ComplianceCheckup

Compliance Checklist

SOC 2 Compliance Checklist (2026)

Authority: American Institute of CPAs (AICPA)Updated: 2026-01Official source
Disclaimer: This checklist is for informational purposes only and does not constitute legal advice. Compliance requirements vary by jurisdiction, business type, and circumstances. Always consult a qualified attorney or compliance professional before making compliance decisions.
0%
0 of 36 items complete

Security — CC1: Control Environment

CC1.1–CC1.5Official source

Security — CC2: Communication

CC2.1–CC2.3Official source

Security — CC3: Risk Assessment

CC3.1–CC3.4Official source

Security — CC4: Monitoring

CC4.1–CC4.2Official source

Security — CC5: Control Activities

CC5.1–CC5.3Official source

Security — CC6: Logical & Physical Access

CC6.1–CC6.8Official source
CC6.2Official source

Security — CC7: System Operations

CC7.1–CC7.5Official source

Security — CC8: Change Management

CC8.1Official source

Security — CC9: Risk Mitigation

CC9.1–CC9.2Official source
CC9.1Official source

Availability — A1 (Optional)

A1.1Official source
A1.2Official source
A1.3Official source

Processing Integrity — PI1 (Optional)

PI1.1Official source
PI1.2Official source
PI1.3Official source

Confidentiality — C1 (Optional)

C1.1Official source
C1.2Official source
C1.2Official source
C1.2Official source

Privacy — P1–P8 (Optional)

P1.1Official source
P2.1Official source
P3.1Official source
P4.1Official source
P5.1Official source
P6.1Official source
P7.1Official source
P8.1Official source

SOC 2 Audit Process

AICPA SOC 2 GuideOfficial source
AICPA SOC 2 GuideOfficial source
AICPA SOC 2 GuideOfficial source
AICPA SOC 2 GuideOfficial source
AICPA SOC 2 GuideOfficial source
AICPA SOC 2 GuideOfficial source
AICPA SOC 2 GuideOfficial source

What is SOC 2 and who needs it?

SOC 2 (System and Organization Controls 2) is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA). Unlike regulations such as GDPR or HIPAA, SOC 2 is not a legal requirement — it is a voluntary standard. However, it has become the de facto security credential expected by enterprise customers before purchasing B2B software. SaaS companies, cloud infrastructure providers, data processors, and managed service providers are most frequently asked to demonstrate SOC 2 compliance. If your sales team is losing deals to "do you have a SOC 2 report?" questions, this checklist is your readiness roadmap.

SOC 2 is structured around Trust Services Criteria (TSC): Security (CC criteria, mandatory for all reports), Availability (A1), Processing Integrity (PI1), Confidentiality (C1), and Privacy (P1–P8). Most companies start with Security only. Adding Availability is common for uptime-sensitive infrastructure services. Including all five criteria significantly increases audit scope and cost.

SOC 2 Type 1 vs Type 2 — which do you need?

A SOC 2 Type 1 report assesses whether your controls are suitably designed at a single point in time. It is faster to obtain (typically 2–4 months) and less expensive. A SOC 2 Type 2 report assesses whether your controls operated effectively over a period of time — typically 6 or 12 months. Enterprise customers and regulated industries almost always require Type 2. The typical path is: implement controls → get Type 1 report → operate for 6–12 months → get Type 2 report.

SOC 2 audits must be conducted by a licensed CPA firm. Costs typically range from $20,000 to $80,000+ depending on scope and auditor. Readiness assessments ($5,000–$15,000) are strongly recommended before the formal audit to identify gaps. Unlike PCI DSS, SOC 2 does not prescribe specific controls — it defines objectives, and you choose how to meet them. This means thorough documentation and evidence collection is critical: policies, logs, access reviews, and change records must all be demonstrable to the auditor.

How to use this SOC 2 readiness checklist

Start with the Security (CC) criteria — they are mandatory for every SOC 2 report. The most common gaps found in readiness assessments are: lack of formal quarterly access reviews (CC6.2), missing MFA enforcement (CC6.1), undocumented change management procedures (CC8.1), and absent vendor risk management (CC9.2). Address these first.

Each checklist item includes a reference to the relevant Trust Services Criterion. Document all evidence as you go — policies should be written and version-controlled, and operational controls should produce logs or records that can be provided to auditors. If you also handle EU data, review our GDPR checklist; if you process payments, see the PCI DSS checklist. Download the PDF to share your readiness status with your CPA firm or internal stakeholders.

Frequently Asked Questions

Are there penalties for failing a SOC 2 audit?
SOC 2 is not a legal requirement, so there are no government-imposed fines. However, failing or losing your SOC 2 report has serious commercial consequences: enterprise customers may terminate contracts, prospects will choose compliant competitors, and cyber insurance premiums typically increase. The cost of remediation after a failed audit often exceeds the original audit cost.
What is SOC 2 and is it required by law?
SOC 2 is an auditing standard developed by the AICPA that evaluates how well a service organisation manages customer data security. Unlike GDPR or HIPAA, SOC 2 is not a law — it is a voluntary framework. However, enterprise B2B customers increasingly require SOC 2 Type II reports as a condition of signing contracts.
What is the difference between SOC 2 Type I and Type II?
SOC 2 Type I evaluates the design of controls at a single point in time (does the control exist and is it designed well?). SOC 2 Type II evaluates both the design and operational effectiveness of controls over a period of at least 6 months (did the control actually operate consistently?). Enterprise customers almost always require Type II.
How long does it take to get a SOC 2 report?
A first SOC 2 Type II audit typically takes 9–12 months from start to report: 1–3 months to prepare and implement controls, then a minimum 6-month observation period for the auditor, plus 1–2 months for the auditor to write and issue the report. Using compliance automation software (Vanta, Drata, Secureframe) can reduce preparation time significantly.
How much does SOC 2 cost?
A SOC 2 audit by a CPA firm typically costs $20,000–$60,000 depending on scope and the firm. Compliance automation platforms cost $10,000–$30,000 per year but can reduce audit preparation time by 50–70% by automatically collecting evidence. Total first-year cost is often $30,000–$80,000 all-in.
What are the five Trust Services Criteria?
Security (CC) — mandatory for all SOC 2 reports. Availability — systems are available for operation and use as committed. Processing Integrity — processing is complete, valid, accurate, and timely. Confidentiality — confidential information is protected as committed. Privacy — personal information is collected, used, retained, and disclosed in accordance with commitments.

Related compliance checklists