Get the App

Chapter 1 of 8

What Is SOC 2 and Why Does It Matter?

Introduces SOC 2, its purpose, and how it fits into the broader ecosystem of security and compliance frameworks for service organizations.

15 min readen

1. Big Picture: Why SOC 2 Exists

When organizations move to the cloud or outsource IT services, they are trusting another company with their data and operations. Customers, regulators, and partners need evidence that these service providers handle data securely and reliably.

This is where SOC reports come in.

What is SOC?

  • SOC stands for System and Organization Controls.
  • It is a reporting framework created and maintained by the AICPA (American Institute of Certified Public Accountants).
  • SOC reports are issued by independent CPA firms (or equivalent licensed firms) after auditing a service organization.

Where SOC 2 Fits

  • SOC 2 is one type of SOC report, focused on trust and security controls.
  • It is especially important for:
  • Cloud providers (IaaS, PaaS, SaaS)
  • Managed service providers (MSPs, MSSPs)
  • Fintech, health-tech, HR tech, and other data-heavy services

By the end of this module (about 15 minutes), you should be able to:

  • Explain what SOC 2 is and who created it
  • Distinguish SOC 2 from SOC 1 and SOC 3
  • Explain why customers, regulators, and partners care about SOC 2 reports today (as of late 2025)

2. The AICPA SOC Reporting Framework

Who created SOC 2?

  • The AICPA (American Institute of Certified Public Accountants) created and maintains the SOC reporting framework.
  • It replaced older terms like SAS 70 (phased out over a decade ago) with a more structured system: SOC 1, SOC 2, and SOC 3.

Key points about the framework

  • Standardized: Uses AICPA guidance so reports are comparable across organizations.
  • Audit-based: A licensed CPA firm performs the audit and issues the report.
  • Control-focused: Looks at controls (policies, processes, technologies) that a service organization has in place.

Why this matters now

  • As of 2025, SOC 2 has become a de facto expectation for many B2B technology providers.
  • It is often a prerequisite for enterprise deals, especially in finance, healthcare, and large-scale SaaS.

Think of the AICPA SOC framework as a common language that lets companies communicate "how we protect your data" in a structured, audited way.

3. SOC 1 vs SOC 2 vs SOC 3 (High-Level Differences)

SOC reports come in three main flavors. At a high level:

| Report Type | Main Focus | Typical Audience | Example Use Case |

|------------|-----------|------------------|------------------|

| SOC 1 | Internal controls over financial reporting (ICFR) | Auditors, CFOs, finance teams | Payroll provider whose calculations affect a client's financial statements |

| SOC 2 | Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy) | Security teams, risk managers, customers | SaaS platform storing customer data in the cloud |

| SOC 3 | Same criteria as SOC 2, but high-level and public | General public, marketing | Public "trust report" summarizing controls without sensitive detail |

Key distinctions

  • SOC 1: Financial impact focus — “Could this service affect our financial statements?”
  • SOC 2: Security & trust focus — “Can we trust this service with our data and operations?”
  • SOC 3: Marketing-friendly version of SOC 2 — “Here’s a public, simplified trust report we can share widely.”

When someone says “We need your SOC report”, in modern practice they almost always mean SOC 2, unless they are specifically concerned about financial reporting.

4. What Exactly Is SOC 2?

Definition

SOC 2 is an independent auditor’s report on how well a service organization’s controls meet the AICPA Trust Services Criteria (TSC).

The current TSC (as of 2025) are:

  1. Security (required for all SOC 2 reports)
  2. Availability
  3. Processing Integrity
  4. Confidentiality
  5. Privacy

Organizations choose which criteria to include, but Security is always included.

Types of SOC 2 reports

  • Type I: Are the controls designed appropriately at a point in time?
  • Snapshot on a specific date.
  • Type II: Are the controls designed and operating effectively over a period of time?
  • Typically covers 6–12 months.
  • Much more valuable to customers.

What a SOC 2 report usually contains

  • Management’s description of the system
  • Control objectives and related controls
  • Tests performed by the auditor
  • Results of those tests (including exceptions/findings)
  • The auditor’s opinion (e.g., unmodified/clean, qualified)

SOC 2 is not a certification like ISO 27001; it is an attestation report: an independent auditor attests to whether controls met the criteria.

5. Service Organizations, User Entities, and a Concrete Scenario

To understand SOC 2, you need to know the roles:

  • Service organization: The company providing services (e.g., a cloud-based HR platform).
  • User entity: The customer organization using that service.
  • User auditor: The external auditor of the user entity (e.g., the company’s financial auditor or IT auditor).

Example Scenario

Company A is a mid-size bank.

  • It uses CloudHR, a SaaS HR system, to store employee data and manage payroll inputs.
  • CloudHR is the service organization.
  • Company A is the user entity.

#### What Company A cares about

  • Is employee data secure (no unauthorized access)?
  • Is the system available when needed (no excessive downtime)?
  • Are data and calculations processed correctly (processing integrity)?

#### How SOC 2 helps

CloudHR undergoes a SOC 2 Type II audit covering Security, Availability, and Confidentiality.

  • The report shows:
  • Access controls (e.g., SSO, MFA, role-based access)
  • Change management (e.g., code reviews, testing)
  • Incident response procedures
  • Data encryption practices
  • Company A’s security team reviews this report as part of vendor risk management.

Instead of sending long security questionnaires, Company A can rely heavily on the independent SOC 2 report as evidence that CloudHR meets its security expectations.

6. Thought Exercise: Choosing the Right SOC Report

Imagine you are the CISO (Chief Information Security Officer) of a fast-growing startup. Match each situation with the most relevant SOC report type.

Situation A

You are outsourcing payroll processing. Your auditors are concerned about whether errors at the payroll provider could impact your financial statements.

Situation B

You are buying a cloud CRM platform to store customer contact info and sales data. Your main concern is data security and uptime.

Situation C

Your marketing team wants a publicly shareable document to show on your website that an independent auditor reviewed your controls.

---

Your task:

  1. For each situation (A, B, C), write down:
  • Which report you would ask for (SOC 1, SOC 2, or SOC 3)
  • One brief reason why.
  1. Then compare your answers against this solution key (no peeking first):

<details>

<summary>Show suggested answers</summary>

  • Situation A → SOC 1

Because the payroll provider’s controls affect your financial reporting.

  • Situation B → SOC 2

Because you care about security, availability, and other trust services criteria for a cloud service.

  • Situation C → SOC 3

Because you want a public, high-level report suitable for marketing and general publication.

</details>

7. Regulatory and Market Drivers for SOC 2 (2025 Context)

SOC 2 is not a law or regulation by itself. However, it is heavily driven by regulatory expectations and market pressure.

Regulatory & standards landscape (as of late 2025)

  • Data protection & privacy laws:
  • GDPR (EU, in force since 2018) and similar laws worldwide (e.g., California’s CCPA/CPRA, Brazil’s LGPD) expect organizations to use appropriate security controls and manage third-party risk.
  • SOC 2 reports provide evidence to regulators and internal compliance teams that third parties are being vetted.
  • Financial sector guidance:
  • Banking and fintech regulators often require robust third-party risk management.
  • SOC 2 is frequently used as part of vendor due diligence.
  • Healthcare & other regulated sectors:
  • In the US, HIPAA requires safeguards for protected health information (PHI). A SOC 2 report (especially including Security & Privacy criteria) helps show that a service provider has relevant controls.

Market expectations

  • Large enterprises often include a SOC 2 Type II report as a mandatory requirement in vendor onboarding.
  • Investors and acquirers (e.g., in M&A deals) routinely ask for SOC 2 reports when assessing security posture.
  • Competing frameworks like ISO/IEC 27001 and SOC 2 often coexist; many companies pursue both to satisfy different regions and customers.

Key idea: SOC 2 has become a market standard way to demonstrate security and control maturity—even though no single law says “you must have SOC 2.”

8. Quick Check: SOC 1 vs SOC 2 vs SOC 3

Test your understanding of the three SOC report types.

Which pairing is MOST accurate?

  1. SOC 1 = security and privacy; SOC 2 = financial reporting; SOC 3 = public financial summary
  2. SOC 1 = financial reporting controls; SOC 2 = trust services criteria; SOC 3 = public, high-level version of SOC 2
  3. SOC 1 = internal IT help desk; SOC 2 = HR processes; SOC 3 = marketing controls
Show Answer

Answer: B) SOC 1 = financial reporting controls; SOC 2 = trust services criteria; SOC 3 = public, high-level version of SOC 2

SOC 1 focuses on internal controls over financial reporting (ICFR). SOC 2 focuses on the AICPA Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy). SOC 3 is a public, simplified version of a SOC 2 report that omits sensitive details.

9. Quick Check: SOC 2 Type I vs Type II

Now check your understanding of SOC 2 report types.

What is the MAIN difference between a SOC 2 Type I and Type II report?

  1. Type I is for security; Type II is for privacy
  2. Type I is performed by internal auditors; Type II is performed by external auditors
  3. Type I evaluates design of controls at a point in time; Type II evaluates design AND operating effectiveness over a period of time
Show Answer

Answer: C) Type I evaluates design of controls at a point in time; Type II evaluates design AND operating effectiveness over a period of time

A SOC 2 Type I report looks at whether controls are suitably designed as of a specific date. A SOC 2 Type II report looks at whether controls are suitably designed AND operating effectively over a defined review period (often 6–12 months).

10. Flashcards: Core SOC 2 Vocabulary

Use these flashcards to reinforce key terms.

SOC (System and Organization Controls)
An AICPA framework for reporting on controls at service organizations, including SOC 1, SOC 2, and SOC 3 reports.
SOC 2
An independent auditor’s report on a service organization’s controls relevant to the AICPA Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy).
Trust Services Criteria (TSC)
AICPA criteria used in SOC 2 and SOC 3 engagements: Security (required), plus Availability, Processing Integrity, Confidentiality, and Privacy.
Service Organization
A company that provides services (often cloud or outsourced services) that can impact its customers’ data, operations, or financial reporting.
User Entity
An organization that uses the services of a service organization; it relies on SOC reports to evaluate the service provider’s controls.
SOC 2 Type I
A SOC 2 report that evaluates whether controls are suitably designed at a specific point in time.
SOC 2 Type II
A SOC 2 report that evaluates whether controls are suitably designed and operating effectively over a defined period (typically 6–12 months).
SOC 3
A public, high-level report based on the same Trust Services Criteria as SOC 2, but without detailed control descriptions or test results.

11. Applying SOC 2 in Practice: Vendor Evaluation Exercise

Imagine you are on the security team of a university that wants to adopt a new cloud-based learning management system (LMS) to host courses and student data.

The LMS vendor sends you these documents:

  • A SOC 2 Type II report (Security, Availability, Confidentiality) for the last 12 months
  • An ISO/IEC 27001 certificate
  • A short SOC 3 report they post publicly on their website

Your task

  1. In your own notes, answer:
  • Which document would you examine first to understand detailed security controls and test results?
  • Why might the SOC 3 still be useful, even though it is less detailed?
  • How could the SOC 2 support your university’s compliance with privacy regulations (e.g., student data protections)?
  1. Compare with this suggested reasoning:

<details>

<summary>Show suggested reasoning</summary>

  • You would likely start with the SOC 2 Type II report, because it:
  • Covers a full year of control operation
  • Includes detailed descriptions of controls and test results
  • Addresses Security, Availability, and Confidentiality, which are critical for student data and uptime.
  • The SOC 3 report is useful as a public-facing assurance artifact you can share with non-technical stakeholders (e.g., faculty, administration) without exposing sensitive details.
  • The SOC 2 report supports privacy and data protection compliance by providing evidence that the vendor has appropriate access controls, encryption, incident response, and other safeguards expected by modern privacy regulations.

</details>

12. Wrap-Up: Why SOC 2 Matters Today

To recap the essentials:

  • SOC 2 is an AICPA-created framework for reporting on a service organization’s controls related to the Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy).
  • It is different from SOC 1 (financial reporting focus) and SOC 3 (public, high-level version of SOC 2).
  • Service organizations (e.g., cloud providers, SaaS companies) undergo SOC 2 audits; user entities (their customers) rely on these reports for vendor risk management and compliance.
  • As of 2025, SOC 2 is driven by:
  • Regulatory expectations around third-party risk and data protection
  • Market pressure from customers, partners, and investors who expect independent proof of security controls
  • A SOC 2 Type II report is often considered the gold standard for demonstrating ongoing, effective security and reliability controls over time.

If you can now:

  • Explain what SOC 2 is and who created it,
  • Distinguish SOC 2 from SOC 1 and SOC 3 at a high level,
  • Describe why customers, regulators, and partners ask for SOC 2 reports,

then you have achieved this module’s learning objectives.

Key Terms

AICPA
American Institute of Certified Public Accountants; the professional body that created and maintains the SOC reporting framework.
SOC 1
A SOC report focused on controls at a service organization that are relevant to user entities’ internal control over financial reporting.
SOC 2
An attestation report on a service organization’s controls relevant to the AICPA Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.
SOC 3
A public, high-level report based on the same Trust Services Criteria as SOC 2, but without detailed control descriptions or testing results.
User Entity
An organization that uses the services of a service organization and relies on SOC reports to evaluate the provider’s controls.
SOC 2 Type I
A SOC 2 report that assesses whether controls are suitably designed at a specific point in time.
SOC 2 Type II
A SOC 2 report that assesses whether controls are suitably designed and operating effectively over a defined review period, commonly 6–12 months.
Service Organization
An organization that provides services (often IT or cloud-based) that can affect its customers’ data, operations, or financial reporting.
Vendor Risk Management
The process by which an organization assesses and monitors the risks posed by third-party service providers, often using SOC 2 reports as evidence.
Trust Services Criteria (TSC)
AICPA criteria used in SOC 2 and SOC 3 engagements: Security, Availability, Processing Integrity, Confidentiality, and Privacy.
SOC (System and Organization Controls)
A family of reporting frameworks (SOC 1, SOC 2, SOC 3) used to report on controls at service organizations.