The Aramco CCC audit is fundamentally an evidence exercise. Whether you are pursuing a CCC (remote self-assessment) or a CCC+ (on-site audit by an authorized firm), the assessor's job is to verify that every applicable SACS-002 control is implemented and functioning. They do this by reviewing documented evidence: timestamped screenshots, configuration exports, policy documents, log samples, and test reports. The quality and completeness of this evidence determines whether your assessment proceeds smoothly or stalls on back-and-forth clarification requests.

This guide walks you through exactly what auditors expect for each infrastructure-related control area, the specific evidence formats that satisfy assessment criteria, and how to organize your evidence package for a successful CCC certification.

Understanding the Evidence Standard

Before diving into specific control areas, it is important to understand what makes evidence acceptable to a CCC auditor. Every piece of evidence must meet four criteria:

  1. Timestamped: Screenshots and exports must include visible dates and times that demonstrate the configuration was in place at the time of assessment. Undated screenshots will be rejected.
  2. Attributable: Evidence must clearly show which system, server, or service it relates to. A firewall rule screenshot without the hostname or IP address visible does not prove the rule applies to your Aramco-facing systems.
  3. Current: Evidence must be recent, typically within 30 days of the assessment date. Configurations documented six months ago do not prove current compliance.
  4. Complete: Partial evidence creates audit findings. If the control requires MFA on all administrative accounts, evidence showing MFA enabled on three of five admin accounts is a failure, not partial credit.

Auditor Tip: Organize your evidence in a folder structure that mirrors the SACS-002 control numbering (TPC-2, TPC-3, TPC-6, etc.). This makes the assessor's job easier and demonstrates organizational maturity, which positively influences the overall assessment.

Email Controls: TPC-8, TPC-9, TPC-10

Email security is one of the most frequently assessed control areas because email is the primary vector for phishing attacks targeting vendor credentials. Auditors will examine your email infrastructure configuration to verify that anti-spoofing, authentication, and encryption controls are properly implemented.

SPF Record Evidence (TPC-8)

You need to provide a DNS lookup showing your domain's SPF record. The evidence should include:

DKIM Evidence (TPC-9)

DKIM signing proves that emails sent from your domain have not been tampered with in transit. Required evidence includes:

DMARC Policy Evidence (TPC-10)

DMARC ties SPF and DKIM together with a policy that tells receiving servers what to do with emails that fail authentication. Evidence must show:

For a comprehensive understanding of how email encryption fits within the broader SACS-002 encryption requirements, see our guide on data encryption compliance for CCC certification.

Access Controls: TPC-2, TPC-3

Access control evidence is among the most scrutinized because unauthorized access is the root cause of most security incidents. Auditors will verify that your authentication mechanisms, password policies, and account management procedures meet SACS-002 standards. For detailed implementation guidance, refer to our access control and MFA compliance guide.

Password Policy Evidence (TPC-3)

Provide evidence that your password policy meets or exceeds SACS-002 requirements:

MFA Enrollment Evidence (TPC-2)

Multi-factor authentication evidence must demonstrate universal enforcement, not just availability:

Endpoint Protection: TPC-6

Endpoint protection evidence proves that all devices with access to Aramco data are protected against malware and that protection is actively maintained.

Antivirus Configuration Evidence

Endpoint Compliance Reports

Many auditors request a compliance summary report from your endpoint protection platform that shows:

Encryption: TPC-52

Encryption evidence covers data in transit and data at rest across all systems handling Aramco data. Our encryption compliance guide provides detailed implementation steps, while the evidence requirements are outlined below.

VPN Tunnel Configuration

For complete VPN and remote access requirements, see our secure remote access compliance guide.

TLS Certificate Evidence

SFTP and File Transfer Evidence

Audit Logging

Audit logging evidence demonstrates that your infrastructure records security-relevant events and retains those records for the required period.

Log Retention and Protection

Log Content Requirements

Auditors will verify that your logs capture specific event types:

Penetration Testing

SACS-002 requires annual penetration testing of systems in scope for CCC certification. The penetration test evidence must include:

Important: The penetration test must be performed by an independent qualified firm, not by internal staff. Aramco's authorized assessment firms may require the pen test to follow specific methodologies such as OWASP or PTES.

Comprehensive Audit Evidence Checklist

The following table provides a complete reference of evidence requirements organized by control area, including the evidence format and whether MassiveGRID's CCC-compliant infrastructure package generates the evidence automatically:

Control Area Evidence Required Format MassiveGRID Auto-Generated?
SPF (TPC-8) SPF DNS record + validation result Screenshot + DNS export Yes
DKIM (TPC-9) DKIM keys + signed email headers DNS screenshot + email header Yes
DMARC (TPC-10) DMARC record + aggregate reports DNS screenshot + XML/report Yes
Password Policy (TPC-3) Policy config + lockout settings Screenshot + policy document Yes
MFA (TPC-2) Enrollment stats + enforcement config Dashboard screenshot Yes
Account Lockout (TPC-3) Lockout threshold + duration config Screenshot Yes
Antivirus Definitions (TPC-6) Definition version + update schedule Console screenshot Yes
AV Scan Schedule (TPC-6) Scan policy + recent scan results Console screenshot + report Yes
Real-time Protection (TPC-6) On-access scan configuration Screenshot Yes
IPSec VPN (TPC-52) Tunnel config + encryption params Config export + screenshot Yes
TLS Certificates (TPC-52) Cert details + SSL test results Certificate export + test report Yes
SFTP Config (TPC-52) SSH config + cipher suites Config file export Yes
Firewall Rules Rule sets + network segmentation Config export + diagram Yes
Log Retention Retention policy + sample exports Policy doc + log samples Yes
Log Integrity Access controls on log storage Config screenshot Yes
SIEM/Monitoring Dashboard + alert configuration Screenshot + alert rules Yes
Penetration Test Full pen test report + remediation PDF report Coordinated (partner firm)
Data Classification Classification policy + asset inventory Policy document + spreadsheet Template provided
Backup Configuration Backup schedule + retention + test restores Config screenshot + restore log Yes
Incident Response Plan IR plan document + contact list Policy document Template provided

How MassiveGRID Generates Audit-Ready Evidence

One of the most time-consuming aspects of CCC certification is gathering and formatting evidence. Vendors often spend weeks taking screenshots, exporting configurations, and assembling documentation that proves their infrastructure meets each control requirement. With MassiveGRID's CCC-compliant infrastructure package, the majority of this evidence is generated automatically.

The MassiveGRID compliance management interface provides:

For vendors managing their own file hosting and data security, evidence generation is particularly important because data access controls and encryption configurations change frequently as team members join or leave projects.

Preparing Your Evidence Timeline

Do not wait until the assessment is scheduled to begin gathering evidence. A structured preparation timeline ensures everything is current and complete when the assessor requests it:

For organizations approaching their first CCC assessment, our comprehensive Aramco CCC compliance guide provides an overview of the entire certification process, while our CCC renewal guide covers what changes at recertification.

Get Your Evidence Package Ready

The difference between a smooth CCC assessment and a prolonged, frustrating process almost always comes down to evidence preparation. Vendors with organized, complete, current evidence packages typically complete their assessments in days. Vendors who scramble to gather evidence reactively can spend weeks or months in back-and-forth with assessors.

MassiveGRID's CCC-compliant infrastructure package eliminates the evidence-gathering burden for all infrastructure-related controls. Explore the full compliance package to see how automated evidence generation works, or contact our compliance team for a readiness assessment that identifies evidence gaps before your auditor does.