CCPA privacy and cybersecurity audit reports start coming due for some high revenue companies on April 1, 2028, but the clock is already ticking.

CCPA privacy and cybersecurity audit requirements have gone from likely to a done deal, and the click is already running for in-scope organizations.
In July 2025, the California Privacy Protection Agency (CPPA) adopted detailed regulations that require certain CCPA-covered businesses to conduct annual, independent privacy and cybersecurity audits and certify compliance to the CPPA. The rules were approved by the Office of Administrative Law in September 2025 and come into effect January 1, 2026, with the first reports due as early as April 1, 2027 (depending on gross revenue).
If your organization is in scope, the time for dealing with it later has passed. Audit readiness means building a defensible privacy and security story now, not in January 2028. This story has to be supported by real evidence like tabletop exercise reports, decision logs, and implementation artifacts. Your board and the independent third party attesting to the accuracy of your report won't appreciate a last-minute, slapdash approach.
This article walks through:
Remember, this article is for general information and education only. This is not legal advice. You should talk to your own counsel about how the law and rules apply to your specific facts.
Under the new regulations, a cybersecurity audit is not just a “check the box” review of your practices. It’s defined as a comprehensive evaluation of a business’s cybersecurity program. The audit must assess the business's cybersecurity program not just superficially but on its ability to protect personal information from unauthorized access, destruction, use, modification, or disclosure as well as unauthorized activity resulting in the loss of availability of personal information. See § 7123 of Cal. Code Regs., tit. 11 for the full regulation on the scope, but understand that this evaluation is not cursory and not limited to your security controls. It looks at the entirety of an organization's privacy program.
Key features from the regulations and accompanying guidance include:
If you're in scope, this requirement isn’t a one‑time project. It’s a new part of your annual privacy and security program management. Even if you're not in scope for an annual aduit, understanding these requirements may be crucial, since the CPPA already has the right to audit you.
The audit requirement doesn’t apply to every business regulated by CCPA. It applies when your processing of personal information presents a "significant risk" to consumers' security. The final regulations define that criteria by using revenue and data processing volume thresholds.
You must conduct annual cybersecurity audits if:
If that sounds like your ad‑tech stack, your consumer‑facing platform, or your high‑volume data product, you’re likely looking at needing a CCPA audit annually.
The audit rules phase in over time, based on revenue. The effective date for the regulations is January 1, 2026, but the first cybersecurity audit reports aren't due until 2028, giving businesses some runway to inventory and mature their privacy program and cybersecurity practices and documentation.
If you’re in the significant‑risk bucket, your first audit report and certification are due as follows:
Each audit covers the preceding calendar year (e.g., a report due April 1, 2028 covers roughly January 1, 2027 – January 1, 2028).
In parallel, businesses subject to privacy risk assessment rules (for things like selling/sharing data, processing sensitive PI, or using ADMT) must start conducting those assessments by January 1, 2026, with the first risk-assessment summary and attestation due April 1, 2028.
What's the bottom line then? 2026–2027 are your build/document/test years. By the end of 2027, you want to be running like you’re already in an audit cycle.
Separate from the new annual cybersecurity audit requirement, the CPPA has long had authority to conduct its own Agency audits of any business, service provider, or contractor “to ensure compliance with any provision of the CCPA.”
Key points about Agency audits include the following:
So even if you’re not technically required to do an annual cybersecurity audit, building a documented, evidence-backed privacy and security program is not only in your best interest but also your best defense for a surprise visit from the CPPA.
The regulations and commentary to the new requirements make it clear that the annual audit requirement is not a quick penetration test. It's a program-level snapshot and evaluation of an organization's policies, procedures, and practices and encapsulates what the CPPA believes "reasonable security" looks like in practice.
A compliant audit and report must:
It might seem scary to throw open the cellar doors, but an audit that doesn't go into these details and punts (e.g., "We're generally aligned with industry best practices" but includes no specific artifacts or gap register) will not meet the standard required by the CPPA.
Being audit-ready is not about having a perfect privacy program. Perfection will never exist, so transparency, care, and diligence are what regulators are looking for. It's about being able to prove, quickly and coherently, what you actually do as an organization and that you put some thought behind your privacy decisions.
The following documents are often the first thing an auditor will inspect, and they set the context for the operationalization of your privacy program. You will need to be able to provide on demand the following:
Because the CCPA audits are keyed to significant risk processing, you will need a defensible view of what you process, where, and why. Auditors look for consistency, so be sure that your assessments match what our systems and logs actually show. You will need to provide the following:
Review each control domain and consider how your organization manages policy to procedure to proof. Your audit report has to describe the following controls and how effective they are. Having pre-organized evidence dramatically reduces pain when its time for the audit.
Incident response is where auditors see whether your program works under pressure. At the end of the day, however, incident response matters for much more than audit preparation. Privacy incidents are always a matter of when, not if, and preparation is the single best way to mitigate the potential for loss, reputational damage, and liability. As you prepare for an audit you will want to curate the following evidence:
A brief note about why tabletops matter (because our founder is a total evangelist for privacy tabletop exercises): In the context of the CCPA, the audit rules require you to describe and evaluate the effectiveness of your security controls, not just their existence. A well-documented tabletop is a clean, easy-to-show way to demonstrate that your team can assemble quickly, they know their roles, and that you run structured tests, capture lessons, and close the loop by makinog improvements. Those tabletop reports become core privacy evidence alongside your policies and logs.
The CCPA framework expects you to exercise reasonable and appropriate steps to ensure service providers and contractors use personal information consistently with your obligations. Vendors are an increasing source of risk in this interconnected world, and third party risk management impacts many areas of your privacy program, including incident response and DSR management. Given how much risk sits with vendors, auditors will pay close attention to:
Finally, you will need to show auditors that your program works for real people to let them manage their rights. The artifacts you provide for auditors here confirm to them that you're not just compliant on paper. The following artifacts prove your employees are properly handling requests: