SOC 2 Type II Audit Preparation Guide: Controls, Evidence, and Timeline
SOC 2 Type II is the security compliance standard that enterprise buyers require before signing SaaS contracts. A Type II report covers a defined period (typically 6 or 12 months) and tells prospective customers that your security controls were not just designed correctly -- they actually operated consistently during the audit period.
Most technology companies start preparation too late (6-8 months before they need the report when 12-18 months is realistic), design controls for the SOC 2 checklist rather than for operational security, and collect evidence inconsistently -- forcing remediation cycles with the auditor that delay the final report.
This guide covers the Trust Service Criteria that matter most, the control design decisions auditors scrutinize, evidence collection that survives audit review, auditor selection, and a realistic readiness timeline.
SOC 2 Type I vs. Type II: What the Difference Means Operationally
Type I: A point-in-time assessment. The auditor evaluates whether your controls are suitably designed and implemented as of a specific date. No observation period -- the auditor reads your documentation and interviews staff to confirm controls exist.
Type II: A period-of-time assessment. The auditor selects samples from across the audit period (typically 6-12 months) and tests whether your controls operated effectively throughout. A Type I report says your controls existed on Day 1. A Type II report says they worked consistently for the entire period.
What enterprise buyers require: Nearly all enterprise procurement processes require Type II. Type I is acceptable as a bridge while you accumulate the Type II observation period, but most legal and vendor risk teams do not accept Type I as a long-term substitute.
The observation period trap: Many companies plan to start their SOC 2 audit when they need the report. A 12-month Type II means your audit period started 12 months ago. If you need the report in Q4 2026, your observation period should have started Q4 2025. Starting preparation in Q4 2026 when you need the report means the earliest you can have a 12-month Type II is Q4 2027.
Practical path: complete a Type I in months 1-6 to give enterprise buyers something immediate, use the same controls to generate the Type II observation period, and deliver the Type II 6-12 months after the Type I.
Trust Service Criteria: What Auditors Actually Test
SOC 2 reports are organized around Trust Service Criteria (TSC) defined by the AICPA. The Security (Common Criteria) category is required for every SOC 2. Others (Availability, Confidentiality, Processing Integrity, Privacy) are additive and selected based on customer requirements.
Common Criteria (CC) categories -- the required foundation
- CC1: Control environment (organizational structure, authority, accountability, code of conduct)
- CC2: Communication and information (internal communication of security policies, external incident notification)
- CC3: Risk assessment (formal risk assessment process, risk identification and response)
- CC4: Monitoring (ongoing monitoring of controls, deficiency identification and remediation)
- CC5: Control activities (control selection and development, vendor management, change management)
- CC6: Logical and physical access controls (this is where most technical controls live: authentication, authorization, access reviews, encryption)
- CC7: System operations (infrastructure monitoring, malware protection, incident response)
- CC8: Change management (SDLC controls, code review, release approval, testing)
- CC9: Risk mitigation (vendor risk management, business continuity)
Where auditors spend most of their time
CC6 and CC7 are the most evidence-intensive categories. CC6 covers: how users are provisioned and deprovisioned, MFA enforcement, access reviews, encryption of data at rest and in transit, network security controls, and physical access to data centers. CC7 covers incident detection, response, vulnerability management, and system monitoring.
Availability criteria (if selected)
Covers uptime commitments, capacity monitoring, and business continuity. Required if you commit to SLAs in your contracts. Auditors will test whether your monitoring, alerting, and DR processes operated as documented throughout the period.
Privacy criteria (if selected)
Covers data subject rights (deletion, access, correction), consent management, and data retention. Required if you handle personal data and represent this in your trust report. Privacy criteria are the most complex to evidence and are often added after the initial Type II.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.
Control Design: What Gets Qualified and What Passes
The most common reason SOC 2 audits result in qualified opinions is not missing controls -- it is controls that are poorly designed or implemented inconsistently. Auditors look for:
Precision in control statements
Weak control: "We review user access regularly."
Audit-ready control: "User access to production systems is reviewed quarterly by each system owner. Access is revoked within 5 business days of an employee termination. Reviews are documented in Jira tickets with approval evidence attached."
The auditor will pull samples of access reviews and verify each element: did the review happen? Was it quarterly? Was revocation within 5 days? Is there documentation? A vague control statement gives the auditor latitude to find anything insufficient.
Controls that auditors scrutinize most
- Access reviews: Must be periodic, documented, and show explicit approval by an owner. Screenshots of a spreadsheet signed off in email are acceptable; verbal reviews with no record are not.
- Background checks: Must occur before access is granted, not after. Document the policy, the vendor used, and maintain evidence (certificate of completion, not the full report) for each new hire.
- Vulnerability management: Must show a defined scan cadence, a defined remediation SLA (Critical: 30 days, etc.), and evidence that findings were remediated within SLA during the audit period. Auditors will sample open findings against their reported open date.
- Change management: Code changes must go through an approval process (pull request approval by a reviewer who is not the author) consistently. A finding of a single production deployment without approval during the audit period is a control failure.
- Incident response: Must show at least one documented incident (or tabletop exercise if no incidents occurred) with evidence that your IR process was followed. Undocumented verbal responses to security events are not auditable.
Control design anti-patterns
- Designing controls you cannot sustain operationally (e.g., daily access reviews when you have 50 systems)
- Using "we" statements without assigned ownership
- Controls that depend on a single person (single points of failure create audit risk)
- Policies that are not actually followed (auditors compare policy to practice)
Evidence Collection: What to Gather and How
Type II audits are evidence-intensive. For a 12-month observation period, auditors will request samples across the period -- typically 5-25 samples per control depending on the control frequency and risk rating.
Control frequency and sample sizes (AICPA guidance)
| Control frequency | Typical sample size |
|---|---|
| Daily (e.g., daily log review) | 15-25 samples |
| Weekly | 5-10 samples |
| Monthly | 3-6 samples |
| Quarterly | 2-4 samples |
| Annual (e.g., annual access review) | All instances |
| Event-driven (e.g., new hire background check) | 5-15 samples from the population |
Evidence types auditors accept
- Screenshots with timestamps and system URL visible in the browser (no cropped images)
- Exported reports from systems (CSV, PDF) with run date and parameters visible
- Jira/ServiceNow tickets with creation date, assignee, resolution date, and approval comments visible
- Email threads showing approval (with full header/timestamp)
- System-generated logs exported with timestamps in UTC
- Policy documents with version date, approval signature, and distribution evidence
Evidence auditors reject
- Screenshots cropped to hide the URL or system name
- Word documents describing what happened (narrative, not evidence)
- Undated screenshots or screenshots with modified file timestamps
- Evidence that cannot be traced to a specific individual ("the team reviewed this")
Building a continuous evidence collection process
Do not collect evidence only at audit time. Build ongoing collection:
- Configure your GRC tool (Drata, Vanta, Secureframe, Tugboat Logic) to automatically pull evidence from your tech stack (AWS Config, Okta access logs, GitHub pull request data, vulnerability scanner reports)
- For manual controls (quarterly access reviews), create recurring calendar events with a templated documentation process
- Keep a centralized evidence repository organized by control, with date ranges labeled
- Assign control ownership so each control has a named person responsible for evidence availability
Auditor Selection and What to Expect
SOC 2 audits can only be performed by licensed CPA firms. The firm must be registered with the AICPA. Quality and cost vary significantly.
Auditor tiers
- Big 4 / Top 10 (Deloitte, PwC, EY, KPMG, RSM, Grant Thornton): Brand credibility is highest; some enterprise customers specifically require Big 4 audit. Cost range: $40,000-$150,000+ for a standard SOC 2 Type II. Timelines are longer due to resource constraints.
- Specialized security audit firms (A-LIGN, Schellman, Coalfire, KirkpatrickPrice, Prescient): Specialize in technology company audits; often faster, more pragmatic, and SaaS-tool-familiar. Cost range: $15,000-$60,000. Often the right choice for first-time auditors.
- Boutique regional CPA firms: Lowest cost ($8,000-$25,000) but variable quality; some have limited technology company experience. Due diligence required.
What to ask auditors before selecting
- How many SOC 2 audits have you completed in the last 12 months?
- What is your experience with companies at our stage and technology stack?
- Who will be the lead auditor assigned to our engagement (seniority matters)?
- What is your evidence request process? Do you use a portal or email?
- What does your remediation observation period look like if we have exceptions?
- Do you offer a readiness assessment before the formal audit?
The readiness assessment
Most firms offer a paid readiness assessment before the formal audit: a pre-audit review of your controls and documentation. This is strongly recommended for first-time audits -- it surfaces gaps before they become audit findings, not after. Cost: $3,000-$15,000 depending on firm. Pay it. The return on investment vs. a qualified opinion is significant.
Audit timeline expectations
- Kickoff and evidence request: 2-4 weeks
- Evidence collection and submission: 4-8 weeks (the longest phase for most companies)
- Auditor fieldwork (testing): 4-6 weeks
- Draft report review: 2-3 weeks
- Management response to exceptions: 1-2 weeks
- Final report issuance: 1-2 weeks
Total: 14-25 weeks from engagement start to final report. Budget 6 months minimum. First-time audits routinely run longer due to evidence collection gaps.
12-Month SOC 2 Type II Readiness Timeline
Months 1-2: Foundation
- Conduct a gap assessment against the Common Criteria (use the AICPA trust services criteria document as the baseline)
- Assign control owners for each control area
- Select a GRC tool for evidence collection automation (Drata, Vanta, Secureframe, or Tugboat Logic)
- Begin writing or updating security policies (acceptable use, access control, incident response, change management, vendor management)
Months 3-4: Control Implementation
- Implement or formalize controls identified as gaps: MFA enforcement, access provisioning/deprovisioning process, quarterly access review cadence, vulnerability scanning with defined SLAs, change management approval process
- Connect your GRC tool to your tech stack for automated evidence collection
- Run your first access review under the new process and document it
- Conduct a tabletop incident response exercise and document it
Months 5-6: Type I Audit (optional but recommended)
- Engage an auditor for a Type I assessment (point-in-time)
- Use this to give enterprise customers an interim trust report while the Type II period accumulates
- Address any Type I findings before they become Type II exceptions
Months 7-10: Observation Period + Ongoing Operations
- Operate controls consistently -- this is the period the Type II will cover
- Run quarterly access reviews on schedule
- Remediate vulnerabilities within defined SLAs and document remediation
- Log all production changes through the change management process
- Conduct and document any security incidents (even minor ones) following the IR process
Months 11-12: Type II Audit
- Engage the auditor and submit to evidence requests
- Respond to exceptions with documented remediation where applicable
- Review the draft report and submit the management response
- Receive and distribute the final report
Ongoing post-audit
- SOC 2 Type II reports are typically valid for 12 months. Plan for annual re-audit
- Use the audit period as a forcing function for continuous control improvement
- Distribute the report under NDA to prospects; consider a summary version for broader sharing
The bottom line
SOC 2 Type II is achievable for any technology company with disciplined preparation -- the failure rate on first attempts comes from starting too late, designing controls for documentation rather than operation, and treating evidence collection as an audit-time task rather than an ongoing process. Start 12-18 months before you need the report, design controls you can actually sustain, automate evidence collection from day one, and use a readiness assessment to surface gaps before they become findings.
Frequently asked questions
How long does it take to get a SOC 2 Type II report?
From preparation start to final report: 12-18 months for most first-time companies. This breaks down as: 2-4 months to design and implement controls, 6-12 months of observation period during which the Type II covers, and 3-6 months for the audit itself (fieldwork, evidence collection, report drafting, management response). Companies that need a report in 6 months should pursue a Type I first, then the Type II follows 6-12 months later.
What is the difference between SOC 2 Type I and Type II?
Type I is a point-in-time assessment that verifies your controls are suitably designed and implemented as of a specific date. Type II covers a defined period (typically 6-12 months) and verifies your controls operated effectively throughout that period. Enterprise buyers almost universally require Type II; Type I is acceptable as an interim while you accumulate the observation period.
Do I need to select all five Trust Service Criteria?
No. Security (Common Criteria) is the only required category. Most first-time SOC 2 reports include Security only, then add Availability in the second year if customers require uptime commitments, and Confidentiality if contractually required. Privacy is the most complex to evidence and is typically added last. Adding criteria increases audit scope and cost; only add what your customers actually require.
How much does a SOC 2 Type II audit cost?
Cost ranges significantly by auditor tier: Big 4 firms run $40,000-$150,000+. Specialized security audit firms (A-LIGN, Schellman, Coalfire, KirkpatrickPrice) run $15,000-$60,000 and are often the right choice for first-time auditors. Boutique regional CPA firms run $8,000-$25,000. In addition to the audit cost, budget for a GRC tool ($10,000-$30,000/year), a readiness assessment ($3,000-$15,000), and internal staff time (often the largest actual cost).
Can a compliance automation tool (Drata, Vanta, Secureframe) replace manual evidence collection?
These tools automate evidence collection for controls that can be tested via API integrations: AWS Config checks, Okta user provisioning logs, GitHub pull request approval data, endpoint MDM compliance status. They cover approximately 60-70% of typical SOC 2 evidence. The remaining 30-40% (quarterly access reviews, background check documentation, vendor risk assessments, tabletop exercise records) still requires manual collection and documentation. These tools significantly reduce the audit burden but do not eliminate it.
What causes a qualified SOC 2 opinion?
A qualified opinion (the audit equivalent of a failing grade) results from: exceptions where a control failed to operate as designed during the audit period (for example, a user was not deprovisioned within the SLA in one or more samples); controls that are too vague to test (auditors cannot find evidence of a control they cannot define); or missing controls for criteria you included in scope. A management letter item is less serious -- it documents a control weakness without qualifying the opinion. Most first-time audits produce at least one management letter item.
Do customers get to see the full SOC 2 report?
SOC 2 reports are typically shared under NDA with prospective and current enterprise customers during procurement. The full report includes your control description, the auditor's testing procedures, any exceptions found, and the auditor's opinion. Many companies share a summary or bridge letter for prospects who do not yet have an NDA in place. The report itself does not need to be public; the existence of a clean opinion is what enterprise procurement teams verify.
Sources & references
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
The Mythos Brief is free.
AI that finds 27-year-old zero-days. What it means for your security program.
