Everything you need to navigate SOC 2 — timelines, checklists, budget planning, AI prompts, and more.
← Back to overviewSOC 2 is not a certification. It's an audit report prepared by a CPA that says you defined some policies and (maybe) followed them. Companies as small as 3 employees have completed SOC 2 audits. But understand that this does not measure your organization's ability to withstand cyber attacks—it measures whether you follow documented processes.
Point-in-time assessment showing you designed controls.
3-12 month assessment proving operational effectiveness.
Why choose Type I first? If you're 3-6 months away from needing the full report, Type I lets you validate your control design before committing to a 3-12 month audit period. Some organizations use it to identify gaps, remediate, then immediately proceed to Type II. The downside: Type I doesn't necessarily satisfy customer/client requirements, so you're paying for something that won't close deals—only do this if you have time and want validation.
You define what's in scope. Product companies often start with Security-only, while professional services typically add Confidentiality:
| Category | What It Covers | Recommendation |
|---|---|---|
| Security | Protection against unauthorized access, system abuse, theft | Always include. |
| Confidentiality | Protection of confidential information beyond normal security | Add if you handle highly sensitive data (PHI, financial records, legal matters, proprietary business information). Recommended for professional services, may be optional for most product companies. |
| Availability | System uptime and operational performance | Add if you have SLAs or high-availability commitments. Common for SaaS companies with uptime guarantees. |
| Processing Integrity | System processing is complete, valid, accurate, timely | Add if you're doing financial calculations, payment processing, tax preparation, or other computation-dependent services |
| Privacy | Collection, use, retention, disclosure of personal information | Add if consumer-facing with significant PII collection or subject to GDPR, CCPA. Note: SOC 2 Privacy TSC does not satisfy HIPAA compliance on its own—HIPAA has its own separate framework. |
Every third party that plays a material role in delivering your service needs to be disclosed in your system description. For most startups, that's your cloud provider (AWS, GCP, Azure), plus tools like Datadog, PagerDuty, Stripe, etc. Each gets designated as either carved-out or inclusive:
| Method | What It Means | When to Use |
|---|---|---|
| Carve-out | You disclose the vendor and its role, but their controls are excluded from your audit. Your report tells customers to evaluate the vendor's own SOC report. | Almost always. This is how you handle AWS, GCP, Stripe, Datadog, etc. |
| Inclusive | The vendor's controls are included in your audit and tested by your auditor. | Rare. Only when a vendor is so deeply embedded that its controls are inseparable from yours and your auditor can gain access to test them. |
This is what you want. No issues found. Clean bill of health. When people say they "passed" SOC 2, they mean unqualified opinion.
Significant issues found. One or more material departures from the criteria—not just minor exceptions. A qualified opinion means something structurally didn't meet the standard. Minor exceptions (e.g., a new hire completing training late) typically appear as noted exceptions in an otherwise unqualified report and are manageable. Section 5 of the report lets you explain context and describe remediation for any exceptions.
You failed. Material control failures. This report is unusable for sales. Fix issues and re-audit.
From decision to report: 4-12 months depending on your readiness. Here's a common path with practical implementation steps:
aws cloudtrail create-trail --name soc2-audit-trail --s3-bucket-name your-bucketvault server -dev for testingtrufflehog filesystem --directory=. or GitGuardiantrivy image your-image:tagAudit readiness = four elements per control: (1) documented policy explaining what you do, (2) communications showing responsible parties were informed, (3) procedures detailing exact steps, and (4) evidence proving the control operated as documented. For Type II, evidence must show consistent operation throughout the observation period—not just a single snapshot.
gh pr list --state merged --json number,title,author,reviewers --limit 100Expect walkthrough questions like: "Walk me through how a new employee gets access to systems." "Show me a recent change ticket from request to deployment." "Tell me about a security incident and how you handled it."
Sampling: Auditors select evidence randomly across your observation period. If you claim quarterly access reviews, they'll examine all four. If you processed 100 changes, they might sample 25 tickets. Controls must work every time—not just when you're watching.
Renewal reality: Reports expire after 12 months. Customers expect continuous coverage—"bridge letters" confirming ongoing compliance only buy limited time. Annual renewal costs roughly 40% of initial investment ($10k-40k typical). Start the renewal process early; gaps in coverage raise questions.
Auditors are looking to ensure Trust Services Criteria are followed according to an internal control framework and described according to the Description Criteria. This checklist is a practical guide to help you prepare and contains 118 items organized by priority and owner.
SOC 2 is criteria-based, not tool-based. The Trust Services Criteria describe outcomes, not products. For every expensive tool commonly recommended, there's a manual or lower-cost alternative that satisfies the same criteria. The trade-off is always more manual evidence collection and potentially more auditor questions. At ~10 people, manual alternatives are viable. At 25+, the manual burden often becomes untenable.
| Tool Category | TSC Reference | What the Criteria Actually Require | Minimum Viable Alternative | When It Becomes Worth It |
|---|---|---|---|---|
| SSO Okta, OneLogin, JumpCloud |
CC6.1, CC6.2, CC6.3 | Logical access security, authorized credential issuance, access modification/removal when roles change | Google Workspace or M365 acts as your IdP. Maintain per-app access lists, documented onboarding/offboarding checklists, quarterly access reviews per platform. Works fine with fewer than ~15 apps. | 15+ SaaS apps, frequent employee turnover, or when manual offboarding across platforms takes more than an hour per departure |
| EDR CrowdStrike, SentinelOne, Carbon Black |
CC6.8 | Controls to prevent or detect and act upon introduction of malicious software | Built-in OS protections: Windows Defender (free, enterprise-grade), macOS XProtect + Gatekeeper. Document that these are enabled and auto-updating. Screenshot evidence of settings. | Handling highly sensitive data (financial, healthcare), or when customers specifically require EDR in security questionnaires |
| MDM Jamf, Kandji, Intune, Fleet |
CC6.1, CC6.6, CC6.7 | Endpoint security controls: encryption, screen lock, OS currency, ability to restrict/wipe lost devices | Acceptable use policy requiring FileVault/BitLocker, screen lock, OS updates. Periodic screenshots from employees as evidence. Device inventory spreadsheet. Document remote wipe capability via Google Workspace/M365 device management (built-in). | 15+ devices, BYOD environment, or when quarterly screenshot collection takes more time than an MDM subscription costs |
| Compliance Platform Vanta, Drata, Secureframe, Sprinto |
N/A (workflow tool) | Evidence organized and available for auditor review | Google Drive folders following the evidence folder structure in this guide, plus spreadsheets for tracking. More manual work, but fully functional for a small team with discipline. | 15+ employees, 10+ integrations to monitor, or limited bandwidth for manual evidence collection. Platforms also reduce audit fees (auditors work faster with them). |
| SIEM Splunk, Elastic, Datadog Security |
CC7.1, CC7.2 | Detect anomalies and monitor system components for deviations | CloudTrail + CloudWatch Alarms (AWS), Cloud Audit Logs + Cloud Monitoring (GCP), or Azure Monitor. Set up basic alerts for unauthorized access attempts, config changes, root account usage. Free/low-cost tiers available. | Multi-cloud, complex infrastructure, or when you need log correlation across many sources |
| Vulnerability Scanner Qualys, Tenable, Rapid7 |
CC7.1 | Vulnerability management process with identification and remediation | Trivy (free, containers/IaC), Dependabot (free on GitHub), Prowler (free, AWS). Run on a schedule, export reports, track remediation in a spreadsheet. | Large attack surface, multiple production environments, or when you need consolidated dashboards across scan types |
| Secrets Manager HashiCorp Vault, Doppler |
CC6.1 | Secrets are protected and not exposed in plaintext | AWS SSM Parameter Store (free), GCP Secret Manager (free tier), environment variables in CI/CD with restricted access. Run TruffleHog or GitGuardian to prove no secrets in code. | Many services sharing secrets, frequent rotation requirements, or teams larger than ~10 engineers |
| Penetration Testing | Not in TSC | Not required by SOC 2 criteria | Not needed for SOC 2 compliance. Consider if customers explicitly request it, you've made major architectural changes, or you handle highly sensitive data. A boutique penetration testing firm can likely provide a better value, cost-effective solution such a Security Architecture Review & Configuration Assessment. | When customers require it in contracts, or your prospectes are asking to demonstrate these security assurances |
| Background Checks Checkr, GoodHire, Sterling |
CC1.4 | The entity "considers background screening in the hiring process" — note the word considers, not performs | A documented hiring risk assessment process: reference checks, structured interviews, evaluation of competence, and a recorded decision on whether formal screening is warranted for each role. Document the risk assessment and outcome. The criteria require you to consider it and make a deliberate, documented decision — not necessarily to run a criminal background check on every hire. | Roles with admin access to sensitive systems, regulated industries (finance, healthcare), or when customer contracts require it |
These are controls where there's no practical manual alternative — the criteria effectively mandate them:
| Control | TSC Reference | Why It's Non-Negotiable | Cost |
|---|---|---|---|
| MFA on all production systems | CC6.1 | Auditors universally expect this. No practical compensating control exists for "we don't use MFA." | Free (built into Google Workspace, M365, AWS, GitHub) |
| Cloud audit logging | CC7.1, CC7.2 | Must show who did what, when, across your infrastructure. Cannot be generated retroactively. | Low — CloudTrail, GCP Audit Logs. Enable early since you need months of log history. |
| Encryption at rest and in transit | CC6.1, CC6.7 | Explicit criteria requirement. TLS 1.2+ for transit, disk/database encryption at rest. | Free — most cloud services encrypt by default. Verify and screenshot. |
| Documented policies | CC1.1, CC2.1, CC5.1 | Auditors test against what you wrote. No policies = nothing to audit. | Free — use Tailscale/open source templates, customize with an LLM. |
| Quarterly access reviews | CC6.2, CC6.3 | Auditors check these every time. Need 2+ completed cycles before audit. | Free — spreadsheet with manager sign-off. Start immediately. |
| Change management process | CC8.1 | Every production change needs a ticket, review, and deployment record. Need 3+ months of history. | Free — GitHub PRs with branch protection and required reviews. |
| Risk assessment | CC3.1, CC3.2 | Documented risk identification, analysis, and treatment decisions. | Free — spreadsheet with likelihood, impact, mitigation, and owner columns. |
| Incident response plan | CC7.3, CC7.4 | Documented plan for detecting, responding to, and recovering from incidents. | Free — document from template. Run at least one tabletop exercise before audit. |
The non-negotiable controls are mostly free. The expensive tools are optional. SOC 2 compliance costs come primarily from the audit itself and the time investment.
Note that there's no real checklist to be graded against. You should work with your auditor to understand what they need and will be looking to assess.
Organize your evidence in a shared drive (Google Drive, Dropbox, SharePoint). Separate design evidence (policies, configurations) from operating evidence (proof controls worked over time).
2024-Q2-access-review-APPROVED.xlsx or 2024-06-15-cloudtrail-config.png
SOC2-Evidence/
├── 00-EVIDENCE-INDEX.xlsx ← Map evidence to TSC control IDs
├── 01-Scope-and-Description/
│ ├── system-boundary-diagram.pdf
│ ├── data-flow-diagram.pdf
│ ├── network-architecture.pdf
│ ├── system-narrative.docx
│ └── in-scope-vs-out-of-scope.xlsx
├── 02-Policies-Procedures/ [DESIGN EVIDENCE]
│ ├── information-security-policy-v2.1-FINAL.pdf
│ ├── access-control-policy-v1.0-FINAL.pdf
│ ├── incident-response-policy-v1.0-FINAL.pdf
│ ├── acceptable-use-policy-v1.0-FINAL.pdf
│ └── employee-acknowledgments/
│ ├── 2024-all-employees-signed.pdf
│ └── signature-log.xlsx
├── 03-Access-Management/ [OPERATING EVIDENCE - TIME SERIES]
│ ├── access-reviews/
│ │ ├── 2024-Q1-access-review-APPROVED.xlsx
│ │ ├── 2024-Q2-access-review-APPROVED.xlsx
│ │ ├── 2024-Q3-access-review-APPROVED.xlsx
│ │ └── manager-approval-emails/
│ ├── provisioning-deprovisioning/
│ │ ├── 2024-Q2-new-hire-checklist-samples.pdf
│ │ ├── 2024-Q3-termination-checklist-samples.pdf
│ │ └── offboarding-ticket-exports/
│ ├── SSO-MFA-config/ [DESIGN + OPERATING]
│ │ ├── 2024-06-01-okta-MFA-enforcement-screenshot.png
│ │ ├── 2024-09-15-okta-MFA-enforcement-screenshot.png
│ │ └── SSO-app-integration-list.xlsx
│ └── privileged-access-logs/
│ └── 2024-Q2-to-Q3-admin-access-samples.csv
├── 04-Change-Management/ [OPERATING EVIDENCE - TIME SERIES]
│ ├── change-control-process.pdf [DESIGN]
│ ├── github-branch-protection-config.png
│ ├── sample-changes/
│ │ ├── 2024-06-changes-sample-5-PRs.pdf
│ │ ├── 2024-08-changes-sample-5-PRs.pdf
│ │ └── 2024-09-changes-sample-5-PRs.pdf
│ └── emergency-change-log.xlsx
├── 05-Encryption-Secrets/ [DESIGN EVIDENCE]
│ ├── 2024-06-15-rds-encryption-at-rest-screenshot.png
│ ├── 2024-06-15-s3-encryption-config.png
│ ├── TLS-certificate-config.png
│ ├── secrets-manager-setup.png
│ └── encryption-key-management-procedure.pdf
├── 06-Logging-Monitoring/ [DESIGN + OPERATING]
│ ├── 2024-06-01-cloudtrail-config-all-regions.png
│ ├── 2024-09-15-cloudtrail-config-all-regions.png
│ ├── log-retention-policy-12-months.png
│ ├── SIEM-alerting-rules-export.pdf
│ └── sample-security-alerts/
│ └── 2024-Q2-Q3-alert-response-samples.xlsx
├── 07-Vulnerability-Management/ [OPERATING EVIDENCE - TIME SERIES]
│ ├── vulnerability-scanning-policy.pdf [DESIGN]
│ ├── scan-results/
│ │ ├── 2024-06-trivy-scan-report.pdf
│ │ ├── 2024-07-trivy-scan-report.pdf
│ │ ├── 2024-08-trivy-scan-report.pdf
│ │ └── 2024-09-trivy-scan-report.pdf
│ └── remediation-tracking.xlsx ← Track critical/high findings to closure
├── 08-Incident-Response/
│ ├── incident-response-plan-v1.2-FINAL.pdf [DESIGN]
│ ├── 2024-05-15-IR-tabletop-exercise.pdf
│ ├── incident-log.xlsx [OPERATING - if any real incidents]
│ └── lessons-learned/
├── 09-Business-Continuity/
│ ├── disaster-recovery-plan-v1.0-FINAL.pdf [DESIGN]
│ ├── backup-testing/ [OPERATING EVIDENCE - TIME SERIES]
│ │ ├── 2024-Q1-backup-restore-test.pdf
│ │ ├── 2024-Q2-backup-restore-test.pdf
│ │ └── 2024-Q3-backup-restore-test.pdf
│ └── RTO-RPO-documentation.pdf
├── 10-Vendor-Risk-Management/
│ ├── vendor-inventory-2024.xlsx
│ ├── vendor-risk-assessment-template.xlsx
│ ├── vendor-assessments/ ← Individual risk assessments per vendor
│ │ ├── AWS-risk-assessment.pdf
│ │ ├── Auth0-risk-assessment.pdf
│ │ └── Stripe-risk-assessment.pdf
│ └── vendor-soc2-reports/
│ ├── AWS-SOC2-Type-II-2024.pdf
│ ├── Auth0-SOC2-Type-II-2024.pdf
│ └── [Add NDA-protected reports here]
├── 11-HR-Security/
│ ├── background-check-policy.pdf [DESIGN]
│ ├── security-training-materials/
│ │ └── 2024-security-awareness-training-deck.pdf
│ ├── training-completion-records/
│ │ └── 2024-training-completions-all-employees.xlsx
│ └── background-checks/
│ └── background-check-confirmations-log.xlsx
├── 12-Risk-Management/
│ ├── 2024-Q2-risk-assessment.xlsx
│ ├── 2024-Q3-risk-assessment-update.xlsx
│ └── risk-register.xlsx
├── 13-Client-Confidentiality/ [FOR CONFIDENTIALITY TSC - DELETE IF NOT IN SCOPE]
│ ├── confidentiality-policy-v1.0-FINAL.pdf [DESIGN]
│ ├── data-classification-policy.pdf
│ ├── NDA-tracking/
│ │ ├── client-NDA-log.xlsx
│ │ ├── employee-NDA-log.xlsx
│ │ └── sample-signed-NDAs/
│ ├── matter-engagement-isolation/
│ │ ├── client-separation-controls.pdf
│ │ ├── access-control-matrix-by-engagement.xlsx
│ │ └── chinese-wall-procedures.pdf
│ ├── document-retention-destruction/
│ │ ├── retention-schedule-policy.pdf
│ │ ├── 2024-Q2-destruction-log.xlsx
│ │ ├── 2024-Q3-destruction-log.xlsx
│ │ └── secure-destruction-vendor-cert.pdf
│ └── professional-liability-insurance/
│ └── 2024-E&O-insurance-certificate.pdf
├── 14-Engagement-Access-Controls/ [FOR CONFIDENTIALITY TSC - DELETE IF NOT IN SCOPE]
│ ├── client-data-access-policy.pdf [DESIGN]
│ ├── engagement-access-reviews/ [OPERATING - TIME SERIES]
│ │ ├── 2024-Q1-engagement-access-review.xlsx
│ │ ├── 2024-Q2-engagement-access-review.xlsx
│ │ └── 2024-Q3-engagement-access-review.xlsx
│ └── client-portal-access-logs/
│ └── 2024-Q2-Q3-portal-access-samples.csv
└── 15-Audit-Correspondence/
├── auditor-questions-responses.docx
├── management-response-to-findings.pdf
└── final-report/
└── [SOC2 report goes here after completion]
function createSOC2Folders() {
var root = DriveApp.createFolder('SOC2-Evidence');
var structure = {
'01-Scope-and-Description': [],
'02-Policies-Procedures': ['employee-acknowledgments'],
'03-Access-Management': [
'access-reviews', 'provisioning-deprovisioning',
'SSO-MFA-config', 'privileged-access-logs'
],
'04-Change-Management': ['sample-changes'],
'05-Encryption-Secrets': [],
'06-Logging-Monitoring': ['sample-security-alerts'],
'07-Vulnerability-Management': ['scan-results'],
'08-Incident-Response': ['lessons-learned'],
'09-Business-Continuity': ['backup-testing'],
'10-Vendor-Risk-Management': [
'vendor-assessments', 'vendor-soc2-reports'
],
'11-HR-Security': [
'security-training-materials',
'training-completion-records', 'background-checks'
],
'12-Risk-Management': [],
'13-Client-Confidentiality': [
'NDA-tracking', 'matter-engagement-isolation',
'document-retention-destruction',
'professional-liability-insurance'
],
'14-Engagement-Access-Controls': [
'engagement-access-reviews',
'client-portal-access-logs'
],
'15-Audit-Correspondence': ['final-report']
};
for (var folder in structure) {
var parent = root.createFolder(folder);
structure[folder].forEach(function(sub) {
parent.createFolder(sub);
});
}
Logger.log('Created: ' + root.getUrl());
}
Note: If you're only doing Security TSC (no Confidentiality), delete folders 13 and 14 after creation. The script takes about 10 seconds to run.
For professional services firms: Folders 13-14 (Client Confidentiality, Engagement Access Controls) are specifically for the Confidentiality TSC. If you're only doing Security TSC, delete these folders. Most professional services firms should include Confidentiality given the sensitive nature of client matters, engagements, and proprietary information handled.
Sampling for Type II: Auditors need evidence distributed across your audit period. For a 6-month audit, collect quarterly access reviews (at least 2), vulnerability scans (monthly), and change samples from beginning/middle/end. The EVIDENCE-INDEX.xlsx should map each file to TSC control ID(s) - this should save time during auditor requests.
Costs scale primarily with environment complexity—not headcount. A 10-person fintech with microservices spends more than a 100-person company with a simple monolith.
| Tier | Profile | First-Year Total |
|---|---|---|
| Simple | Single app, managed hosting, <10 integrations | $12k–$55k |
| Moderate | 2–5 services, single cloud, standard CI/CD | $55k–$110k |
| Complex | Microservices, multi-region, regulated-adjacent | $100k–$200k |
| Highly Complex | Multi-cloud, on-prem, HIPAA/PCI overlay | $180k–$450k+ |
Most early-stage startups fall into Simple or Moderate tiers. Here's what Simple typically looks like:
$12k vs $80k? The gap comes from company size and security tooling you already have. A small startup (<10 people) with existing tooling, a GRC platform ($6-10k), and a boutique auditor ($5-8k) can come in under $20k. Larger companies or those needing MDM ($3-8k), EDR ($3-10k), SSO ($2-5k), and consulting help ($5-15k) push toward the high end.
The hybrid approach: Platform + consultant guidance is often the sweet spot. Platforms automate evidence collection, but configuring them correctly and knowing which controls actually matter requires experience. A consultant helps you get it right the first time instead of discovering gaps during fieldwork. This front-loaded cost typically pays for itself in reduced audit friction and fewer remediation cycles.
The auditor choice matters more than platform choice. You'll work closely with them for 3-6 months, and their experience directly impacts your success.
| Firm Type | Typical Cost | Pros | Cons | Best For |
|---|---|---|---|---|
| Big 4 (Deloitte, PwC, EY, KPMG) |
$100k+ | Brand recognition, global reach | Expensive, junior staff doing fieldwork, slow, rigid processes, not startup-friendly | Post-Series C, enterprise sales to Fortune 500 |
| Regional Firms (Top 20-100 CPA firms) |
$20k-50k+ | Solid reputation, experienced, reasonable pricing | Variable startup experience, may not understand modern tech stacks | Series A-B companies, traditional tech stacks |
| Boutique Firms (Specialized SOC 2 shops) |
$3k-15k+ | Best service for startups, partners directly involved, modern tech expertise, flexible, fast, understand lean teams | Less brand recognition (but most customers don't care) | Seed to Series B startups, modern tech companies |
SOC 2 is a cross-functional effort. Here's who you'll need, when to engage them, and how they can help:
When: Day 1 - owns the entire journey (internal staff or fractional/virtual CISO)
The quarterback. Owns the entire process.
When: Months 1-5 - heavy involvement during prep and remediation
The implementers. Make technical controls real.
When: Months 1-3 for setup, then ongoing for quarterly access reviews
The access gatekeepers. Manage identity and endpoints.
When: Months 1-2 for policy rollout, ongoing for onboarding/offboarding
The people process owners.
When: Month 1 for scoping, Months 9-11 for auditor interviews
The decision makers and interviewees.
When: Month 1 for commitment and budget, Month 12 for final review
The sponsors.
LLMs like Claude, ChatGPT, and others can significantly speed up SOC 2 preparation. But they have blind spots.
First-timers often confuse these roles. They're deliberately separate, and understanding why saves confusion and money.
They fix things. Gap analyses, control design, policy writing, tool configuration, training. They can log into your systems and build documentation from scratch. No CPA license required—often cybersecurity specialists or former auditors.
Cost: $5k-25k for assessment only. $25k-85k for full readiness engagement with remediation support.
They evaluate things. Test evidence, assess controls, issue the formal SOC 2 report. Must be licensed CPA firms under AICPA standards. They can tell you your access controls are insufficient, but they cannot help you fix them.
Cost: $5k-8k for small startups (<10 people), $10k-30k for larger companies (boutique firm).
Some decisions are annoying to reverse once you've started. If you're going to pay someone, this is where outside perspective is most useful:
Vanta, Drata, Secureframe, Sprinto, or just spreadsheets? They all work. The question is which one fits your stack and how much hand-holding you want, and how much you want to pay.
Security-only or add Confidentiality? Include the staging environment or not? Over-scoping adds cost. Under-scoping means awkward conversations with your auditor later.
You probably have gaps. Most companies do. The question is whether they're "fix in a week" gaps or "delay the audit 3 months" gaps. Better to know before you've promised a customer a completion date.
Type II requires 3-12 months of evidence. If you're missing quarterly access reviews, that's calendar time you can't compress. A quick assessment tells you whether "done by Q2" is realistic or wishful.
Division of labor: Consultants write the gap analysis, roadmap, control matrix, and system description. For policies, they provide templates that you customize. Technical configurations, system logs, and operational evidence are your responsibility to produce; consultants review them for adequacy.
The hours are real. During active readiness phases, expect ~8 hours per week for 6-8 weeks from your core team. This isn't a "set it and forget it" project.
Access reviews, logging configs, encryption evidence, change management tickets
Background checks, training records, onboarding/offboarding docs
Policy customization, evidence organization, auditor coordination
Policy approval, risk acceptance decisions, auditor interviews
The observation period (3-6 months for Type II) is lighter—just operating controls you've already set up. The bulk of the work is in the initial 2-3 months of preparation.
Compliance platforms (Vanta, Drata, Secureframe, Sprinto) automate about 30% of total compliance work. Vendor marketing claims of 80-90% automation reflect aspirational numbers, not typical outcomes.
What they actually do well:
What they don't do:
Platforms are worth the $10k-25k/year for organizations that would otherwise track everything in spreadsheets. But they're a tool, not a shortcut.
Don't try to DIY everything. Get human experts for:
$5k-15k for a written gap analysis, scope recommendation, and platform advice. You can skip this if you've done compliance work before. If you haven't, you're basically guessing which controls auditors care about based on blog posts.
Multi-cloud, microservices, multi-tenant? Get a security architect to review your system description and controls.
If readiness shows you're missing logging, encryption, or access controls - hire someone to implement properly.
Don't cheap out on the auditor. Large firms bring name recognition but cost more and are likely to assign junior staff. Boutique firms often provide a good balance - experienced partners who guide you through the process, competitive rates, and startup-friendly approaches.
SOC 2 doesn't require pentesting or adversarial testing, but you should consider it if you have data-sensitive apps. Also implement phishing-resistant auth (WebAuthn, passkeys, hardware keys), and conduct credential audits to hunt for exposed secrets. SOC 2 proves process compliance, not attack resilience.
Learn from others' expensive mistakes.
Pre-revenue or pre-PMF companies waste money and slow development. Wait until you know this will block enterprise deals.
Including office WiFi when you're remote, or adding Availability when customers don't care. Start with Security-only.
Very low and very high priced auditors often mean inexperienced staff who require more of your time. Consider boutique firms for easy communication and specialized service at competitive rates.
Thinking "the platform handles everything." Reality: Many hours of your team's time over 6-12 months.
Trying to start audit 2 months after deciding to pursue SOC 2. You need 3-6 months of access reviews, change logs, etc.
Beautiful 50-page policy manual that doesn't match reality. Auditors will test if you're following what you wrote.
Doing readiness assessment, finding 15 critical gaps, then starting audit next week. Budget multiple weeks or months for fixes.
Not documenting vendor security assessments for critical vendors. Need risk assessment for key vendors, not just collecting their SOC 2 reports from trust centers.
Enabling CloudTrail/audit logs 1 month before audit. Need 3-12 months of logs for Type II evidence.
Real questions from IT teams, developers, product owners, and founders:
Short answer: You technically can use spreadsheets, but how valuable is your time?
Why? Many auditors expect or even require automation platforms. You'll spend many, many hours manually collecting screenshots, updating spreadsheets, and chasing evidence - time that costs more than the platform fee. Platforms also reduce audit time (lower audit fees) and catch missing evidence before the auditor does.
But if you're a 5-person team with simple infrastructure, already have strong documentation habits, and found an auditor who accepts manual evidence, spreadsheets might work for your first audit. But plan to get a platform if you're scaling.
Short answer: Yes, temporarily. But less than you think for most professional services.
The first month will be time intensive with technical control implementation, MFA, logging, access controls, documenting client data handling. Expect administrative overhead. The ongoing overhead is maybe several hours/week for the security/compliance lead plus quarterly access reviews.
But proper access controls, document retention policies, and incident response planning often catch issues earlier. For technical services firms, the controls you implement often become capabilities you can sell.
Short answer: Probably. But it depends more on deal size and customer pressure than headcount.
When your internal person starts spending more than a few days per month on compliance, or when deals stall because you can't respond to security reviews quickly enough, outside help starts to make sense.
Under $2M ARR with smaller contracts, an internal owner (technical lead, operations manager) and an automation tool can likely handle the checkbox compliance questions. Budget maybe 2 days a month, give or take.
$2-10M ARR or closing $200K+ deals: Customers start shifting from "Do you have SOC 2?" to sending detailed questionnaires and requesting security calls. A fractional advisor (maybe $3-8K/month) could take the brunt of expertise requirements, while internal staff handles day-to-day tasks.
When to hire: When security gaps starts blocking deals, starts adding delays to sales cycles, or becomes an uncomfortable part of every enterprise conversation. Also hits earlier if you're in regulated sectors (healthcare, financial, legal) or handling sensitive data as clients expect deeper security programs regardless of your size. The threshold is more about when your internal owner is in over their head or security questions are costing you revenue.
Short answer: You don't get a satisfactory report, you've spent a lot of money, and you start the audit period over.
If there are material control failures, the auditor won't issue a report at all - they'll stop fieldwork. You fix the gaps and begin again from scratch (new timeline, new fees). If there are minor exceptions, you get a "qualified opinion" which is usable but looks bad and requires explanation to clients. Some clients may accept it, others won't.
How to avoid: Do a readiness assessment before the audit. Fix the critical gaps before starting. Don't start the audit to "see what happens" - that's expensive. For professional services, common failure points are inadequate client data classification, weak document retention policies, or lack of evidence for access reviews.
Short answer: No, it makes some things easier.
Remote-first companies skip physical security controls (office badges, visitor logs, camera systems). Your scope is cleaner: cloud infrastructure, endpoint security (MDM), and network access (VPN/zero-trust). Most automation platforms are built for cloud-native, remote-first companies.
What you need: Strong MDM enforcement (laptop encryption, screen lock), VPN or zero-trust network access, and solid employee device offboarding process. That's it for physical/endpoint controls.
Short answer: Yes, but be strategic about boundaries.
You can limit scope to specific service offerings or client segments (e.g., "Financial advisory services only" or "Services for healthcare clients only"). But shared infrastructure gets complicated — if Service Line A and B share any of the following, the auditor will pull those shared components into scope regardless of what your system description says:
You can't claim your access controls are effective for Service Line A while Service Line B's people have equivalent access through the same mechanisms. The control environment is the control environment.
Best approach: Either accept the shared layer and include it in scope (simpler), or segment the infrastructure so the boundary is real — separate cloud accounts, separate IAM groups, separate deployment pipelines. Trying to draw arbitrary lines through shared infrastructure creates audit headaches and credibility issues. If you can't create real separation, just bring it all in and accept the larger audit surface.
Short answer: A fair bit at first. Then a smaller bit.
Preparation phase: Security/compliance lead spends tons of time on SOC 2, IT/operations spends a lot on implementing controls. Evidence collection phase: several hours/week for security lead, minimal for others. Audit fieldwork: lots of interviews, then waiting. Post-audit: Back to normal with ongoing quarterly reviews.
SOC 2 is the price of admission to enterprise clients and regulated sectors. The alternative is losing large engagements to firms that have the attestation. So most accept the 3-month heavy lift to unblock growth. For professional services, this also demonstrates to clients that you take their data seriously - which can be a relationship strengthener, not just a compliance box to check.
Useful links, organized by category:
We do readiness assessments, AI red teaming, app penetration testing, and general "am I doing this right" support for SaaS companies selling into enterprise markets.
Get in Touch