Checklist
SOC 2 Compliance Checklist
SOC 2 compliance demonstrates that your organization handles customer data with controls that an independent auditor has examined. This guide walks through the five trust service criteria, the pre-audit readiness work that determines whether your audit succeeds or surfaces expensive surprises, and the ongoing discipline that keeps compliance from degrading between audit cycles.
What SOC 2 is
SOC 2 (System and Organization Controls 2) is a framework developed by the American Institute of Certified Public Accountants (AICPA) that evaluates how an organization manages customer data based on five trust service criteria. Unlike ISO 27001 (which certifies a management system) or PCI-DSS (which prescribes specific controls), SOC 2 evaluates whether an organization has controls in place that meet defined criteria — and whether those controls actually work over time.
A SOC 2 report is produced by an independent CPA firm after examining the organization's controls against the applicable trust service criteria. The report describes the system, the controls in place, the tests the auditor performed, and the results. It is not a pass/fail certification — it is an attestation with an auditor's opinion on the effectiveness of controls.
SOC 2 has become the de facto trust standard for SaaS companies, cloud service providers, and any technology organization that processes customer data. Enterprise buyers routinely require a SOC 2 Type II report before approving a vendor. Investors performing cybersecurity due diligence treat the absence of SOC 2 as a gap that will need to be funded post-close.
Type I vs Type II
SOC 2 reports come in two forms. The distinction matters because the two types answer fundamentally different questions — and customers know the difference.
Type I: design effectiveness at a point in time
A SOC 2 Type I report evaluates whether the organization's controls are suitably designed to meet the applicable trust service criteria as of a specific date. The auditor reviews policies, configurations, and control descriptions to determine whether the controls, if operating as described, would satisfy the criteria. Type I does not test whether the controls actually operated effectively over time — only that they exist and are designed correctly.
Type I is useful as a stepping stone. It validates that the control framework is sound before committing to the longer Type II observation period. For organizations pursuing SOC 2 for the first time, Type I provides early evidence to share with customers while the Type II observation period runs.
Type II: operating effectiveness over a period
A SOC 2 Type II report evaluates whether controls operated effectively throughout an observation period — typically 3 to 12 months. The auditor samples evidence from across the period: access review records, change management logs, incident tickets, monitoring alerts, and configuration snapshots. Type II demonstrates sustained discipline, not just good documentation.
Type II is what enterprise customers require. A Type I report shows you built the controls; a Type II report shows you ran them. Most security questionnaires and vendor assessment frameworks specifically ask for Type II, and many treat a Type I report as insufficient for ongoing vendor approval.
The five trust service criteria
AICPA's Trust Services Criteria (TSC) define what SOC 2 evaluates. Security is mandatory. The other four are selected based on business context and customer requirements.
Security (Common Criteria — CC)
Security is the foundation of every SOC 2 report and the only mandatory criterion. The Common Criteria cover nine categories:
- CC1 — Control environment: governance, organizational structure, management oversight, accountability
- CC2 — Communication and information: internal and external communication of security policies and obligations
- CC3 — Risk assessment: identifying and analyzing risks to achieving system objectives (pairs with your security risk assessment)
- CC4 — Monitoring activities: ongoing evaluation of controls and remediation of deficiencies
- CC5 — Control activities: policies and procedures that mitigate identified risks
- CC6 — Logical and physical access controls: authentication, authorization, access provisioning, physical security
- CC7 — System operations: detection of anomalies, incident response, change management
- CC8 — Change management: controlling changes to infrastructure, software, and configurations
- CC9 — Risk mitigation: selecting and implementing risk response activities, including vendor management
Availability
Availability criteria evaluate whether the system is available for operation and use as committed or agreed. Controls include uptime monitoring, capacity planning, disaster recovery, backup procedures, and business continuity planning. Most SaaS companies include Availability because their customers rely on service uptime and have SLAs that make availability a contractual obligation.
Processing Integrity
Processing Integrity evaluates whether system processing is complete, valid, accurate, timely, and authorized. This criterion is relevant for organizations where data accuracy is a core service promise — financial calculations, analytics platforms, payment processing, and data transformation services. It is less commonly included by companies whose primary service is not data processing.
Confidentiality
Confidentiality criteria address the protection of information designated as confidential — customer data, intellectual property, business plans, and any data subject to contractual confidentiality obligations. Controls include encryption (at rest and in transit), data classification schemes, access restrictions based on classification, and secure disposal procedures. Organizations handling regulated data or operating under NDA-protected client relationships typically include this criterion.
Privacy
Privacy criteria evaluate how the organization collects, uses, retains, discloses, and disposes of personal information. The criteria align with generally accepted privacy principles: notice, choice and consent, collection, use and retention, access, disclosure and notification, quality, and monitoring and enforcement. Organizations that process personal data as a core function of their service — HR tech, healthcare platforms, consumer applications — should include Privacy. Organizations that only handle employee data or limited customer contact information often exclude it.
Pre-audit readiness checklist
The pre-audit phase determines whether the audit itself will run smoothly or surface expensive surprises. Organizations that invest in readiness before engaging an auditor avoid the most common failure pattern: an observation period that begins before controls are actually operational, producing exceptions that could have been prevented.
Policies and documentation
Access controls
Monitoring and logging
Vendor management
Change management
Risk assessment
The audit process
The SOC 2 audit follows a defined sequence. Understanding each phase prevents common missteps — particularly around scoping (which determines what the auditor examines), evidence collection (which consumes the most internal effort), and auditor selection (which affects report credibility).
1. Scoping
Scoping defines the boundaries of the audit: which systems, processes, and trust service criteria are included. The scope should cover the systems that process, store, or transmit customer data — the "system" described in the SOC 2 report. Scoping too broadly inflates cost and evidence requirements. Scoping too narrowly leaves important systems out of the report, which sophisticated customers will notice.
- Define the system boundaries: production infrastructure, supporting systems (CI/CD, monitoring), and corporate IT
- Select trust service criteria based on customer requirements and business context
- Document system components: infrastructure, software, people, procedures, and data
- Identify subservice organizations (cloud providers, data center operators) and determine whether to use the inclusive or carve-out method
2. Readiness assessment
A readiness assessment (sometimes called a gap assessment) evaluates current controls against SOC 2 requirements before the formal audit begins. This is optional but strongly recommended for first-time audits. The readiness assessment identifies gaps that can be remediated before the observation period starts — gaps found during the audit itself become exceptions in the report.
Many auditor firms offer readiness assessments as a separate engagement. GRC platforms also provide automated readiness checks that map your current controls to SOC 2 criteria and flag gaps. A fractional CISO experienced with SOC 2 can run the readiness assessment and prioritize remediation before engaging the auditor.
3. Evidence collection
Evidence collection is where internal effort concentrates. The auditor will request evidence that each control operated effectively during the observation period. Evidence types include:
- Policies and procedures: documented, approved, and communicated to relevant personnel
- Configuration screenshots: MFA settings, encryption configurations, access control lists, firewall rules
- Process artifacts: access review records, change management tickets, incident response logs, vendor assessment records
- System-generated evidence: audit logs, monitoring dashboards, alert records, vulnerability scan reports
- People evidence: training completion records, background check confirmations, security awareness test results
GRC platforms automate much of this by integrating with cloud providers, identity providers, ticketing systems, and HR platforms to collect evidence continuously. Without automation, evidence collection for a Type II audit typically requires 100 to 200 hours of internal effort.
4. Auditor selection
SOC 2 reports must be issued by a licensed CPA firm. Not all CPA firms are equal in SOC 2 experience. Factors that matter:
- SOC 2 volume: firms that issue hundreds of SOC 2 reports per year have more efficient processes and more consistent quality than firms that issue a handful
- Industry experience: an auditor familiar with SaaS architecture will be more efficient than one whose primary practice is financial services SOX audits
- Report credibility: Big Four and established mid-tier firms carry more weight with enterprise customers, but cost significantly more
- Communication style: the auditor will interact with your team throughout the observation period — responsiveness and clear communication matter
- Conflict check: if the same firm performed your readiness assessment, confirm that separate teams handle readiness and audit (independence requirements)
5. Audit timeline
A typical SOC 2 engagement follows this timeline:
- Readiness assessment: 2 to 4 weeks (optional, recommended for first-time audits)
- Gap remediation: 4 to 12 weeks depending on maturity
- Type I audit: 4 to 8 weeks from engagement to report issuance
- Type II observation period: 3 to 12 months (6 months is common for first reports)
- Type II audit fieldwork: 4 to 8 weeks after the observation period closes
- Report issuance: 2 to 4 weeks after fieldwork completes
Common findings and remediation
Certain control deficiencies appear in SOC 2 reports with disproportionate frequency. Addressing these during the readiness phase — before the observation period begins — prevents exceptions that could have been avoided.
Access control deficiencies
Access control exceptions are the most common SOC 2 finding. Typical deficiencies include:
- Incomplete access reviews: quarterly access reviews were not conducted for all in-scope systems, or reviews were conducted but no evidence of remediation for inappropriate access was documented
- Delayed offboarding: access was not revoked within the policy-defined timeframe after employee termination — the auditor checks termination dates against access revocation timestamps
- Missing MFA: multi-factor authentication was not enforced on all production systems or cloud consoles, or exceptions existed without documented compensating controls
- Overprivileged accounts: users had administrative access without business justification, or service accounts had broader permissions than required
Remediation: implement automated access reviews through your identity provider, integrate offboarding with HR systems to trigger immediate access revocation, enforce MFA at the identity-provider level (not application-by-application), and conduct a privileged access audit before the observation period begins.
Change management gaps
Change management exceptions typically involve:
- Changes deployed to production without documented approval
- Emergency changes without post-change review documentation
- Developers with direct production access who can bypass the change management process
- Configuration changes (infrastructure, firewall rules, IAM policies) not tracked through the same process as code changes
Remediation: enforce branch protection rules that require peer review before merge, implement infrastructure-as-code so infrastructure changes go through the same review process as application code, restrict direct production access, and configure audit trails for all configuration changes.
Monitoring and incident response gaps
- Security monitoring exists but alerts are not investigated within defined SLAs
- Incidents are resolved but not documented in a way that meets audit evidence requirements
- The incident response plan exists on paper but has not been tested through tabletop exercises
- Log retention is shorter than the observation period, leaving gaps in audit evidence
Remediation: define investigation SLAs for each alert severity, use a ticketing system for all incidents (even false positives — auditors want to see the triage process), test the IRP at least annually, and configure log retention to exceed the audit observation period.
Risk assessment deficiencies
- No formal risk assessment has been conducted, or the most recent assessment is older than 12 months
- The risk assessment exists but does not cover all in-scope systems
- Risk treatment plans are documented but not tracked to completion
- Risk acceptance decisions lack documented rationale and appropriate sign-off
Remediation: conduct a formal security risk assessment before the observation period begins, ensure it covers all systems in the SOC 2 scope, track treatment plans in a project management system with owner and deadline, and document risk acceptance decisions with executive sign-off.
Vendor management gaps
- Critical vendors are not inventoried or classified by risk
- Vendor security assessments have not been conducted or are outdated
- Contracts with data-processing vendors lack security requirements and breach notification clauses
- Vendor SOC 2 reports are not collected or reviewed
Remediation: build a vendor inventory with risk classification, conduct security assessments for all vendors that access customer data, update contracts to include security requirements and data processing addenda, and establish an annual vendor review cadence.
Cost and timeline expectations
SOC 2 costs vary significantly based on organizational maturity, scope, and whether the organization builds the program internally or engages external support. The following benchmarks reflect typical ranges for growth-stage technology companies.
Direct costs
- GRC platform: $10,000 to $50,000 per year (Vanta, Drata, Secureframe, Sprinto — pricing varies by company size and feature tier)
- Readiness assessment: $5,000 to $15,000 if performed by the CPA firm or an external consultant
- Type I audit fees: $15,000 to $40,000
- Type II audit fees: $25,000 to $80,000 (higher for multiple trust service criteria, complex systems, or Big Four firms)
- Penetration testing: $10,000 to $30,000 (not required by SOC 2 but commonly included as supporting evidence and expected by customers)
- External consulting: $150 to $350 per hour if engaging a fractional CISO or compliance consultant to build the program
Internal costs
Internal effort is the largest cost component and the most commonly underestimated. For a first SOC 2 engagement:
- Policy development: 40 to 80 hours if starting from scratch; 10 to 20 hours if adapting templates
- Control implementation: 80 to 200 hours depending on existing maturity (MFA deployment, access review processes, change management formalization)
- Evidence collection and organization: 60 to 150 hours for Type II (ongoing throughout the observation period)
- Audit coordination: 20 to 40 hours of engineering, security, and IT time responding to auditor requests
Total first-year investment
For a growth-stage SaaS company (50 to 300 employees) pursuing SOC 2 Type II with Security and Availability criteria:
- Low end (mature controls, minimal gaps): $50,000 to $75,000 total (GRC platform + audit fees + internal time)
- Mid range (some controls exist, moderate gaps): $75,000 to $120,000
- High end (limited controls, significant build-out needed): $120,000 to $200,000+
Subsequent years are less expensive — the control framework is established, policies need only updating (not writing), and evidence collection is largely automated. Renewal-year costs typically run 40 to 60 percent of the first-year investment.
Maintaining compliance year-over-year
SOC 2 compliance is not a one-time project. The observation period for each Type II report must follow continuously from the previous one — any gap in coverage raises questions from customers and prospects. Maintaining compliance requires operational discipline across several dimensions.
Continuous monitoring
Policy maintenance
Audit preparation
Organizational integration
The most common reason SOC 2 compliance degrades is that it operates as a standalone compliance project rather than an integrated part of how the organization operates. Controls that are embedded in daily workflows — code review before merge, MFA on every login, automated access provisioning through HR systems — sustain themselves. Controls that require manual effort outside normal workflows — quarterly spreadsheet reviews, manual screenshot collection, after-the-fact documentation — degrade between audit cycles.
The long-term goal is compliance as a byproduct of good engineering and security practices, not compliance as a separate workstream. Organizations that achieve this spend less time on audit preparation, produce cleaner reports, and maintain continuous coverage with less internal friction.
Need help building your SOC 2 program?
vCSO.ai helps growth-stage companies build SOC 2 programs that pass audit and integrate with how engineering teams actually work — not compliance theater that falls apart between observation periods. Nick Shevelyov, former Chief Security Officer at Silicon Valley Bank, brings the same control framework discipline used at a $70B financial institution, scaled to fit the pace and resource constraints of growth-stage companies.
Request a consultation to scope your SOC 2 readiness, or explore our Strategic Oversight service — where SOC 2 preparation is one component of an ongoing cybersecurity governance program that includes risk assessment, compliance management, and board-level reporting.
Nick's book on cybersecurity strategy, Cyber War...and Peace, covers the operational security frameworks — including audit readiness, risk assessment, and governance structures — that turn compliance from a periodic project into a continuous organizational discipline.
Questions & answers
What is the difference between SOC 2 Type I and Type II?
How long does it take to get SOC 2 certified?
How much does a SOC 2 audit cost?
Which SOC 2 trust service criteria should we include?
Do startups need SOC 2 compliance?
What happens if you fail a SOC 2 audit?
Can you do SOC 2 without a GRC platform?
How often do you need to renew SOC 2?
Ready to turn this into a working plan?
Nick's team helps growth-stage companies, PE/VC sponsors, and cybersecurity product teams translate security questions into board-ready decisions. First call is strategy, not vendor pitch.