC 2 report, however, is not as simple as checking a public registry. Unlike ISO 27001, SOC 2 is not a public certification. Despite being regulated by the AICPA, there is no central database or government portal where you can confirm a company’s compliance status. Instead, SOC 2 is a private attestation report, issued by an independent CPA firm. That makes verification a matter of careful review and disciplined due diligence. If you want to understand how SOC 2 stacks up against other frameworks, our breakdown of ISO 27001 vs SOC 2 is a good place to start. This guide explains how to properly verify a SOC 2 report, what to watch for, and how expert partners like Axipro help organizations achieve and maintain SOC 2 compliance so their reports hold up to real scrutiny. Why Verifying a SOC 2 Report Matters SOC 2 reports are widely used across vendor risk management, enterprise procurement decisions, security questionnaires, and customer trust and sales cycles. Because SOC 2 reports are private and shareable only under NDA, verification responsibility falls entirely on the recipient. Accepting an outdated, poorly scoped, or improperly audited SOC 2 report can expose your organization to serious security and compliance risks. According to IBM’s Cost of a Data Breach Report, the average cost of a data breach continues to climb year over year, and third-party vendor relationships remain one of the most common attack vectors. Treating SOC 2 verification as a formality is not just sloppy governance; it is a liability. Knowing how to verify a SOC 2 report, and working with the right compliance experts, is not optional. It is essential. Step 1: Thoroughly Review the SOC 2 Report Key Sections Once a company provides its SOC 2 report (typically under a Non-Disclosure Agreement), your first step is a structured internal review. There are five areas you must examine closely. The Auditor’s Opinion is the single most critical section of the report. The opinion should be Unqualified (also called Unmodified). A Qualified, Adverse, or Disclaimer opinion is a major red flag and should immediately prompt further questions. An unqualified opinion means the auditor found no material issues with how controls were designed or operated during the audit period. The Report Period and Date tell you whether the report is still relevant. SOC 2 reports are generally considered valid for 12 months. Confirm the exact audit period, for example, October 1, 2024 to September 30, 2025, and flag anything older than that as potentially unreliable without additional assurance documentation. The Report Type is equally important. A SOC 2 Type I assesses whether controls were properly designed at a single point in time. A SOC 2 Type II evaluates whether those controls actually operated effectively over a defined period, typically six to twelve months. For most enterprise customers, SOC 2 Type II is the expected standard, and anything less should be treated with appropriate skepticism. The Scope of Services, found in the System Description section, must explicitly include the product or service you are evaluating. A SOC 2 report that does not cover the relevant system offers limited assurance, regardless of how clean the auditor’s opinion is. Exceptions and Control Failures in the testing results section deserve careful attention. Look for exceptions, failed controls, or deviations from expected behavior. Not all exceptions are disqualifying, but you need to assess whether they represent a material risk to your data or operations. If the report contains a significant number of exceptions or a pattern of failures in critical areas, that is a conversation worth having with the vendor before proceeding. If you want a structured checklist to guide this review process internally, we have put one together here. Step 2: Verify the Auditor’s Credibility A SOC 2 report is only as trustworthy as the CPA firm that issued it. This step is non-negotiable. The auditor must be a licensed CPA firm authorized to perform SOC engagements under the standards set by the American Institute of Certified Public Accountants (AICPA). The AICPA is the governing body for SOC reporting, and any firm issuing these reports must be formally registered with them. Beyond registration, AICPA requires CPA firms to undergo periodic peer reviews to ensure quality and professional standards are maintained. You can check a firm’s peer review standing directly through the AICPA peer review database or verify their status through the relevant state board of accountancy. This is a free, publicly accessible check that takes minutes, and skipping it is a mistake. An unlicensed or non-peer-reviewed firm issuing a SOC 2 report is not just a compliance risk, it is a sign the report may not be worth the paper it is written on. Axipro works closely with reputable, AICPA-registered audit firms, helping clients select the right auditor and ensuring the engagement meets all professional and regulatory expectations from the start. Step 3: Request a Bridge Letter When There Is a Coverage Gap SOC 2 reports cover a defined period. If the most recent report ended several months ago and the next audit is still in progress, you are operating in a coverage gap, a window of time where you have no formal attestation of current control effectiveness. In this situation, you should request a Bridge Letter, sometimes

Axipro, the cybersecurity and compliance consulting firm, and Kertos, the European compliance automation platform, and  have entered a strategic partnership that combines software automation with hands-on implementation support for organisations navigating Europe’s expanding regulatory regime. The agreement, effective April 1, 2026, names Axipro as an implementation partner for Kertos. Customers can now buy the Kertos platform through Axipro alongside consulting, implementation support, and broader compliance service packages spanning frameworks including GDPR, NIS2, DORA, the EU AI Act, ISO 27001, and SOC 2. The partnership lands as European companies face mounting regulatory pressure. The NIS2 Directive pulled around 28,700 additional companies into scope when it replaced its predecessor in October 2024. DORA became fully applicable in January 2025, binding around 22,000 EU financial entities to a single ICT risk management framework with penalties of up to 2% of global turnover. The EU AI Act adds another layer, with compliance costs for SMEs running between €50,000 and €500,000 per organisation depending on use case. What the partnership delivers Under the agreement, Axipro sells, implements, and operates Kertos for customers as part of integrated service packages. The same partner that scopes the gap assessment, defines the control framework, and runs the implementation also configures and operates the platform that holds the evidence. Engagements no longer hand off between separate vendors. For Kertos, the deal gives the platform deeper exposure to how compliance programmes run inside operating businesses, feeding back into product development. For Axipro, which already supports companies across more than 20 frameworks with services spanning penetration testing, internal audit, and end-to-end certification support, Kertos extends its offering with continuous evidence collection, control management, vendor management, and automated audit preparation. “Our ambition at Kertos is to build the leading compliance automation platform in the market, one that doesn’t just simplify compliance but fundamentally redefines how companies achieve and maintain it,” said Dr. Kilian Schmidt, CEO of Kertos. “Strategic partnerships like the one with Axipro are a key part of that journey. By working closely with experienced compliance experts, we gain invaluable real-world insights that directly shape and accelerate our product development.” Free migration to Kertos through Axipro As part of the partnership, Axipro is offering free migration to Kertos for companies currently using another compliance or GRC platform. The migration covers transferring existing controls, evidence, policies, and vendor records into Kertos, with Axipro consultants handling the rebuild of framework mappings for ISO 27001, SOC 2, GDPR, NIS2, and other applicable standards. The aim is to remove the cost and disruption that typically deters companies from switching platforms mid-program, even when their existing tooling no longer fits their regulatory scope.   DACH region as the starting point Germany consistently leads European GRC adoption and accounts for the largest share of the region’s GRC platform market. It is also where regulatory pressure is sharpest right now, with the Federal Office for Information Security actively building out supervisory capacity ahead of the April 2026 NIS2 registration deadline for essential and important entities. “Compliance is only as strong as the tools and partners behind it,” said Ali Hayat, CEO of Axipro. “Our partnership with Kertos gives our clients in the DACH region access to a powerful data privacy and compliance platform, backed by Axipro’s hands-on expertise. Together, we make achieving and maintaining compliance seamless, faster, and more predictable for the businesses that need it most.” Both companies framed the agreement as a foundation for deeper collaboration as customer needs and regulatory requirements continue to evolve. About Axipro Axipro is a cybersecurity and compliance consulting firm helping high-growth companies achieve and maintain regulatory certifications across more than 20 frameworks including SOC 2, ISO 27001, GDPR, and NIST. Services span penetration testing, internal audit, and end-to-end support for companies pursuing first-time certification or maintaining existing ones. Axipro has offices in the UK, the USA, and Bahrain. About Kertos Kertos is a compliance automation platform that helps companies operating in Europe meet and maintain compliance requirements for frameworks including ISO 27001, SOC 2, GDPR, and NIS2. By automating evidence collection, control management, vendor management, and audit preparation, Kertos enables organisations to build and maintain robust information security and data protection programmes without the manual overhead of traditional approaches. Read the full press release here

ISO 14001:2026 was published on 15 April 2026. Over 600,000 organizations in more than 180 countries are currently certified to the previous edition, and all of them have until approximately May 2029 to transition. The revision is not a rebuild, but it is not cosmetic either. It sharpens several requirements that were inconsistently applied under the 2015 standard, introduces a formally new clause on change management, and embeds climate change, biodiversity, and lifecycle thinking more directly into the Environmental Management System (EMS) framework. This article explains what has changed, what has not, and what certified organizations need to do next. What Is ISO 14001 and Why Is It Being Updated? A Brief Overview of ISO 14001 ISO 14001 is the internationally recognized standard for Environmental Management Systems (EMS). Published by the International Organization for Standardization (ISO), it gives organizations a structured framework for managing environmental impacts, meeting legal obligations, and pursuing continual improvement in environmental performance. The standard applies to organizations of any size, in any sector, anywhere in the world, and more than one million sites globally are currently certified against it. Its value lies not in prescribing specific environmental outcomes, but in building the management system infrastructure that makes consistent, improving performance possible. Whether an organization is a manufacturer managing chemical discharge or a logistics provider tracking fuel consumption, ISO 14001 provides the same underlying framework for setting objectives, measuring performance, and driving improvement. Why ISO 14001:2015 Is Being Revised The 2015 version replaced ISO 14001:2004 and introduced several significant advances: risk-based thinking, a stronger link to organizational strategy, and the Harmonized Structure that aligned ISO 14001 with ISO 9001 and ISO 45001. It was a substantial step forward. But the environment it was designed for has changed. Climate change is now a core business risk, not a future projection. Biodiversity loss is accelerating. ESG reporting obligations have multiplied. Investors and regulators expect documented evidence of environmental performance, not just policy statements. The 2015 edition left too much room for organizations to treat climate and biodiversity as optional considerations within context analysis. The 2026 revision corrects that deliberately.   ISO 14001:2015 vs ISO 14001:2026: Overview of Key Differences What Has Changed and What Has Stayed the Same The core architecture of ISO 14001 is unchanged. The standard still follows the Plan-Do-Check-Act (PDCA) cycle and retains the Harmonized Structure it shares with ISO 9001, ISO 45001, ISO 50001, and other major management system standards. The ten-clause framework remains intact. What has changed is the specificity and accountability required within that framework. Environmental conditions must now be explicitly identified and named in context analysis. Change management is now a formal, auditable requirement rather than an implied expectation. Supply chain thinking is more directly embedded into operational controls. Internal audits must now have defined objectives, not just scope and criteria. The table below summarizes the most significant differences between the two editions. Area ISO 14001:2015 ISO 14001:2026 Climate change Not explicitly required (added via 2024 amendment) Formally integrated; required across multiple clauses Biodiversity Implied; not named Explicitly required in context analysis Change management No standalone clause New standalone Clause 6.3 Risks and opportunities Within Clause 6.1 New standalone Clause 6.1.4 Supply chain scope “Outsourced processes” “Externally provided processes, products and services” Internal audit Defined scope and criteria Defined scope, criteria, and objectives Clause 10.1 Standalone continual improvement clause Integrated into Clauses 10.2 and 10.3 What the ISO 14001:2026 Revision Is, and Is Not ISO 14001:2026 is not a new standard. It does not introduce a fundamentally different approach to environmental management. Organizations with a mature, well-run ISO 14001:2015 EMS will not be starting from scratch. What the revision is: a targeted update that addresses gaps and ambiguities that accumulated since 2015. It makes previously optional considerations mandatory, adds structural clarity where the 2015 edition was ambiguous, and aligns the standard more closely with how environmental management intersects with modern business risk, ESG reporting, and supply chain accountability. Organizations that applied the 2015 standard in a minimal or box-ticking way will face more substantial transition work. Organizations that ran a genuine, actively managed EMS will find most of what is required already in place, with focused updates needed in a handful of areas. Clause-by-Clause Comparison: ISO 14001:2015 vs ISO 14001:2026 Clause 4: Context of the Organization In ISO 14001:2015, Clause 4.1 required organizations to identify external and internal issues relevant to their EMS. Climate change was a possible consideration, but not a named one. The 2026 revision changes this directly. ISO 14001:2026 now explicitly names four categories of environmental condition that must be assessed when determining organizational context: climate change, pollution levels, biodiversity and ecosystem health, and the availability of natural resources. These are not suggestions, they place these issues squarely on the required agenda for every certified organization. The practical implication is significant. An organization that previously mapped its context by tracking energy use and waste generation now needs to demonstrate how it has assessed whether biodiversity loss, water scarcity, or local pollution levels are material to its operating environment. If they are, those factors must flow into objectives, risk registers, and operational controls. Clause 4.3, which covers the scope of the EMS, has also been strengthened. Organizations are now expected to define their scope with explicit reference to their authority and ability to exercise control and influence across the full life cycle of their activities, products, and services. The EMS boundary is no longer limited to the physical boundary of the facility. Clause 5: Leadership Top management responsibilities are expanded in the 2026 edition. The 2015 version focused on management roles. The 2026 revision makes clear that leadership must support environmental performance across all relevant functions, including non-management roles. The environmental policy itself has been updated. ISO 14001:2026 expects the policy to include commitment to conserving natural resources and protecting ecosystems, alongside the existing commitments to pollution prevention and continual improvement. This clause often receives less attention during gap analyses than the more structural changes in Clause 6. But