SOC 2 Compliance Cursor Rules
Cursor rules for SOC 2 compliance — security controls, audit trails, data encryption, and trust service criteria implementation
Security compliance Cursor Rules
Details
Author: community
Category: Security
Framework: compliance
Format: Cursor Rules
Source:
View on GitHub
How to install in Cursor
Manual steps
- Download or copy the rules file from the source repository.
- Add it to your project root as
.cursorrules. - Restart Cursor — the rules will be active for all AI interactions in this project.