SOC 2 requirements: A complete guide to Trust Services Criteria and Audit Controls

This guide explains what SOC 2 requirements really mean, what evidence auditors look for, and how to build a program that supports both audit readiness and long-term trust.

framework_SOC2_pillar_en

Introduction

Enterprise buyers want more than broad security claims. They want structured assurance that your controls are designed thoughtfully, documented clearly, and operating in a reliable way. That is why many teams begin researching SOC 2 requirements as soon as customer due diligence, security questionnaires, or procurement reviews become more demanding.  

The challenge is that many first-time teams expect a fixed checklist they can work through once. In practice, SOC 2 requirements work differently. Auditors evaluate your environment against defined criteria, and your organization designs controls that fit your systems, risks, and commitments.

What are SOC 2 requirements?

How are SOC 2 requirements defined?

SOC 2 requirements are defined through the Trust Services Criteria developed by the American Institute of Certified Public Accountants, or AICPA. These criteria give independent auditors a framework for assessing whether a service organization has designed and, in a Type II audit, operated controls that support security, availability, processing integrity, confidentiality, and privacy.  

This point is important because it's easy to oversimplify SOC 2 requirements into a universal control list. In reality, the framework is more flexible than that. It gives auditors consistent criteria, but it allows each company to design controls that fit its systems, risks, and customer commitments. That is one reason SOC 2 is widely used across SaaS businesses, cloud providers, managed services, and other organizations that handle customer data as part of their core service.

This flexible structure is one reason SOC 2 requirements matter so much in modern B2B buying. Instead of telling every company to use the same exact tools, SOC 2 asks whether your internal controls protect systems and data in a way that matches the commitments you make.

What are the five SOC 2 Trust Services Criteria?

The Trust Services Criteria are the foundation of every SOC 2 audit. They include:

  • Security
  • Availability
  • Processing Integrity
  • Confidentiality
  • Privacy

Security is always required. The other four are selected based on what your organization does, what your contracts promise, and what risks matter most for your systems and customers.

This is why choosing scope is one of the most important early decisions in any SOC 2 project. If you choose criteria that don’t match your actual service commitments, the report may add effort without adding much value.

If you scope too narrowly, enterprise buyers may still ask follow-up questions.

What is the Security criterion?

The Security criterion, often called the Common Criteria, is the mandatory foundation of every SOC 2 report. It focuses on whether your systems and information are protected against unauthorized access, unauthorized disclosure, and damage that could compromise service delivery or customer trust. Because Security is broad, it usually touches nearly every part of your control environment—from governance and risk assessment to technical safeguards and operational oversight like these:

  • Logical access controls that limit access to authorized users
  • Risk assessment processes that identify and prioritize threats
  • System monitoring to detect unusual activity and control failures
  • Incident response procedures to contain and remediate events
  • Change management practices that reduce the risk of unapproved or insecure changes

What is the Availability criterion?

The Availability criterion evaluates whether your systems remain available for operation and use as committed or agreed. This doesn’t mean perfection or guaranteed uptime at all costs. It means you have controls that support reliability, resilience, and recovery in line with the expectations you set for customers.

Availability often matters when your service depends on uptime commitments, service-level expectations, and the ability to recover from outages without significant disruption.

What is the Processing Integrity criterion?

The Processing Integrity criterion focuses on whether systems process data in a complete, valid, accurate, timely, and authorized way.

This criterion is especially relevant when customers depend on your platform to handle transactions, calculations, workflow automation, or other critical processing activities. Strong controls in this area help prevent silent failures, incorrect outputs, and inconsistent handling of exceptions. What auditors look like can include:

  • Accurate and complete data processing
  • Error handling and exception management
  • Quality assurance controls that support consistent output

What is the Confidentiality criterion?

The Confidentiality criterion addresses how your organization protects information marked as confidential. That can include customer records, proprietary business information, internal product details, contract data, or other sensitive information that is not intended for broad disclosure.  

The key question is whether you identify confidential information clearly and apply controls that match its sensitivity. Consider the following examples:

  • Data classification standards
  • Encryption for data at rest and in transit where appropriate
  • Access restrictions based on business need

What is the Privacy criterion?

The Privacy criterion focuses on personal data and whether it’s collected, used, retained, disclosed, and disposed of in line with your commitments and applicable criteria.

It often requires more program maturity because privacy controls extend beyond core security and into notice, choice, consent, retention, and data subject rights handling. If your organization processes personal data at scale or makes explicit privacy commitments to customers, this criterion can be highly relevant.

Which SOC 2 requirements are mandatory?

Is Security always required?

The Security criterion is always required in a SOC 2 audit. It is the baseline set of common criteria that supports the broader framework and gives auditors a core structure for evaluating your control environment. Even if you don’t include Availability, Processing Integrity, Confidentiality, or Privacy, your report will still need to address Security in depth. This is why many organizations begin with a security-focused scope for their first audit and expand later as customer expectations evolve.

How do companies choose additional criteria?

Companies usually choose additional Trust Services Criteria based on three factors: customer expectations, contractual obligations, and data sensitivity.

For example:

  • A platform with strict uptime commitments may include Availability
  • A system that processes confidential business information may include Confidentiality
  • A company that handles personal data with specific privacy commitments may include Privacy

The right scope should reflect how your service works and what assurance your buyers actually need.

What controls are typically required for SOC 2 compliance?

Because SOC 2 requirements are criteria-based, auditors don’t expect one identical control set from every company. Still, certain control categories appear in most successful audits.

These controls usually combine written policies, technical enforcement, recurring reviews, and documented evidence. The exact implementation will vary, but the themes are consistent across most modern service organizations. If you're trying to understand SOC 2 requirements in practical terms, this is often the most useful way to think about them: not as a single checklist, but as a set of repeatable control areas that need clear ownership and reliable evidence.

What governance controls are required?

Governance controls give structure to your SOC 2 program. They show that management defines expectations, assigns ownership, reviews risk, and maintains oversight. Auditors often look for:

  • Documented policies
  • Periodic risk assessments
  • Clearly defined control owners
  • Evidence that leadership reviews security and compliance issues

Strong governance matters because technical controls alone are rarely enough. Without accountability and direction, control execution tends to become inconsistent over time.

What access control measures are required?

Access control is one of the most visible parts of SOC 2 because it directly affects who can reach systems and data. Common measures include:

  • Role-based access 
  • Multi-factor authentication
  • Formal user provisioning and deprovisioning
  • Regular access reviews

Auditors want to see more than policy language. They also want evidence that access is granted based on business need, revoked promptly when roles change, and reviewed at defined intervals to prevent privilege creep.

What monitoring controls are required?

Monitoring controls help you detect issues before they become bigger failures. In a SOC 2 context, this often includes logging, alerting, vulnerability scanning, and security monitoring activities tied to defined response processes.

Monitoring doesn't need to be fully automated on day one, but it should be consistent enough to identify suspicious activity, control breakdowns, and changes in risk. A strong program also documents what gets reviewed, how often, and who responds when something needs attention.

What vendor management controls are required?

Third-party risk is part of SOC 2 because vendors can affect your security posture directly. Common vendor management controls include:

  • Due diligence before onboarding
  • Risk assessments for critical providers
  • Contract reviews
  • Supporting documentation such as Data Processing Agreements where relevant

Auditors typically expect organizations to identify which vendors matter most, understand the risks they introduce, and review them on a recurring basis instead oftreating vendor oversight as a one-time task.

What incident response controls are required?

Incident response controls show that your team can recognize, escalate, contain, and learn from security events. Auditors usually expect:

  • A documented response plan
  • Clear escalation procedures
  • Defined responsibilities
  • Records of investigations or post-incident review

Mature programs also include root cause analysis and follow-up actions so the same issue doesn't repeat. Even if you haven’t experienced a major incident, you still need a process and some evidence that the it is understood and maintained.

11_icta_top

Strengthen your information security posture


From building an ISMS to risk management and employee training, DataGuard helps you secure what matters most.

What documentation is required for SOC 2?

Documentation is where many SOC 2 projects slow down. Teams may have solid practices in place, but if those aren't written down and supported by evidence, auditors can't rely on them.

Good documentation explains what your controls are, who owns them, how often they run, and how you prove they work. It also creates internal consistency. When policies, review records, and evidence live in different places, audit readiness becomes harder, control gaps stay hidden longer, and internal teams spend more time chasing information than improving controls.

The more clearly you document your program, the easier it becomes to support the audit and maintain consistency after it ends.

What policies must be documented?

Most organizations preparing for SOC 2 need a core set of documented policies that describe how they manage security and operational risk. Common examples include an:

  • Information security policy
  • Access control policy
  • Incident response policy
  • Vendor management policy
  • Change management policy 

Depending on scope, you may also need policies for backup, business continuity, privacy, asset management, secure development, and acceptable use.

The key is not to create overly complex documents. Policies should be clear, realistic, and aligned with how your team actually works.

What evidence do auditors expect?

Auditors typically expect evidence that shows controls exist and, for Type II, that they operated during the review period. That often includes:

Evidence should be organized, dated, and easy to trace back to the control it supports. When teams store materials across inboxes, chat threads, and personal folders, audit readiness becomes much harder than it needs to be.  

A more centralized approach to evidence collection can help teams stay organized as audit demands grow. It also makes it easier to maintain consistent records across controls, owners, and review cycles. DataGuard’s platform does just that.

How do SOC 2 Type I and Type II requirements differ?

SOC 2 Type I and Type II use the same Trust Services Criteria, but they answer different questions.

  • Type I looks at whether your controls are suitably designed at a specific point in time
  • Type II goes further and tests whether those controls operated effectively over a defined review period

That distinction affects preparation time, evidence collection, and how much assurance the report provides to customers. For many growing companies, the decision is strategic. A Type I report can provide an earlier trust signal when a deal needs momentum. A Type II report usually carries more weight because it shows your controls worked consistently over time.

What is required for Type I?

For a Type I report, your controls must be designed appropriately as of a specific date. That means the required policies, procedures, and technical measures need to be in place and mapped to the selected criteria. You also need documentation that explains your system and supports management’s assertion.

What is required for Type II?

For a Type II report, auditors test whether controls operated effectively over time, often across a period of three to 12 months depending on the engagement.

That means you need repeated evidence, ongoing monitoring, and consistent execution—not just strong design.

Type II usually carries more weight with enterprise buyers because it shows that your controls work in practice, not only on paper. It also demands more discipline from internal teams because exceptions and gaps are harder to explain once a longer observation period begins.

How long does it take to meet SOC 2 requirements?

Preparation time varies widely, but most organizations should expect a timeline of several months rather than several weeks. The biggest variables are:

  • Your current security maturity

  • The complexity of your infrastructure
  • The number of employees and systems in scope
  • Whether you’re aiming for Type I or Type II

Teams with strong existing controls and centralized documentation may be ready for Type I in a shorter window. Teams that are still formalizing policies, ownership, and evidence processes usually need more time before they’re audit-ready.

A useful rule of thumb is this: the less structured your current governance is, the more time you will need to translate good intentions into repeatable, auditable controls.

What influences preparation time?

A smaller SaaS company with existing identity management, formal onboarding and offboarding, basic monitoring, and documented policies may prepare for a Type I audit in roughly two to four months.

A larger organization with multiple environments, custom infrastructure, immature vendor management, or missing documentation may need six months or more.

Type II adds the observation period on top of readiness work, so the overall path is often longer. In practical terms, many teams treat SOC 2 as a staged journey: first establish strong design, then demonstrate steady operation over time.

What are common mistakes when addressing SOC 2 requirements?

One of the most common mistakes when addressing SOC 2 requirements is treating the framework like a static checklist.

When teams focus only on passing an audit instead of building repeatable controls, weaknesses surface quickly.

Other frequent issues include:

  • Weak documentation

  • Inconsistent access reviews
  • Limited vendor oversight
  • A lack of executive involvement

These gaps can lead to longer evidence requests, more remediation work, lower confidence from customers, and a program that becomes harder to maintain after the first report.

In some cases, the audit may still move forward, but the process becomes far more expensive and disruptive than it needs to be. The strongest teams avoid this by building simple controls that can operate reliably month after month.

How do SOC 2 requirements compare to ISO 27001?

What overlaps exist?

SOC 2 and ISO 27001 overlap in many practical areas. Both emphasize risk management, access controls, monitoring, incident management, policy governance, and continuous improvement.

Organizations with a mature ISO 27001 program often find that many of the building blocks needed for SOC 2 are already in place, especially around documented controls, internal accountability, and audit preparation. That overlap can reduce effort when teams map one framework to the other.

What are the differences?

The biggest difference is the output.

They also differ in governance model and scope structure. SOC 2 is often shaped closely around customer assurance needs for service organizations, while ISO 27001 provides a broader management-system model with international recognition. Many growing companies pursue both over time because they support different trust and procurement goals.

PILLAR_DE_ISO27001_Popup_image cta_COM

Get ISO 27001 certified in as little as 3 months.


Reduce manual work by up to 75%

How do SOC 2 requirements align with GDPR?

Where do controls overlap?

SOC 2 and GDPR overlap in several operational areas, especially security measures, vendor management, and incident response. If your organization already maintains strong access controls, tracks third-party risk, and has a process for handling security events, that work can support both frameworks.

Privacy-focused controls such as retention practices and data handling procedures can also create useful alignment, especially when personal data is central to your service.

Where do they differ?

GDPR is a legal regulation, while SOC 2 is an assurance framework. That difference matters.

  • GDPR defines legal obligations around personal data, individual rights, and lawful processing
  • SOC 2 helps you demonstrate that relevant controls exist and operate effectively, but it doesn’t replace legal compliance

For many organizations, SOC 2 strengthens trust and control maturity, while GDPR shapes the legal requirements that those controls must support.

What does mature SOC 2 control governance look like?

Mature SOC 2 control governance is centralized, visible, and repeatable. Instead of managing controls in disconnected spreadsheets and inboxes, mature teams use a central compliance platform or structured repository to manage policies, risks, controls, evidence, and ownership.

They automate evidence collection where possible, monitor control performance in real time, and give leadership dashboards that show readiness, gaps, and trends.

The strongest programs also align SOC 2 with other frameworks so teams can reduce duplication and scale governance more efficiently over time. This is also where purpose-built platforms can add real value. With DataGuard, teams can make that approach a reality faster.

SOC 2 requirements checklist

  1. Select the Trust Services Criteria that match your service and customer commitments
  2. Document core security and operational policies
  3. Conduct and document a risk assessment
  4. Implement access controls, including role-based access and multi-factor authentication
  5. Establish a vendor management program for critical third parties 
  6. Document and test your incident response plan
  7. Collect monitoring evidence, review logs, and track remediation
  8. Assign clear ownership for every control and review task

Final thoughts: Meeting SOC 2 requirements as a strategic investment

Meeting SOC 2 requirements is a strategic investment in trust, operational discipline, and long-term resilience.

A well-run SOC 2 program can strengthen your enterprise credibility, reduce friction in sales cycles, improve internal accountability, and lower risk across your environment.

When you build controls that are realistic, documented, and consistently operated, the audit becomes a reflection of genuine maturity—not a temporary compliance scramble.

For growing companies, that is where the real value of SOC 2 starts to show. And as the program matures, centralized governance, automated evidence collection, and clearer ownership can turn SOC 2 from a one-time project into a lasting trust advantage. 

Frequently asked questions

Are SOC 2 requirements mandatory by law?

Can startups meet SOC 2 requirements?

How often are controls tested?

Who defines SOC 2 requirements?

Do SOC 2 requirements change over time?

🏢 Organization Schema Preview (Development Only)
{
  "@context": "https://schema.org",
  "@graph": [
    {
      "@type": "Organization",
      "@id": "www.dataguard.com#organization",
      "name": "DataGuard",
      "legalName": "DataCo GmbH",
      "description": "DataGuard, the European leader in security and compliance software, is trusted by more than 4,000 organizations across 50+ countries. We help you identify and manage your security and compliance risks and fast-track your certifications and compliance by combining expert consultancy with AI-powered automation. Our purpose-built, all-in-one platform is developed with the experience of over 1.5 million total hours by a team of certified security and compliance experts.",
      "foundingDate": "2018",
      "taxID": "DE315880213",
      "logo": "https://7759810.fs1.hubspotusercontent-na1.net/hubfs/7759810/DataGuardLogo.svg",
      "url": "www.dataguard.com",
      "email": "info@dataguard.de",
      "telephone": "+49 89 452459 900",
      "address": {
        "@type": "PostalAddress",
        "streetAddress": "Sandstrasse 33",
        "addressLocality": "Munich",
        "addressRegion": "Bavaria",
        "postalCode": "80335",
        "addressCountry": "Germany"
      },
      "sameAs": [
        "https://www.linkedin.com/company/dataguard1/",
        "https://www.youtube.com/channel/UCEQzPZ6sCBCj9cAoBvaLL6w",
        "https://x.com/i/flow/login?redirect_after_login=%2FDataGuard_dg"
      ]
    }
  ]
}

✅ Organization schema markup for "DataGuard" has been injected into the document head.