HOW-TO GUIDE | COMPLIANCE
Active Threat11 min read

SOC 2 Type 2 Compliance: A Practitioner's Guide

89%
Of enterprise buyers require SOC 2 Type 2 before signing SaaS contracts
6–12 mo
Minimum observation period for a Type 2 report
$30–50K
Typical audit cost for a mid-size SaaS company with a single auditor
64
Points of focus across the five Trust Service Criteria categories

SOC 2 Type 2 is the de facto compliance requirement for B2B SaaS companies. A prospect's security review team will ask for it before signing. Enterprise procurement teams will block vendor onboarding without it. Getting it wrong — either by over-scoping and building unnecessary controls, or under-scoping and failing audit — wastes months and hundreds of thousands of dollars.

This guide is written for security engineers, compliance leads, and CTOs who need to understand what a SOC 2 Type 2 audit actually requires, how to scope an engagement that passes without excessive overhead, and what evidence collection looks like in practice across the 12-month observation window.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

Scoping: The Decision That Determines Everything

SOC 2 scope defines which systems, services, and Trust Service Criteria (TSC) your audit covers. Getting scope wrong is the single most expensive mistake in SOC 2 preparation.

The five Trust Service Criteria are: Security (CC — Common Criteria, required for all SOC 2 reports), Availability (A), Processing Integrity (PI), Confidentiality (C), and Privacy (P). Security is mandatory. The others are optional and should be included only if customers are contractually requiring them or if you process data types that make them directly relevant.

For most SaaS companies completing their first SOC 2: Security only. Adding Availability adds roughly 25% to audit scope and requires demonstrating uptime SLAs, redundancy architecture, and capacity management controls. Adding Privacy requires demonstrating GDPR/CCPA-aligned data handling across your entire data processing pipeline. These additions are appropriate if your customer base specifically requires them — not as a default.

System scope defines which infrastructure components are in scope for the audit. The correct approach: scope the systems that directly deliver the service you are selling, process customer data, and support the security controls you are asserting. Do not scope internal tooling, development laptops, or test environments unless they have direct access to production customer data. A tight scope produces a faster, cheaper audit and a more defensible report.

Document your scope in a System Description — the narrative document that opens every SOC 2 report. Auditors use the System Description to set expectations for what controls they will test. A vague System Description leads to scope creep during fieldwork.

Control Design for the Common Criteria

The Common Criteria (CC) contains nine control categories covering organizational governance through logical and physical access. The controls that fail most often in first-time audits fall into four areas.

CC6 — Logical and Physical Access Controls is the category auditors test most rigorously. Required evidence includes: a formal access provisioning and deprovisioning process (with evidence that terminated employees lose access within a defined SLA — typically same business day), MFA enforcement for all production system access, privileged access review documentation (quarterly access reviews with evidence of remediation for any inappropriate access found), and unique account policy enforcement (no shared accounts, no shared credentials).

CC7 — System Operations covers monitoring and anomaly detection. You need a functioning SIEM or log aggregation platform with defined alert logic, evidence of alert review, and documented response to alerts generated during the observation period. 'We have CloudWatch configured' is not sufficient — you need evidence that alerts were reviewed and acted on.

CC8 — Change Management covers your software development and infrastructure change process. Every production change during the observation period should have an associated change record demonstrating: authorization (a second person approved it), testing (it was tested before deployment), and documentation (what changed and why). If your team pushes directly to production without a documented approval process, this control will fail.

CC9 — Risk Mitigation covers vendor management. You need a vendor inventory listing every third party with access to customer data, evidence of security review for each (SOC 2 reports, security questionnaire responses, or equivalent), and a process for monitoring vendor security posture changes.

Evidence Collection During the Observation Period

Type 2 audits cover an observation period — typically 6 to 12 months — during which your controls must operate consistently. The auditor tests whether your controls actually functioned as described throughout the period, not just at a point in time.

Start evidence collection on day one of the observation period, not when audit fieldwork begins. Common evidence failures: access review documentation that begins two months before the audit rather than at the start of the observation period; change management records that are complete for the last quarter but sparse for the first three quarters; security training completion records that show 100% completion in the week before the audit started.

Build evidence collection into operational workflows rather than treating it as a separate compliance activity. Access reviews should generate artifacts automatically (export from your IdP showing users and access levels, signed-off by the reviewer). Change management should generate artifacts automatically (pull request approvals, deployment records from CI/CD). Vulnerability management should generate automated scan reports rather than manual point-in-time exports.

Compliance automation platforms (Vanta, Drata, Secureframe, Tugboat Logic) significantly reduce evidence collection burden by integrating with cloud providers, identity systems, and engineering tools to pull evidence automatically. For a company completing its first SOC 2, the cost of a compliance automation platform ($15,000 to $30,000 annually) is typically less than the engineering time required to manually collect equivalent evidence.

Audit Readiness and Working with Auditors

Auditor selection matters. SOC 2 auditors are licensed CPA firms, but experience with technology companies varies enormously. An auditor who primarily audits manufacturing companies will struggle with cloud-native infrastructure. Request references from technology companies of similar size and architecture before engaging.

Conduct a readiness assessment three to four months before the observation period ends. Engage a third party — your auditor cannot perform the readiness assessment for an engagement they will later audit — to walk through your control evidence and identify gaps before fieldwork begins. Readiness assessment findings with three to four months remaining in the observation period give you time to remediate gaps and generate evidence of remediation before the audit.

During fieldwork, respond to auditor information requests within agreed SLAs (typically 48 to 72 hours per request). Delays in evidence production extend fieldwork timelines and increase audit cost. Assign a single point of contact who coordinates all auditor communications — auditors requesting information from multiple stakeholders produce inconsistent responses and scope creep.

For exceptions — instances where a control failed during the observation period — document the exception, the root cause, and the corrective action taken. Auditors expect some exceptions in a Type 2 report. A report with no exceptions for a 12-month period is more suspicious than one with a few well-documented exceptions and demonstrated remediation.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

SOC 2 Type 2 is a 12-month operational commitment, not a one-time audit event. The companies that pass cleanly are not the ones with the most sophisticated controls — they are the ones with consistently operated controls, clean evidence trails, and access management processes that work reliably throughout the observation period. Over-engineering controls and under-investing in evidence collection is the failure mode. The inverse — simple, consistently operated controls with automated evidence generation — produces a clean report.

Frequently asked questions

What is the difference between SOC 2 Type 1 and Type 2?

SOC 2 Type 1 assesses whether your controls are suitably designed at a specific point in time. SOC 2 Type 2 assesses whether those controls operated effectively over a defined period (typically 6 to 12 months). Type 1 reports are faster to obtain but carry less weight with sophisticated buyers who understand the distinction. Most enterprise security teams specifically require Type 2. Type 1 is useful as a milestone while preparing for a Type 2, or as a temporary measure while building the operational history required for Type 2.

How long does SOC 2 Type 2 take?

The observation period is typically 6 to 12 months. Most companies use a 12-month period for their annual report after the first engagement. The first report often covers a 6-month period to accelerate time to report. Add 2 to 4 months of preparation before the observation period starts, plus 4 to 8 weeks for audit fieldwork and report issuance after the observation period ends. Total elapsed time from starting preparation to receiving the first report: 9 to 18 months.

What does a SOC 2 audit cost?

Audit fees vary by auditor, scope, and company size. For a typical SaaS company scoped to Security criteria only, audit fees range from $25,000 to $60,000 annually. Adding criteria (Availability, Confidentiality, Privacy) increases fees by 20 to 40% per criterion. Compliance automation platforms add $15,000 to $40,000 in annual SaaS cost but reduce internal engineering time significantly. Readiness assessment fees add $10,000 to $20,000 for the first engagement. Total first-year cost including preparation: $50,000 to $120,000 for most mid-size SaaS companies.

Do startups need SOC 2?

Startups selling to enterprise customers need SOC 2 earlier than most founders expect. Enterprise procurement teams routinely block vendor onboarding without a current SOC 2 Type 2 report, and the security review process can delay a significant contract by 6 to 12 months while you complete your first audit. The right time to start SOC 2 preparation is when enterprise deals are in the pipeline — typically Series A to Series B stage for B2B SaaS companies. Starting earlier than needed wastes resources on compliance infrastructure that will evolve as the product and architecture mature.

What is the difference between SOC 2 and ISO 27001?

SOC 2 is an attestation report produced by a CPA firm assessing controls against AICPA's Trust Service Criteria. ISO 27001 is a certification issued by an accredited certification body against the ISO 27001 standard for Information Security Management Systems. SOC 2 is predominantly required by US-based enterprise buyers. ISO 27001 is more widely recognized internationally. Both demonstrate security program maturity, but they use different frameworks and involve different audit processes. Organizations selling internationally often pursue both; for US-focused SaaS companies, SOC 2 Type 2 is the higher-priority credential.

Sources & references

  1. AICPA Trust Services Criteria 2017 (updated 2022)
  2. AICPA SOC 2 Guide
  3. CISA Cybersecurity Best Practices

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.