What is SOC 2 Compliance?

7 minute read
Beginner

SOC 2 is an audit framework that validates security controls protecting customer data. Learn the difference between Type I and Type II, what the Trust Service Criteria cover, and how to read a report.

The Three Types of SOC 2 Reports

SOC 2 reports come in two types, which are frequently confused.

SOC 2 Type I assesses whether an organization's security controls are suitably designed to meet the applicable Trust Service Criteria at a specific point in time. It answers the question: 'Does this organization have controls in place that, if operated effectively, would protect customer data?' It does not assess whether those controls are actually operating effectively. A Type I report is like assessing whether a fire suppression system is correctly installed — not whether it actually works.

SOC 2 Type II assesses both the design and the operating effectiveness of controls over a defined period, typically 6-12 months. The auditor tests controls throughout the observation period to verify they are operating as designed. A Type II report answers: 'Has this organization's security controls actually operated effectively over the past year?' This is the meaningful report for vendor security evaluation. When organizations request SOC 2 compliance evidence from vendors, they should specify Type II — a Type I report confirms design, not performance.

The Five Trust Service Criteria

SOC 2 is organized around five Trust Service Criteria. Security — also called the Common Criteria — is required for all SOC 2 examinations. Availability, Processing Integrity, Confidentiality, and Privacy are optional criteria that organizations include based on the nature of the services they provide and customer requirements.

The Security criteria cover the controls protecting against unauthorized access — logical and physical access controls, change management, risk management, and incident response. Every SOC 2 report addresses Security. Organizations that provide services where system availability is critical — cloud infrastructure, SaaS applications — typically include Availability. Organizations handling regulated personal data typically include Privacy. Organizations handling confidential business information typically include Confidentiality.

SOC 2 in M&A and Vendor Management

SOC 2 Type II reports are the standard evidence of security control effectiveness in enterprise vendor management. When evaluating a SaaS vendor's security posture, the SOC 2 Type II report provides independent assessment of security controls without requiring the customer to conduct their own audit. Reading the SOC 2 Type II report — not just confirming it exists — requires attention to: the observation period (older reports may not reflect current state), exceptions noted (individual control failures documented during testing), and the scope of systems covered (some reports cover only specific components of the organization's environment).

For PE sponsors, SOC 2 Type II reports are a primary data source in vendor security assessment during due diligence. A target organization that relies on critical SaaS vendors without SOC 2 compliance creates third-party risk that warrants evaluation. A target organization that itself holds SOC 2 Type II certification demonstrates that its security controls have been independently validated — a meaningful positive indicator of security program maturity.

Real-World Example: The Limits of SOC 2 as Security Evidence

In a 2023 Cloudskope due diligence engagement, a target organization presented a current SOC 2 Type II report as evidence of security posture. A review of the report revealed four exceptions — individual control failures noted by the auditor during the observation period. One exception noted that privileged access reviews had not been conducted for 8 months of the 12-month observation period. Another noted that employee access was not revoked within policy-required timeframes for three terminated employees. The report was real, current, and showed a clean overall opinion — but the exceptions told a more nuanced story about access governance maturity. The SOC 2 report provided the starting point for a more detailed investigation, not a clean bill of health.

73%

Of enterprise organizations now require SOC 2 Type II compliance from SaaS vendors handling sensitive data — making it the de facto standard for B2B security assurance and a prerequisite for selling into enterprise markets.

How Cloudskope Can Help

Cloudskope helps organizations prepare for SOC 2 examinations through pre-audit readiness assessments that identify control gaps before the auditor arrives. For organizations evaluating vendors or acquisitions, we review SOC 2 Type II reports as part of our third-party risk assessment — reading past the existence of the report to assess the quality of controls, exceptions noted, and scope of coverage.