What are the five SOC 2 Trust Services Criteria?
The Trust Services Criteria are the foundation of every SOC 2 audit. They include:
- Security
- Availability
- Processing Integrity
- Confidentiality
- Privacy
Security is always required. The other four are selected based on what your organization does, what your contracts promise, and what risks matter most for your systems and customers.
This is why choosing scope is one of the most important early decisions in any SOC 2 project. If you choose criteria that don’t match your actual service commitments, the report may add effort without adding much value.
If you scope too narrowly, enterprise buyers may still ask follow-up questions.
What is the Security criterion?
The Security criterion, often called the Common Criteria, is the mandatory foundation of every SOC 2 report. It focuses on whether your systems and information are protected against unauthorized access, unauthorized disclosure, and damage that could compromise service delivery or customer trust. Because Security is broad, it usually touches nearly every part of your control environment—from governance and risk assessment to technical safeguards and operational oversight like these:
- Logical access controls that limit access to authorized users
- Risk assessment processes that identify and prioritize threats
- System monitoring to detect unusual activity and control failures
- Incident response procedures to contain and remediate events
- Change management practices that reduce the risk of unapproved or insecure changes
What is the Availability criterion?
The Availability criterion evaluates whether your systems remain available for operation and use as committed or agreed. This doesn’t mean perfection or guaranteed uptime at all costs. It means you have controls that support reliability, resilience, and recovery in line with the expectations you set for customers.
Availability often matters when your service depends on uptime commitments, service-level expectations, and the ability to recover from outages without significant disruption.
What is the Processing Integrity criterion?
The Processing Integrity criterion focuses on whether systems process data in a complete, valid, accurate, timely, and authorized way.
This criterion is especially relevant when customers depend on your platform to handle transactions, calculations, workflow automation, or other critical processing activities. Strong controls in this area help prevent silent failures, incorrect outputs, and inconsistent handling of exceptions. What auditors look like can include:
- Accurate and complete data processing
- Error handling and exception management
- Quality assurance controls that support consistent output
What is the Confidentiality criterion?
The Confidentiality criterion addresses how your organization protects information marked as confidential. That can include customer records, proprietary business information, internal product details, contract data, or other sensitive information that is not intended for broad disclosure.
The key question is whether you identify confidential information clearly and apply controls that match its sensitivity. Consider the following examples:
- Data classification standards
- Encryption for data at rest and in transit where appropriate
- Access restrictions based on business need
What is the Privacy criterion?
The Privacy criterion focuses on personal data and whether it’s collected, used, retained, disclosed, and disposed of in line with your commitments and applicable criteria.
It often requires more program maturity because privacy controls extend beyond core security and into notice, choice, consent, retention, and data subject rights handling. If your organization processes personal data at scale or makes explicit privacy commitments to customers, this criterion can be highly relevant.