SOC 2 is the audit auditors least understand on first contact. It is not a checklist, not a certification, and not a guarantee. It is an examination engagement in which a CPA firm forms an opinion on whether your controls met the Trust Services Criteria you elected, over a period you defined, applied to a system you described.
SOC 2 has no regulator. The pressure comes from your customers' procurement teams. The discipline comes from your CPA firm under SSAE 18 and the AICPA's attestation standards.
SOC 2 is not certified — it is opined upon. There is no "passing" a SOC 2 the way you pass an ISO 27001 certification audit. The CPA firm forms an opinion on whether your controls met the criteria. That opinion can be unqualified (clean), qualified (one or more exceptions), adverse (controls did not meet the criteria), or disclaimed (auditor couldn't gather enough evidence). Most reports are unqualified, but many ship with documented exceptions in Section IV.
Scope is yours to define. You pick the Trust Services Criteria. Security is always required. Availability, Processing Integrity, Confidentiality, and Privacy are elected based on what you commit to your customers. Two SOC 2s for two companies in the same industry can therefore be entirely different reports. This flexibility is a feature for the practitioner and a confusion for the buyer.
The system description is the underrated artifact. Section III of the report describes the system being audited — its boundaries, its components, its data flows, its control environment, the CUECs your customers must implement, and the sub-service organizations you depend on. The auditor's opinion is about the system as you described it. Get the description wrong and the opinion is misleading even if every control passes.
The bridge letter is real and important. Your Type 2 report covers a period that ended (say) Sept 30. It's now January and your customer asks if controls are still operating. The bridge letter — issued by management, not the auditor — attests that no material changes have occurred between Sept 30 and the date of the letter. It is not an audit product, but it is an evidence product. Build the muscle to issue them quickly.
SOC 2 is principles-based, which means flexible — and which means traps. The TSC tells you that "the entity restricts logical access" (CC6.1). It does not tell you how. You design the controls; the auditor evaluates whether they meet the criterion. Two startups can satisfy CC6.1 entirely differently — one with strict role-based access, another with attribute-based. Both can pass. Both can also fail when their evidence doesn't match what the description claims.
Points of Focus are the hidden teeth. Each Common Criterion is accompanied by Points of Focus — illustrative considerations the auditor uses to evaluate whether you've actually met the criterion. The 2022 Revised Points of Focus expanded these meaningfully. They aren't requirements, but if your control doesn't address the relevant Points of Focus, the auditor will ask why. If you can't answer, that's a gap.
The Common Criteria are the floor; the elected categories raise it. Most companies start Security-only. Adding Availability requires real BCM evidence. Adding Confidentiality requires data classification you may not have. Adding Privacy requires privacy notices and consent records that triggers an entirely different program. Add categories deliberately, not aspirationally.
The judgment problem. Unlike SOX's prescribed sample sizes from PCAOB AS 2315, SOC 2 sampling under AICPA AAG-COM is judgment-based. Auditors negotiate. A startup with weak history and lots of exceptions will see larger samples than a mature program with three years of clean Type 2s. Don't take a single firm's "industry standard" as gospel — sample-size discussions are part of every engagement.
CUECs are the chain of trust. The diagram above shows what most SOC 2 teams underestimate: every CUEC you publish becomes a control test in your customer's audit. A vague CUEC ("maintain appropriate security") leaves your customer's auditor with nothing to test, which means your customer cannot rely on your SOC 2 to support their control story. A specific CUEC ("enforce MFA on all admin accounts within 14 days of provisioning") gives them a testable control. The discipline is to write CUECs the way you would want to receive them from a vendor.
Period thinking is foreign to most teams. SOX is point-in-time at year-end. SOC 2 is over a period. A control that operated three months out of six is a Type 2 exception even if it works today. The corollary: if a control was added mid-period, the auditor will only test from its implementation date — and your description must say so explicitly.
The IPE problem applies here too. Reports used as evidence (UAR exports, vulnerability scan results, employee rosters) must be tested for completeness and accuracy. SOC 2 firms vary in how rigorously they test IPE — some are lax, some are PCAOB-strict. Either way, document the source, parameters, and reconciliation for every report.
Automation is a double-edged sword. Vanta, Drata, Secureframe automate evidence collection — wonderful. But auditors increasingly want to see how the automation works (the "control over the control"). If your continuous-monitoring tool flags a deviation and someone clicks "approve" without investigating, that's worse than no automation. The platform doesn't replace the discipline; it surfaces it.
| SOC 2 domain | SOX | ISO 27001:2022 | NIST CSF 2.0 | PCI DSS v4.0.1 | HIPAA | HITRUST v11 | Shared evidence |
|---|---|---|---|---|---|---|---|
| CC1 — Control Environment | ELC · COSO Comp. 1 |
Cl. 5 · A.5.1–A.5.4 |
GV.RR · GV.PO |
Req 12.4 |
§164.308(a)(2) |
00.a · 02.a |
Org chart, code of conduct, board minutes, tone-at-top attestations |
| CC2 — Communication & Info | ELC · COSO Comp. 4 |
A.5.14 · A.6.3 |
GV.OC · PR.AT |
Req 12.6 |
§164.308(a)(5) |
02.e · 02.f |
Training records, intranet posts, customer notifications |
| CC3 — Risk Assessment | ELC · risk assessment memo |
Cl. 6.1 · A.5.7 |
ID.RA · GV.RM |
Req 12.3 |
§164.308(a)(1)(ii)(A) |
03.a · 03.b |
Risk register, threat model, RCSA, fraud-risk assessment |
| CC4 — Monitoring | ELC · COSO Comp. 5 |
Cl. 9.1 · A.8.16 |
DE.CM · ID.IM |
Req 10 · Req 12.10 |
§164.308(a)(1)(ii)(D) |
09.aa · 06.h |
Internal audit reports, mgmt reviews, KRI dashboards |
| CC5 — Control Activities | BPC · ITGCs at large |
A.5.36 |
scattered | Req 1 – Req 12 mapped |
§164.306 |
10.b · 09.h |
Policies, procedures, control-activity matrix |
| CC6.1–6.3 — Logical access | ITGC — Access |
A.5.15 · A.5.16 · A.5.18 · A.8.2 |
PR.AA-01 · PR.AA-05 |
Req 7 · Req 8 |
§164.308(a)(3) · §164.308(a)(4) |
01.b · 01.c · 01.v |
JML tickets, UAR exports, IAM config, MFA enforcement |
| CC6.4–6.5 — Physical access | ITGC — Operations |
A.7.1–A.7.14 |
PR.AA-06 · PR.IR-02 |
Req 9 |
§164.310 |
08.b · 08.j |
Badge logs, CCTV retention, visitor records, asset disposal |
| CC6.6 — Boundary protection | ITGC — Operations |
A.8.20 · A.8.22 |
PR.IR-01 |
Req 1 |
§164.312(e)(1) |
09.m |
Firewall config, network diagram, segmentation tests |
| CC6.7 — Transmission protection | ITGC — Operations |
A.8.24 |
PR.DS-02 |
Req 4 |
§164.312(e)(2)(ii) |
09.s |
TLS scan, cert inventory, VPN config |
| CC6.8 — Malware protection | ITGC — Operations |
A.8.7 |
PR.PS-05 |
Req 5 |
§164.308(a)(5)(ii)(B) |
09.j |
EDR/AV deployment reports, scan logs, IOC alerts |
| CC7 — System operations | ITGC — Operations |
A.8.15 · A.8.16 · A.5.24–28 |
DE.CM · RS.MA |
Req 10 · Req 12.10 |
§164.308(a)(6) |
09.aa · 11.a–c |
SIEM rules, incident tickets, post-incident reviews |
| CC8.1 — Change management | ITGC — Change |
A.8.32 |
PR.PS-06 |
Req 6.5 |
§164.308(a)(8) |
10.h · 09.b |
Change tickets, CAB minutes, PR approvals, deploy logs |
| CC9.1 — BCM | BPC · resilience |
A.5.29 · A.5.30 |
RC.RP |
Req 12.10 |
§164.308(a)(7) |
12.b · 12.c |
BIA, BCP/DR plans, last-test report, RTO/RPO documentation |
| CC9.2 — Vendor management | ITGC + BPC · TPRM |
A.5.19–A.5.23 |
GV.SC |
Req 12.8 · Req 12.9 |
§164.308(b) · BAAs |
05.k |
Vendor inventory, due diligence pkg, contracts, vendor SOC 2s |
| A1 — Availability (elected) | ITGC — Operations |
A.8.6 · A.8.13 · A.8.14 |
RC.RP · PR.IR-04 |
Req 12.10 |
§164.308(a)(7) |
12.b |
Capacity reports, uptime SLAs, DR test evidence |
| C1 — Confidentiality (elected) | ITGC + BPC |
A.5.12 · A.5.13 · A.8.10 |
PR.DS-01 · PR.DS-02 |
Req 3 |
§164.514 |
06.c · 10.f |
Data classification policy, encryption inventory, disposal cert |
| PI1 — Processing Integrity (elected) | ITAC · directly |
A.8.26 |
PR.PS-06 |
— | — | 10.b |
Input validation, output recon, error log review |
| P1–P8 — Privacy (elected) | scope-dependent | A.5.34 · ISO 27701 |
PR.DS-01 · GV.PO |
Req 3 |
HIPAA Privacy Rule | 06.c · 06.f |
Privacy notice, consent records, DSAR log, retention schedule |
SOC 2 has become the GRC industry's lingua franca. Buyers demand it; vendors deliver it; everyone has a vague sense of what it covers. The crosswalk above shows why: SOC 2's Common Criteria map cleanly to almost every other framework's control families. Build SOC 2 right, and you're 60–80% of the way to ISO 27001 and HITRUST.
The trap: SOC 2 is the flexibility champion. The same Common Criterion can be satisfied by very different controls in different programs. ISO 27001's Annex A is more prescriptive; HIPAA Security Rule is more prescriptive; PCI DSS is highly prescriptive. Reusing SOC 2 evidence for ISO 27001 audit works only when your SOC 2 controls happen to address ISO's specific Annex A requirements — which is partially overlapping, never identical.
The shared-evidence column is the unit of work. JML tickets, UAR exports, change tickets, vendor SOC 2s, IAM configs — these artifacts satisfy the access-control control across all seven frameworks simultaneously. The opportunity for GRC engineering is to build the evidence pipeline once and run framework-specific test conclusions against the same data.