Resources
Compliance guides to help you understand what frameworks require and how to prepare.
What is SOC 2?
SOC 2 (Service Organization Control 2) is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA). It’s designed to ensure service providers securely manage data to protect their organization’s and clients’ interests. SOC 2 is particularly relevant for technology and cloud computing companies that offer online services and store customer data in the cloud.
Trust Services Criteria
- 1Security — Protection against unauthorized access, both physical and logical. Required for every SOC 2 audit.
- 2Availability — System uptime and performance as committed or agreed.
- 3Processing Integrity — System processing is complete, valid, accurate, timely, and authorized.
- 4Confidentiality — Information designated as confidential is protected as committed or agreed.
- 5Privacy — Personal information lifecycle management from collection through disposal.
Types of SOC 2 Reports
- Type I — Evaluates whether your control design is suitable to meet relevant trust principles at a specific point in time.
- Type II — Evaluates the operational effectiveness of those controls over a period of time (typically 6–12 months).
Benefits of SOC 2 Compliance
- Builds trust with enterprise clients and partners
- Improves risk management and security posture
- Provides a competitive advantage in sales cycles
- Streamlines security questionnaire responses
- Demonstrates commitment to data protection
Ready to get SOC 2 compliant?
We take you from current state to audit-ready. Start with a free scoping call.
Learn about our SOC 2 readiness program