SOC 2 Compliance Checklist: Step-by-Step Audit Preparation Guide

A 2025 survey by Drata found that 87% of B2B buyers now require SOC 2 compliance from their vendors before signing a contract, up from 71% in 2022 (Drata, 2025). What was once a nice-to-have differentiator has become table stakes for any SaaS company or service provider handling customer data. Missing SOC 2 doesn't just mean failing an audit — it means losing deals.
This guide walks through every step of SOC 2 audit preparation, organized by the five Trust Services Criteria, with a practical checklist you can use to track your progress. For a comprehensive toolkit with pre-built controls and evidence templates, check out our SOC 2 compliance toolkit.
Key Takeaways
- SOC 2 is built on 5 Trust Services Criteria: Security (required), Availability, Processing Integrity, Confidentiality, and Privacy (optional)
- Type I assesses control design at a point in time; Type II evaluates operating effectiveness over 3-12 months
- Budget 6-12 months of preparation and $20K-$100K+ depending on company size and audit type
- Start with a gap assessment against the Security criterion — it's the foundation for everything else
What Is SOC 2 and Who Needs It?
SOC 2 (System and Organization Controls 2) is an auditing framework developed by the AICPA that evaluates how organizations protect customer data. Unlike ISO 27001, which is a certification, SOC 2 produces an attestation report — an independent auditor's opinion on whether your controls meet the Trust Services Criteria.
You likely need SOC 2 if you:
- Store, process, or transmit customer data in the cloud
- Sell to enterprise or mid-market B2B customers who include security questionnaires in procurement
- Operate a SaaS platform where customers trust you with their data
- Provide managed services (MSPs, hosting providers, payroll processors)
SOC 2 isn't legally required, but it's commercially required. Without it, you'll spend dozens of hours answering individual security questionnaires for every prospect — and some deals will simply stall.
Type I vs. Type II: Which Do You Need?
| Aspect | SOC 2 Type I | SOC 2 Type II |
|---|---|---|
| What it evaluates | Control design at a point in time | Control effectiveness over a period |
| Observation period | Single date (snapshot) | 3-12 months (typically 6) |
| Time to complete | 2-4 months of prep + audit | 6-12 months of prep + observation + audit |
| Cost range | $15K-$50K | $30K-$100K+ |
| Market acceptance | Acceptable for early-stage companies | Industry standard, preferred by enterprise |
| Validity | Reflects a moment in time | Demonstrates sustained compliance |
The practical path: Start with Type I to demonstrate you've built the controls, then move to Type II within 6-12 months to prove they actually work over time. Most enterprises will accept a Type I report from a startup if you can show you're actively working toward Type II.
The 5 Trust Services Criteria
SOC 2 organizes controls into five Trust Services Criteria (TSC). Security is mandatory. The other four are optional — you choose which ones are relevant to your service.
Criterion 1: Security (Common Criteria) — Required
The Security criterion is the foundation of every SOC 2 report. It covers nine categories called Common Criteria (CC1 through CC9) that address how you protect information and systems against unauthorized access.
Control environment checklist:
- ☐ Information security policy documented and approved by management
- ☐ Organizational chart with security roles and responsibilities defined
- ☐ Board/management oversight of security program demonstrated
- ☐ Code of conduct and ethics policy in place
- ☐ Background checks performed for employees with system access
Risk assessment checklist:
- ☐ Annual risk assessment process documented and executed
- ☐ Risk register maintained with identified threats and vulnerabilities
- ☐ Risk treatment plans documented (accept, mitigate, transfer, avoid)
- ☐ Third-party risk assessment process for vendors
- ☐ Fraud risk considerations documented
Access control checklist:
- ☐ Role-based access control (RBAC) implemented across all systems
- ☐ Multi-factor authentication (MFA) enforced for all production access
- ☐ Quarterly access reviews performed and documented
- ☐ Privileged access management (PAM) controls in place
- ☐ Access provisioning and de-provisioning procedures documented
- ☐ Terminated employee access revoked within 24 hours
Monitoring and operations checklist:
- ☐ Security information and event management (SIEM) or log aggregation deployed
- ☐ Intrusion detection/prevention systems (IDS/IPS) configured
- ☐ Vulnerability scanning performed at least quarterly
- ☐ Annual penetration testing by an independent third party
- ☐ Incident response plan documented and tested annually
- ☐ Security awareness training conducted for all employees annually
Change management checklist:
- ☐ Change management policy and procedures documented
- ☐ All changes require approval before deployment to production
- ☐ Separation of duties between development and production environments
- ☐ Version control and code review processes enforced
- ☐ Emergency change procedures defined with post-implementation review
For a deeper look at building the policy foundation, see our SOC 2 compliance guide and download our security compliance templates.
Criterion 2: Availability
The Availability criterion ensures your system is operational and accessible as committed in service level agreements (SLAs). Choose this criterion if uptime is critical to your customers.
Availability checklist:
- ☐ SLAs defined with specific uptime commitments (e.g., 99.9%)
- ☐ Infrastructure redundancy implemented (multi-AZ, failover, load balancing)
- ☐ Disaster recovery plan documented with RTO and RPO targets
- ☐ DR plan tested at least annually with documented results
- ☐ Backup procedures documented with regular testing of restoration
- ☐ Capacity planning and performance monitoring in place
- ☐ Status page or incident communication process for customers
- ☐ Business continuity plan covering non-IT operational disruptions
Criterion 3: Processing Integrity
Processing Integrity ensures that system processing is complete, valid, accurate, and timely. This matters most for companies that process transactions, calculations, or data transformations.
Processing Integrity checklist:
- ☐ Data processing procedures documented end-to-end
- ☐ Input validation controls prevent invalid or incomplete data entry
- ☐ Processing accuracy checks and reconciliation procedures in place
- ☐ Error handling and correction procedures documented
- ☐ Data quality monitoring and exception reporting active
- ☐ Output completeness verification before delivery to customers
- ☐ Processing SLAs defined and monitored
Criterion 4: Confidentiality
Confidentiality covers how you protect information designated as confidential — trade secrets, intellectual property, business plans, and any data contractually classified as confidential.
Confidentiality checklist:
- ☐ Data classification policy defines what's considered confidential
- ☐ Encryption at rest (AES-256) for confidential data stores
- ☐ Encryption in transit (TLS 1.2+) for all data transmission
- ☐ Confidential data access restricted to authorized personnel only
- ☐ Data retention and disposal procedures defined and followed
- ☐ Confidentiality agreements (NDAs) signed by employees and contractors
- ☐ Secure disposal procedures for hardware and media containing confidential data
Criterion 5: Privacy
The Privacy criterion applies when you collect, use, retain, disclose, or dispose of personal information. It aligns with GDPR and CCPA principles.
Privacy checklist:
- ☐ Privacy policy published and accessible to data subjects
- ☐ Privacy notice describes collection, use, retention, and disclosure practices
- ☐ Consent mechanisms in place where required
- ☐ Data subject access request (DSAR) process documented and operational
- ☐ Data minimization practices implemented (collect only what's needed)
- ☐ Data retention schedule defined with automated enforcement where possible
- ☐ Privacy impact assessments (PIAs) performed for new processing activities
- ☐ Sub-processor management process with contractual privacy requirements
SOC 2 Audit Timeline
A realistic timeline from "we've decided to pursue SOC 2" to "report in hand" looks like this:
Months 1-2: Gap Assessment and Planning
- Conduct a gap assessment against chosen Trust Services Criteria
- Identify control gaps and prioritize remediation
- Select your auditor (get quotes from at least 3 firms)
- Decide on scope: which systems, which TSC, Type I or Type II
- Assign an internal project owner
Months 3-5: Remediation and Implementation
- Implement missing controls (policies, technical controls, processes)
- Deploy monitoring and evidence collection tools
- Train employees on new procedures
- Begin collecting evidence (especially important for Type II)
Months 6-8: Readiness Assessment (Optional but Recommended)
- Many audit firms offer a pre-audit readiness assessment
- Identifies issues before the formal audit begins
- Costs $5K-$15K but can prevent findings that delay the report
Months 9-12: Formal Audit
- For Type I: auditor reviews controls at a point in time (2-4 weeks)
- For Type II: observation period begins (3-12 months), then audit (4-6 weeks)
- Auditor requests evidence, conducts interviews, tests controls
- You respond to requests and remediate any findings
Post-Audit: Report Delivery
- Auditor issues the SOC 2 report (typically 2-4 weeks after fieldwork)
- Address any findings or exceptions noted
- Plan for next year's audit (SOC 2 reports are valid for 12 months)
SOC 2 Cost Breakdown
Costs vary widely based on company size, complexity, and whether you use compliance automation tools. Here's what to expect:
| Cost Category | Small Company (<50 employees) | Mid-Size (50-250) | Enterprise (250+) |
|---|---|---|---|
| Audit fees (Type I) | $15K-$25K | $25K-$40K | $40K-$75K |
| Audit fees (Type II) | $25K-$40K | $40K-$65K | $65K-$100K+ |
| Compliance platform | $10K-$25K/year | $25K-$50K/year | $50K-$100K+/year |
| Penetration testing | $5K-$15K | $15K-$30K | $30K-$60K |
| Remediation (internal labor) | 200-400 hours | 400-800 hours | 800-1,500+ hours |
| Security tools (if gaps exist) | $5K-$20K/year | $20K-$50K/year | $50K-$150K+/year |
Ways to reduce costs:
- Start with Type I and a single TSC (Security only)
- Use compliance automation platforms (Drata, Vanta, Secureframe) to reduce evidence collection time by 50-70%
- Bundle penetration testing with your audit firm
- Use policy templates instead of writing everything from scratch — our SOC 2 compliance toolkit includes pre-built policies mapped to each criterion
Common SOC 2 Pitfalls
After working with dozens of companies going through their first SOC 2 audit, these are the mistakes that come up repeatedly:
1. Scoping too broadly. Including every system and all five TSC in your first audit is a recipe for delays and budget overruns. Start with the systems your customers care about and expand scope in subsequent years.
2. Treating it as a one-time project. SOC 2 is a continuous compliance program, not a checkbox. Controls must operate effectively every day, not just during audit season.
3. Ignoring evidence collection until audit time. If your auditor asks for evidence of quarterly access reviews and you didn't document them, you'll get a finding. Set up automated evidence collection from day one.
4. Policies that don't match reality. Auditors test whether your organization actually follows its policies. A policy requiring weekly vulnerability scans is worse than useless if you only scan monthly — it's now an audit finding.
5. Underestimating the people component. Security awareness training, background checks, and documented onboarding/offboarding procedures are as important as firewalls and encryption. Auditors will test all of them.
For a deeper dive into audit preparation specifically for IT teams, read our internal audit program guide.
Choosing the Right Trust Services Criteria
Not every company needs all five criteria. Here's a decision framework:
- Security (CC): Always include. It's the mandatory foundation.
- Availability: Include if you offer SLAs, your customers depend on uptime, or you're a SaaS platform.
- Processing Integrity: Include if you process financial transactions, perform calculations, or transform data that customers rely on for accuracy.
- Confidentiality: Include if you handle trade secrets, IP, or contractually confidential information beyond standard personal data.
- Privacy: Include if you collect personal information directly from consumers (not just from business customers).
Most SaaS companies start with Security + Availability. Companies handling sensitive business data add Confidentiality. Consumer-facing companies add Privacy.
Frequently Asked Questions
How long does a SOC 2 audit take from start to finish?
For a Type I audit, expect 4-6 months from the decision to pursue SOC 2 to having the report in hand. That includes 2-3 months of gap assessment and remediation, plus 1-2 months for the audit itself. For Type II, add the observation period (minimum 3 months, typically 6-12 months). The most common timeline is 9-12 months for a first-time Type II. If you're using compliance automation and have a relatively mature security program, you can shave 2-3 months off these estimates.
Can we fail a SOC 2 audit?
Technically, you can't "fail" — the auditor issues a report regardless. But the report can contain qualified opinions or exceptions (findings where controls weren't operating effectively). A report with multiple exceptions is commercially damaging because customers will see them. Their procurement teams know how to read SOC 2 reports. If an auditor identifies significant gaps during fieldwork, they may recommend pausing the audit to remediate — that's essentially a failure. A readiness assessment helps avoid this scenario.
Do we need a compliance automation platform?
You don't need one, but the ROI is significant. Compliance platforms like Drata, Vanta, and Secureframe automate evidence collection, policy management, and control monitoring. Without one, your team will spend hundreds of hours manually collecting screenshots, exporting logs, and organizing evidence. The $10K-$50K annual cost typically pays for itself in reduced internal labor. For companies under 20 employees, you might manage without one for the first audit, but you'll want one by year two.
What's the difference between SOC 2 and ISO 27001?
SOC 2 is an attestation (an auditor gives an opinion) focused on service organizations; ISO 27001 is a certification (a registrar certifies compliance) focused on information security management systems. SOC 2 is dominant in North America; ISO 27001 is more common internationally. SOC 2 reports are confidential (shared under NDA); ISO 27001 certification is public. Many companies pursue both — the control overlap is roughly 70%, so pursuing the second after the first is incremental effort. If you have to pick one, choose based on where your customers are.
How often do we need to renew SOC 2?
SOC 2 reports cover a specific period and are generally considered valid for 12 months. You'll need to undergo a new audit annually to maintain compliance. The good news: subsequent audits are faster and cheaper than the first one (typically 30-40% less effort) because controls are already in place and evidence collection is established. Most auditors offer multi-year engagement pricing.
Can a startup get SOC 2 compliant with a small team?
Yes, but it requires commitment. Companies with as few as 5-10 employees have successfully completed SOC 2 Type II. The keys are: use a compliance automation platform to reduce manual work, start with Security-only scope, assign one person as the dedicated compliance owner (even if it's part-time), and use policy templates rather than writing from scratch. Our SOC 2 compliance toolkit is designed for exactly this scenario — it includes all required policies, control matrices, and evidence templates mapped to each criterion.