Accuracy Disclaimer: This article is for informational purposes only. GRCadia is not a licensed auditor or CPA firm. Organizations pursuing SOC 2 certification should engage an accredited CPA firm. Content reflects the author's professional experience and publicly available guidance from the AICPA.
Last reviewed: April 2026
The Enterprise Deal That Dies in Security Review
You know the moment. The deal is moving. Legal is engaged. Procurement sends over their vendor security questionnaire. And then: "Please provide your SOC 2 Type 2 report."
If you don't have one, the conversation changes. The champion on the other side starts managing expectations. The deal slips a quarter — or dies entirely. According to industry surveys, roughly 80% of enterprise buyers now require SOC 2 Type 2 reports from SaaS vendors before signing. SOC 2 has become the baseline trust signal in B2B software.
I've been on both sides of this conversation — as the CISO asking vendors for their SOC 2 and as the person helping companies get there. After 20 years in cybersecurity and compliance, I can tell you: the companies that struggle with SOC 2 are rarely the ones with bad security. They're the ones who started late, scoped wrong, or couldn't produce the evidence.
This checklist is what I wish someone had given me the first time I helped a SaaS company prepare for SOC 2. Not marketing copy. Not a 10-item summary. The actual list of what you need, organized the way an auditor thinks about it.
What Is SOC 2 and Why Does It Matter in 2026
SOC 2 (System and Organization Controls 2) is an audit framework developed by the AICPA (American Institute of Certified Public Accountants). It evaluates whether a service organization has designed and implemented controls to protect customer data based on five Trust Services Categories.
Unlike ISO 27001 — which is a management system standard you can certify against — SOC 2 is an attestation. A licensed CPA firm examines your controls and issues a report with their opinion. You don't "pass" SOC 2. You receive a report that says your controls are (or aren't) suitably designed and operating effectively.
Type 1 vs Type 2 — The Real Difference
SOC 2 Type 1 evaluates whether your controls are suitably designed at a single point in time. Think of it as a snapshot: "On this date, did the controls exist and were they designed properly?"
SOC 2 Type 2 evaluates whether those controls were designed properly AND operated effectively over a sustained observation period — typically 6 to 12 months. This is what enterprise buyers actually want. A Type 1 tells them you built the controls. A Type 2 tells them you actually run them consistently.
| Aspect | Type 1 | Type 2 |
|---|---|---|
| What it tests | Control design at a point in time | Control design + operating effectiveness over time |
| Observation period | Single date | Minimum 3 months (typically 6–12) |
| Timeline to complete | 3–6 months | 9–12 months (first time) |
| Enterprise acceptance | Sometimes accepted for first audit | The standard most buyers require |
Most SaaS companies start with a Type 1 to demonstrate intent and progress, then move to Type 2 within 12 months. Some companies skip Type 1 entirely if they have the maturity and the timeline to go straight to Type 2.
Why SaaS Companies Can't Avoid It Anymore
SOC 2 has become the de facto security standard for SaaS companies selling to enterprise and mid-market buyers. SOC 2 report issuance increased 23% in 2023 alone, and that growth has continued. The reasons are straightforward:
- Enterprise procurement teams have standardized on SOC 2 as the minimum security assurance requirement
- Cyber insurance underwriters increasingly ask for SOC 2 reports during the application process
- Regulatory pressure — even where SOC 2 isn't legally required, it demonstrates due diligence
- Competitive advantage — when two vendors are equal, the one with a clean SOC 2 report wins
The 5 Trust Services Categories — What Auditors Actually Check
SOC 2 is built on five Trust Services Categories (TSC), defined by the AICPA. The core criteria were established in 2017, with revised points of focus issued in 2022 to address evolving technologies and threats. Security is mandatory. The other four are optional — you choose which ones to include based on your services and what your customers require.
1. Security (Common Criteria) — Required for All SOC 2 Audits
Security is the foundation. Every SOC 2 engagement must include it. The Common Criteria (CC1 through CC9) cover:
- Control environment — governance, organizational structure, accountability
- Communication and information — how security policies are communicated internally and externally
- Risk assessment — identifying, analyzing, and managing risks to your systems
- Monitoring activities — ongoing evaluation of controls
- Control activities — logical and physical access, system operations, change management
- Logical and physical access controls — authentication, authorization, access revocation
- System operations — incident detection, response, and recovery
- Change management — managing changes to infrastructure, software, and procedures
- Risk mitigation — vendor management, business continuity
What auditors want to see: Policies documented and approved. Evidence that access reviews happen regularly. Logs showing MFA is enforced. Change management tickets with approvals. Incident response procedures that have been tested.
2. Availability
Availability criteria evaluate whether your systems are available for operation and use as committed or agreed. This is particularly relevant for SaaS companies with SLAs (Service Level Agreements).
What auditors want to see: Documented SLAs and uptime commitments. Monitoring and alerting configurations. Capacity planning documentation. Disaster recovery plans with test results. Incident records showing how outages were handled.
3. Processing Integrity
Processing integrity evaluates whether system processing is complete, valid, accurate, timely, and authorized. This matters most for companies that process transactions, calculations, or data transformations.
What auditors want to see: Input validation controls. Processing accuracy checks. Error handling and correction procedures. Quality assurance documentation. Data reconciliation processes.
4. Confidentiality
Confidentiality criteria address whether information designated as confidential is protected as committed or agreed. This covers data beyond just personal information — trade secrets, intellectual property, business plans, and any data classified as confidential.
What auditors want to see: Data classification policies. Encryption at rest and in transit. Access controls based on data classification. Data retention and disposal procedures. NDA and confidentiality agreements with third parties.
5. Privacy
Privacy criteria evaluate how personal information is collected, used, retained, disclosed, and disposed of. This category aligns closely with privacy regulations like GDPR and CCPA.
What auditors want to see: Privacy notice published and accurate. Consent mechanisms where required. Data subject access request procedures. Data retention schedules. Third-party data sharing agreements.
The SOC 2 Compliance Checklist 2026
This is the practical checklist — organized by phase and workstream. Use it to track your readiness. Every item below is something an auditor will ask about, request evidence for, or test directly.
Pre-Audit Preparation
- Define your audit scope — which TSC categories will you include? Start with Security (mandatory). Add Availability if you have SLAs. Add others only if customer contracts or your risk profile require them.
- Select a licensed CPA firm — only a licensed CPA firm can issue a SOC 2 report. Get proposals from at least two firms. Ask about their SaaS experience specifically.
- Decide Type 1 or Type 2 — if enterprise customers are asking for SOC 2 now and you have nothing, start with Type 1 to demonstrate progress. Plan for Type 2 within 12 months.
- Set your observation period (Type 2) — the minimum observation period is 3 months, but most auditors recommend 6 months for a first audit and 12 months for subsequent audits.
- Identify your systems in scope — cloud infrastructure, SaaS tools, code repositories, monitoring platforms, HR systems (for access management), and any third-party services that touch customer data.
- Assign a project owner — someone with authority to coordinate across engineering, IT, HR, and legal. This person will be the auditor's primary point of contact.
Security Policies and Documentation
- Information Security Policy — the overarching policy that defines your security programme's objectives, scope, and responsibilities. Must be approved by management and communicated to all employees.
- Access Control Policy — how access to systems, data, and infrastructure is granted, reviewed, and revoked. Must cover the principle of least privilege and role-based access control.
- Encryption Policy — standards for encryption at rest and in transit. Specify algorithms, key management procedures, and which data classifications require encryption.
- Incident Response Plan — documented procedures for detecting, responding to, and recovering from security incidents. Must include roles, escalation paths, communication procedures, and post-incident review.
- Business Continuity Plan — how you maintain operations during disruptions. Must include recovery time objectives (RTO), recovery point objectives (RPO), and be tested at least annually.
- Vendor Management Policy — procedures for assessing and monitoring third-party vendors who access or process customer data. Must include initial assessment, ongoing monitoring, and contractual requirements.
- Change Management Procedure — how changes to production systems are requested, approved, tested, and deployed. Must include segregation of duties where feasible.
- Risk Assessment — completed and documented risk assessment covering threats and vulnerabilities to systems in scope. Must be reviewed and updated at least annually.
- Acceptable Use Policy — expectations for employee use of company systems and data.
Technical Controls
- Multi-factor authentication (MFA) — enabled for all users on all production systems, cloud consoles, code repositories, and administrative tools. MFA bypass for any user should be documented and time-limited.
- Role-based access control (RBAC) — access granted based on job function, following the principle of least privilege. Documented access matrix mapping roles to permissions.
- Encryption at rest and in transit — all customer data encrypted at rest (AES-256 or equivalent) and in transit (TLS 1.2+). Key management procedures documented.
- Vulnerability scanning programme — automated vulnerability scanning running at least monthly against all in-scope systems. Findings triaged, tracked, and remediated on a documented schedule.
- Penetration test completed — external penetration test completed by a qualified third party within the last 12 months. Findings remediated or accepted with documented risk acceptance.
- Logging and monitoring configured — centralized log collection from all in-scope systems. Security-relevant events monitored and alerted. Logs retained for at least 12 months.
- Backup and recovery tested — regular backups of critical systems and data. Backup restoration tested at least annually. Results documented.
- Incident detection tools deployed — intrusion detection, endpoint protection, or SIEM configured and actively monitored. Alert thresholds documented and tuned.
- Network segmentation — production environments isolated from development and corporate networks. Firewall rules documented and reviewed.
- Endpoint security — anti-malware and endpoint detection on all corporate and development devices. Automatic updates enabled.
People and Process Controls
- Security awareness training — all employees complete security awareness training at onboarding and at least annually thereafter. Training records retained.
- Background checks — background checks completed for all employees with access to production systems or customer data, as permitted by local law.
- Onboarding and offboarding procedures — documented procedures for granting access at hire and revoking access at termination. Offboarding must include same-day access revocation for critical systems.
- Access reviews — quarterly reviews of user access to production systems. Reviews documented with approvals from system owners. Excess permissions removed.
Evidence Collection
Controls without evidence are controls that don't exist — at least from an auditor's perspective. Start collecting evidence from day one of your observation period.
- Access review logs — quarterly access reviews with timestamps, reviewer names, and actions taken (confirmed, modified, revoked).
- Security training records — completion dates and attestations for every employee. Track by individual, not just aggregate completion rates.
- Change management tickets — every production change tracked in your ticketing system with approval records, test results, and deployment confirmation.
- Vendor assessments — documented security assessments for all critical vendors. SOC 2 reports, security questionnaire responses, or equivalent evidence.
- Vulnerability scan reports — monthly scan results showing findings, severity, and remediation status. Auditors will check that critical findings were addressed within your defined SLAs.
- Penetration test report — full report from your most recent external penetration test, including remediation evidence for findings.
- Background check records — confirmation that checks were completed (not the results themselves — just completion records).
- Incident response records — any security incidents during the observation period, including your response, timeline, root cause analysis, and remediation.
- Business continuity test results — evidence that your BCP/DR plan was tested and the results documented.
The Biggest SOC 2 Mistakes SaaS Companies Make
After working with dozens of organizations through their SOC 2 journey, the same mistakes come up again and again. Here are the ones that cost the most time and money.
1. Starting Too Late
A SOC 2 Type 2 requires a minimum observation period of 3 to 6 months — and that's after your controls are fully implemented and running. If an enterprise prospect asks for your SOC 2 report and you haven't started, you're 9 to 12 months away from having one. The time to start is before sales needs it, not after.
2. Scope Creep
First-time SOC 2? Start with the Security category only. Adding Availability, Confidentiality, Processing Integrity, and Privacy adds significant scope, cost, and evidence requirements. You can always add categories in subsequent audits. An estimated 68% of qualified opinions stem from access control weaknesses — master the Security criteria first before expanding.
3. Missing Evidence
This is the most painful failure. Your controls exist. Your team follows the processes. But you can't prove it. No screenshots of access reviews. No records of security training completion. No documented approval on change management tickets. Auditors cannot accept "we do this" — they need dated, verifiable evidence.
4. Vendor Risk Gaps
SaaS companies depend heavily on third-party services — AWS, Stripe, Datadog, Okta. Your auditor will ask how you assess these vendors' security practices. "They have their own SOC 2" is a start, but you need to show that you've reviewed their reports and that your vendor management policy is active. Missing vendor assessments for critical subservice organizations is a common finding.
How Long Does SOC 2 Take and What Does It Cost?
Straight talk on timelines and budgets:
Timeline
| Phase | Type 1 | Type 2 (First Time) |
|---|---|---|
| Preparation and remediation | 1–3 months | 2–4 months |
| Observation period | N/A (point in time) | 6–12 months |
| Audit fieldwork | 2–5 weeks | 4–8 weeks |
| Report issuance | 2–4 weeks | 2–4 weeks |
| Total | 3–6 months | 9–15 months |
Cost
| Cost Component | Typical Range |
|---|---|
| CPA firm audit fees | $15,000 – $40,000 |
| Compliance automation tools | $8,000 – $20,000/year |
| Penetration testing | $10,000 – $20,000 |
| Internal staff time (200–400 hours) | $20,000 – $60,000 equivalent |
| First-year total estimate | $50,000 – $140,000 |
Subsequent years are typically 40–60% less, since the foundational work is done and you're maintaining rather than building.
Where Documentation Saves Significant Time
The single largest internal cost is documentation — writing policies, building procedures, creating evidence templates. Most companies underestimate this by 50% or more. A team without templates typically spends 150–250 hours just on documentation, before any technical implementation.
The gap is almost always the paper trail, not the controls. After 20 years of compliance work, I can tell you that the organizations that struggle are rarely the ones with weak security — they're the ones that can't produce the documentation to prove their security is strong.
If you want to cut your documentation timeline significantly, our SOC 2 Readiness Toolkit includes professionally written, auditor-aligned policy templates, procedure documents, and evidence collection frameworks — ready to customize for your organization. One-time purchase, fully editable, and structured to match what auditors expect.
Frequently Asked Questions
What is the difference between SOC 2 Type 1 and Type 2?
SOC 2 Type 1 evaluates whether your security controls are suitably designed at a single point in time. SOC 2 Type 2 evaluates whether those controls were designed properly and operated effectively over a sustained period (typically 6–12 months). Type 2 is what most enterprise buyers require because it demonstrates consistent execution, not just intent.
How long does SOC 2 certification take?
SOC 2 Type 1 typically takes 3–6 months from start to report. SOC 2 Type 2 takes 9–15 months for a first-time audit because it includes a minimum observation period of 3–6 months during which your controls must be operating. The preparation phase (building and implementing controls) adds 2–4 months before the observation period begins.
Which Trust Services Categories do I need?
Security (Common Criteria) is mandatory for every SOC 2 audit. Beyond that, it depends on your services and your customers' requirements. SaaS companies with SLAs typically add Availability. Companies handling sensitive data may add Confidentiality. Start with Security only for your first audit — you can expand scope in subsequent years.
How much does a SOC 2 audit cost in 2026?
CPA firm audit fees typically range from $15,000 to $40,000 depending on scope, complexity, and the firm you choose. Total first-year costs — including compliance tools, penetration testing, and internal staff time — typically range from $50,000 to $140,000. Subsequent years are 40–60% less since foundational controls and documentation are already in place.
What documents do I need for SOC 2?
At minimum, you need: an Information Security Policy, Access Control Policy, Encryption Policy, Incident Response Plan, Business Continuity Plan, Vendor Management Policy, Change Management Procedure, Risk Assessment, and Acceptable Use Policy. You also need evidence documentation including access review logs, security training records, change management tickets, vulnerability scan reports, and vendor assessment records.
Key Takeaway
SOC 2 is not a technology problem. It's an evidence and documentation problem. The companies that get clean SOC 2 reports are not necessarily the ones with the most sophisticated security — they're the ones that can demonstrate, with dated and verifiable evidence, that their controls are designed properly and operating consistently.
Start early. Scope tightly. Document everything. Collect evidence from day one. And don't underestimate the paper trail — it's where most SOC 2 journeys succeed or fail.
Written by Tamer Saad, Acting CISO at the Department of National Defence Canada. CISSP · CISM · 20 years in cybersecurity and compliance.
Share this article
Ready to get compliant?
GRCadia provides audit-ready compliance templates for ISO 27001, SOC 2, HIPAA, and more. One-time purchase, instant download.
Browse Products