The California Privacy Protection Agency (CPPA) has approved a new rule (Rule) requiring many companies that collect consumers’ PI to complete a detailed annual cybersecurity audit. These audits must consider two dozen cybersecurity practices, representing the regulator’s redefinition of what constitutes “reasonable” cybersecurity efforts under California law.
The state’s detailed list of cybersecurity controls could emerge as a uniform baseline in the United States for what comprises reasonable security, but “it sets a high bar. A lot of these controls on the list are not shocking to see, and they’re not rocket science. But, together, they form a higher standard than most other regulations require,” Perkins Coie partner Amelia Gerlicher told the Cybersecurity Law Report.
The audit reports will not be public but may be requested by regulators. Senior executives must publicly certify satisfaction of all audit requirements.
While the deadline for audit reporting begins in 2028, practitioners suggest that companies complete a robust internal audit in 2026 to give ample time to improve on weak points in their cyber programs. With insights from Blank Rome, Perkins Coie, Polsinelli, and Shook Hardy & Bacon, this article sets out steps for companies to consider while conducting the recommended preparatory audits. It also examines less-standard cyber controls among California’s required measures, cost and timing concerns, and risks tied to the ultimate audit report.
See “Show Me the Data: How to Conduct Audits for Data Minimization” (Nov. 18, 2020).
Assessing Applicability and Inventory Data Flows
The Rule, which is a CCPA regulation, applies to businesses processing the sensitive PI of at least 50,000 customers, or those making 50 percent of annual revenue from selling or sharing personal data. The mandate also applies to businesses that process the PI of 250,000 or more individuals and achieve at least $28 million in annual gross revenue.
The law is effective January 1, 2026, but gives a long lead time. Businesses with more than $100 million in revenue must file audit certifications by April 1, 2028, those earning more than $50 million by April 2029 and the rest by April 2030.
The purpose of these audits is to protect personal data. As such, companies will need to inventory their data processing as well as their IT systems and security controls. They should make sure to consider and document the PI sitting in or transiting through cloud infrastructure, development pipelines, SaaS (software-as-a-service) platforms and storage repositories, among other locations.
See “Updating Compliance Programs to Address the CPPA’s Regulations on ADMT and Risk Assessments” (Sep. 17, 2025).
Conducting a Thorough Pre-Audit
California’s audit requirements differ from the approach of more established cyber audits. To address the high level of detail and strict review that California requires, companies should strongly consider a thorough dry run for the audit, experts who spoke to the Cybersecurity Law Report agreed. Below are suggested steps for tackling the process.
1) Set Goals and Expectations
“A pre-audit can help the company understand what this report is going to look like ultimately, and then remediate ahead of time,” before the real stakes begin, Gerlicher said.
The Rule gives the auditor a broad and deep mandate. The auditor must “opine on how well the company protects personal information,” and the audit report will include a detailed description of the company’s security gaps, Gerlicher noted. The auditor must be independent, but can be either internal or external.
“Pressure testing this California audit ahead of time is a really, really good idea. That way the formal audit is hopefully clean and there’s not much the company would have to do,” advised Blank Rome partner Phil Yannella. Those who coordinate pre-audit efforts, however, will need to build more time into their schedules, he told the Cybersecurity Law Report.
See our two-part series “Amendment to NYDFS Cyber Regulation Brings New Mandates”: Governance Provisions (Dec. 13, 2023), and First Compliance Steps (Jan. 3, 2024).
2) Address Privilege Issues
The Rule’s requirement around identifying security gaps has “always jumped out at us as the most problematic. Combined with the fact that the final audit report is not going to be privileged, that seems like a roadmap for all sorts of critics,” Gerlicher stressed.
Companies may be able to conduct the pre-audit under privilege by doing it for the purpose of obtaining legal advice about complying with this law and others. Thus, “legal should be involved in scoping the pre-audit and hiring the technical experts,” Gerlicher advised.
See our two-part series on cybersecurity practices for private equity sponsors and their portfolio companies: “Incident Prevention and Response” (Feb. 28, 2024), and “Due Diligence and Post-Acquisition Efforts” (Mar. 6, 2024).
3) Build On SOC 2 Audits
Companies may use other audits to fulfill their obligations under the Rule as long as they satisfy the Rule’s requirements. Many companies across industries have pursued certification under the SOC 2 standard (Security and Organization Controls), but SOC 2 audits differ in approach and reporting detail from the California audits.
“One open question is how close the California review can get to the types of cybersecurity evaluations that people want to do anyway,” Gerlicher said. SOC 2 testing, for instance, lets a company define the specific controls to test. But the Rule flips that approach on its head by taking the choice away from the company and defining the controls that must be reviewed, she noted.
The most significant difference between the SOC 2 and CCPA audits is the review standard. SOC 2 “is an attestation exercise,” allowing the auditor to rely on the cyber team members to report what they have done, Polsinelli shareholder Laila Paszti told the Cybersecurity Law Report. “This [CCPA] audit is an evidence-based approach. The auditor has to validate [compliance],” she explained.
The California audits likely will add costs. “Many companies have to adhere to SOC 2 for contractual requirements or other reasons,” so they cannot simply swap one audit out for the other, Paszti pointed out. Companies may be able to get a head start by mapping the company’s SOC 2 report to the Rule’s roster of items, she added.
Many companies do not arrange for their SOC 2 audit reports to include gap assessments and remediation plans, which are both required to satisfy California’s requirements, Yannella highlighted. “Anyone who wants to use a third-party SOC 2 auditor for this audit has to be mindful of these additional requirements,” he stressed.
4) Anticipate Multiple Types of Costs
Companies should not delay addressing the California audits, as cyber teams will “need resources for technical implementations” for any areas or components that the auditor deems lacking, Shook Hardy & Bacon partner Colman McCarthy advised. “If you need an antivirus or endpoint detection tool, or additional firewalls, any of those cost money. Don’t skimp on the qualified personnel either,” he advised. Buying and launching additional security tools can take months, he cautioned.
The audits required by the Rule are beyond what many companies have experienced, so they should expect higher costs, warned Yannella.
As 2026 approaches, companies should plan security and compliance budgets appropriately with the Rule’s compliance deadline only two years away. “If you have issues with money now, you’re not going to have the ability to be flexible later,” as delays may raise costs, Gerlicher advised.
For some cyber chiefs, the costs and burdens of the audit might end up modest, Paszti posited. Some client companies “have been ahead of the ball because they were not looking for laws to come in to mandate their behavior,” she reported.
See “Updating Compliance Programs to Address the CPPA’s Regulations on ADMT and Risk Assessments” (Sep. 17, 2025).
5) Pull and Gather Evidence
A key novelty of the Rule is the need to generate the evidence for the auditor. A pre-audit coordinator launching the effort should expect patches of turbulence and pushback. “There is typically a lot of thrash in the process because the company has to figure out who can identify the evidence” for each control and arrange for them to generate it, Gerlicher observed.
Pulling evidence for each control can be involved, Paszti noted. For example, an auditor evaluating patching and vulnerability management might request three months of vulnerability scans to confirm how many critical and high severity vulnerabilities the company found – then ask for patch deployment logs to verify it addressed the vulnerabilities, she outlined.
“Companies should stand up what I call an evidence library,” Paszti urged. This would include “policies, configurations, test results [and] remediation logs. Having those all will help simplify the audit process, and support any certifications,” she said. Companies also should consider collecting pre-audit risk assessments, and records of employee training and mitigation actions.
Working to gather the documentation typically requires collaboration between the organization’s legal and technical teams, a useful preparation for when the stakes rise with the official audit, Paszti highlighted. The pre-audit effort may also reveal whether the company should expand its logging and recording of security activities.
See “More Regulators Accept New Tool to Streamline Companies’ Cyber Compliance” (Jan. 26, 2022).
6) Complete and Document a Gap Analysis
The Rule does not require a company to implement the entire list of controls it lays out for auditing. However, “companies should take [the Rule’s list of controls to audit] as strong guidance that this is what California regulators consider to be a good approach to their information security program,” so they at least should assess whether each component makes sense for them, McCarthy suggested.
Companies should increase their efforts to record the considerations around whether to use each recommended control, Paszti suggested. “The auditors will decide which controls apply based on the business’s size, complexity and data sensitivity,” she said.
Before completing the analysis, organizations should emphasize the riskiest areas, Paszti advised. “Understand the company systems, how users interact with it, the risks and what controls would address those risks,” she urged.
A common approach for analyzing compliance gaps is to create a matrix or spreadsheet indicating the status of each cyber control, its level of implementation, the evidence of that implementation, whether it satisfies the chosen standard, the requirements for the company to upgrade the measure to the standard and the responsible parties.
See “Practical Compliance Implications From NYDFS’ Healthplex Settlement” (Sep. 17, 2025).
7) Address Less-Standard Controls
The Rule includes several controls beyond the standard package of requirements set forth in other state laws. Companies commonly are diligent with longstanding security measures like authentication, encryption, firewalls and access controls, Yannella observed. But “the audit controls for California include some adjacent areas of data management that are often weak points in cyber and data governance programs,” he said. The following are some areas of the Rules that may challenge companies.
- Data Retention and Disposal of PI. Many companies have not gotten far with these tasks, despite their becoming mainstay requirements of both privacy and security laws, Yanella reported. “Companies generally know that data retention is really important. It’s on their to-do list, but it often gets ‘back-burnered’ because other emerging projects take everyone’s attention. This reg is going to push this issue to the front burner,” he observed.
- Data Mapping. The Rule and Minnesota’s privacy law make data inventories mandatory – a change that may prompt companies to be more thorough or detailed than they previously have been, Gerlicher said. Cybersecurity teams may not associate data governance with the mapping task, McCarthy noted, but the company’s security benefits when it maps in detail “what data the organization has, where it is, what it is used for, how long the company retains it and when you get rid of it,” he explained.
- Vulnerability Disclosure Programs. These have not typically been a focus of cybersecurity audits, Paszti noted. “Running a bug bounty or similar program is technically and operationally challenging if the company hasn’t done that before,” she said.
- Network Segmentation. This is not a widespread requirement. “Network segmentation can be difficult, especially when the company has legacy environments or has integrated with acquired companies, which requires a significant network architecture redesign,” Paszti noted. Companies should not segment networks unthinkingly, McCarthy cautioned, adding that the sensitivity of the PI and its location merits more protection.
- Secure Software Development and Deployment. The Rules broadly phrase these requirements without specifics. For the many companies that have not previously addressed this task, standards exist from National Institute of Standards and Technology, the Center for Internet Security and others, McCarthy noted.
See “Cybersecurity Compliance Lessons From NYDFS’ Carnival Action” (Aug. 3, 2022).
8) Keep an Eye on AI’s Impact
Regulators are ready to scrutinize use of personal data for AI. However, the audit portion of the CCPA regulation does not mention this much-discussed concern or account for the wrinkles in AI security that have begun to challenge overall cyber compliance. “AI is a complicating development for the audits.” Companies should consider whether they “have somebody who understands the technology enough to be able to assess the risk,” suggested McCarthy.
One important step during a pre-audit is to examine the access controls around the AI use – “both who has access to it and what it has access to,” McCarthy proposed.
AI implementation is a wild card that could affect any of the Rule’s listed controls, Yannella cautioned. “Secure coding is going to be an issue with use of AI for coding purposes. The inventory of personal information and data retention” are other controls where AI use could have a significant impact.
See “Benchmarking AI Governance Practices and Challenges” (May 7, 2025).
Compliance Challenges and Considerations
Choosing and Booking an Auditor
Companies subject to the Rule must choose an independent and qualified auditor, and they should do so sooner rather than later. The Rule could create a timing bottleneck that makes it challenging to hire one, Gerlicher warned. “Eventually, we’re going to be in a world where every company subject to this Rule has to do their audit between January 1 and April 1 of every year,” she said.
If selecting an internal auditor, the lawyers should ensure the person reports to a non-cybersecurity executive or board and verify the auditor’s credentials and experience with privacy audits.
Preparing to Present Evidence That Might Be Questioned
The auditor will focus first on evidence that policies and procedures are in place, then whether the company has implemented them sufficiently, McCarthy said.
Prepare for an auditor to contest the evidence, McCarthy cautioned. For example, a cyber team might deliver a screenshot of some implementation to portray a cyber control and make available a team member for an interview to confirm measures taken. Yet, the auditor might not be comfortable relying on that as evidence and request more detailed records, he noted.
Assessing Potential Liability
“While these audits are not made public, that doesn’t mean that they can’t be subpoenaed later down the road if there was, heaven forbid, a breach,” Paszti said.
The audit’s itemization of gaps and remediation recommendations radiates “glaring liability,” Yannella observed.
Companies will need to present the audit results to senior leadership for the required executive attestation that the audit was sufficiently completed. The company submits only the attestation to the CPPA. Senior leaders hearing about the Rule are concerned about signing off on the audit, Gerlicher said. “There is still fear out there” because of regulators pursuing individual liability for executives in a few publicized cases, she reported.
See “Mitigating CISO Personal Liability Post-SolarWinds” (Feb. 14, 2024).
Staying Informed
The long lead time for submitting audits means requirements could change, so companies should monitor for CPPA updates and guidance. Companies should consider capping their pre-audit effort by scheduling a periodic refresher or update.
Companies preparing for this highly detailed and multi-layered audit should not lose sight of the big-picture reason to do it: threat mitigation and greater security. Covered companies must identify the risks, figure out how to manage them and implement protocols accordingly. Then, they “need a process to validate that they have implemented everything properly,” Paszti noted. Although the audit is a complicated and time-consuming burden, it also could be a beneficial process.
