SOC 2 Compliance: What It Is, Who Needs It, and How to Get Certified
2026-03-07
By Orbiq Team

SOC 2 Compliance: What It Is, Who Needs It, and How to Get Certified

A practical guide to SOC 2 compliance — what it is, how it differs from ISO 27001, what the Trust Services Criteria require, how the audit process works, and what European companies need to know about SOC 2 in a NIS2 and DORA world.

SOC 2
Compliance
Trust Services Criteria
Audit
ISO 27001
Security Certification

SOC 2 Compliance: What It Is, Who Needs It, and How to Get Certified

SOC 2 is the security attestation framework that US enterprise buyers expect. Developed by the AICPA (American Institute of Certified Public Accountants), it evaluates how service organizations protect customer data across five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy.

For European companies selling into the US market, SOC 2 is often the first compliance requirement buyers ask about. For companies already ISO 27001 certified, the overlap is significant — but the differences matter.

This guide covers what SOC 2 requires, how the audit works, how it relates to ISO 27001, and what European companies should consider.


What Is SOC 2?

SOC 2 is an attestation framework — not a certification in the traditional sense. A CPA (Certified Public Accountant) firm examines your controls against the Trust Services Criteria and issues a report describing what they found. The report is your evidence of compliance.

There are two types:

SOC 2 Type I

  • Evaluates control design at a point in time
  • Answers: "Are the right controls in place?"
  • Faster to obtain (weeks, not months)
  • Less valuable to buyers — shows intention, not execution

SOC 2 Type II

  • Evaluates control design and operating effectiveness over a period of time (typically 6-12 months)
  • Answers: "Do the controls actually work?"
  • Requires sustained compliance during the observation period
  • The standard buyers expect and the report auditors reference

The Five Trust Services Criteria

Security (Common Criteria) — Required

The Security criteria are included in every SOC 2 report. They cover:

  • CC1: Control Environment — Governance, organizational structure, management commitment
  • CC2: Communication and Information — Internal and external communication about security
  • CC3: Risk Assessment — Risk identification, analysis, and management
  • CC4: Monitoring Activities — Ongoing evaluation of controls
  • CC5: Control Activities — Policies and procedures for control implementation
  • CC6: Logical and Physical Access Controls — Authentication, authorization, physical security
  • CC7: System Operations — Monitoring, incident detection, response
  • CC8: Change Management — Controlled changes to infrastructure and software
  • CC9: Risk Mitigation — Vendor management, business continuity

Availability — Optional

Evaluates whether systems are operational and available as committed:

  • Uptime monitoring and performance management
  • Disaster recovery and business continuity
  • Capacity planning and infrastructure resilience
  • Incident response for availability events

Processing Integrity — Optional

Evaluates whether system processing is complete, valid, accurate, and timely:

  • Data validation and error handling
  • Processing monitoring and quality assurance
  • Output reconciliation and verification

Confidentiality — Optional

Evaluates how confidential information is protected:

  • Data classification and handling
  • Encryption and access controls for confidential data
  • Data retention and secure disposal
  • Confidentiality agreements and obligations

Privacy — Optional

Evaluates how personal information is collected, used, retained, disclosed, and disposed:

  • Privacy notices and consent management
  • Data subject rights (access, correction, deletion)
  • Data retention and disposal practices
  • Third-party data sharing controls

SOC 2 vs. ISO 27001

Both demonstrate security maturity, but they serve different markets and take different approaches:

AspectSOC 2ISO 27001
OriginAICPA (US)ISO/IEC (International)
TypeAttestation reportCertification
MarketPrimarily USInternational, strong in Europe
ApproachCriteria-based (Trust Services Criteria)Risk-based (Annex A controls)
ValidityReport covers a specific period (typically 12 months)Certificate valid for 3 years with annual surveillance
AuditorLicensed CPA firmAccredited certification body
OutputDetailed report with auditor's opinionCertificate + statement of applicability
FlexibilityChoose which Trust Services Criteria to includeChoose controls based on risk assessment
CostGenerally EUR 40,000-170,000 first yearGenerally EUR 30,000-100,000 first year

When You Need Both

Many European SaaS companies obtain both:

  • ISO 27001 for European enterprise buyers, NIS2/DORA alignment, and international credibility
  • SOC 2 for US enterprise buyers and the American market

The good news: approximately 70-80% of controls overlap. If you have one, achieving the other requires incremental effort, not starting from scratch.


The SOC 2 Audit Process

Phase 1: Readiness Assessment (1-3 months)

Before engaging an auditor:

  1. Define scope — Which systems, services, and Trust Services Criteria are included?
  2. Gap analysis — Compare current controls against SOC 2 requirements
  3. Remediate gaps — Implement missing controls, fix deficiencies
  4. Document policies — Write or update policies and procedures
  5. Collect evidence — Begin gathering evidence that controls are operating

Phase 2: Observation Period (Type II only, 6-12 months)

During the observation period:

  • Controls must be in operation and consistently followed
  • Evidence must be collected continuously (not retroactively)
  • Exceptions must be documented and addressed
  • Changes to controls must be managed and documented

Phase 3: Audit Fieldwork (2-6 weeks)

The auditor:

  1. Reviews documentation (policies, procedures, evidence)
  2. Tests controls through inquiry, observation, inspection, and re-performance
  3. Evaluates control design (Type I and II) and operating effectiveness (Type II only)
  4. Identifies any control deficiencies or exceptions
  5. Discusses findings with management

Phase 4: Report Issuance (2-4 weeks)

The auditor issues the SOC 2 report containing:

  • Section I: Management's assertion — Management's description of the system
  • Section II: Auditor's report — The auditor's opinion on control design and effectiveness
  • Section III: System description — Detailed description of the system, including infrastructure, software, people, and data
  • Section IV: Controls and tests — Description of each control, the test performed, and the test result
  • Section V (optional): Management's response — Management's response to any exceptions noted

Auditor's Opinion

The auditor issues one of three opinions:

  • Unqualified — Controls are suitably designed and operating effectively (clean report)
  • Qualified — Controls are generally effective, but one or more exceptions were noted
  • Adverse — Significant control deficiencies; the system doesn't meet the criteria

Common SOC 2 Controls

Access Management

  • Multi-factor authentication for production systems
  • Role-based access control with least privilege
  • Quarterly access reviews
  • Prompt access revocation for departing employees
  • Privileged access management with audit logging

Change Management

  • Code review requirements before deployment
  • Separation of development and production environments
  • Change approval workflows
  • Rollback procedures for failed deployments

Monitoring and Incident Response

  • Security event monitoring and alerting
  • Incident response plan and procedures
  • Incident classification and escalation
  • Post-incident review and remediation tracking

Vendor Management

  • Vendor risk assessment process
  • Security requirements in vendor contracts
  • Periodic vendor security review
  • Sub-processor management and notification

Data Protection

  • Encryption at rest and in transit
  • Data classification framework
  • Data retention and deletion procedures
  • Backup and recovery testing

SOC 2 for European Companies

When SOC 2 Makes Sense

  • You sell SaaS products to US enterprises
  • Your US prospects require SOC 2 during procurement
  • You compete against US-based vendors who already have SOC 2
  • You want to demonstrate security maturity in both US and European markets

When ISO 27001 May Be Enough

  • Your customers are primarily European
  • NIS2 or DORA compliance is your primary driver
  • Your European buyers ask for ISO 27001, not SOC 2
  • Budget constraints require prioritizing one framework

The European Regulatory Context

SOC 2 does not satisfy NIS2 or DORA requirements on its own:

  • NIS2 requires compliance with specific Article 21 measures — SOC 2 controls overlap significantly but don't cover all ten required areas
  • DORA has specific ICT risk management requirements that go beyond SOC 2's scope
  • GDPR requires specific data protection controls that SOC 2's Privacy criteria partially address

An ISMS built on ISO 27001 provides a stronger foundation for European regulatory compliance, with SOC 2 added for US market access.


Common Mistakes

  1. Starting with Type II before being ready. If your controls aren't mature, the observation period will surface exceptions that end up in the report. Start with a readiness assessment, fix gaps, then begin the Type II observation period.

  2. Scoping too narrowly or too broadly. Too narrow (excluding relevant systems) creates credibility issues with buyers. Too broad (including everything) increases cost and complexity. Scope should cover the systems and services your customers actually use.

  3. Treating SOC 2 as a one-time project. SOC 2 Type II is an annual requirement. Controls must operate continuously, evidence must be collected throughout the year, and the audit repeats every 12 months. Build sustainable processes, not a pre-audit sprint.

  4. Choosing the wrong auditor. Not all CPA firms have the same depth of technology and security expertise. Choose a firm with experience auditing companies of your size, in your industry, with your technology stack.

  5. Neglecting the system description. Section III of the SOC 2 report describes your system in detail. Buyers read this carefully. Invest time in making it accurate, complete, and clear — it shapes buyer perception of your security maturity.


How Orbiq Supports SOC 2 Compliance

  • Trust Center: Publish your SOC 2 report availability, Trust Services Criteria scope, and security controls for buyer due diligence
  • Continuous Monitoring: Track control effectiveness across SOC 2 criteria and identify gaps before your next audit
  • Evidence Management: Automated evidence collection mapped to Trust Services Criteria for streamlined audit preparation
  • AI-Powered Questionnaires: Respond to buyer security questionnaires using evidence from your SOC 2 programme

Further Reading


This guide is maintained by the Orbiq team. Last updated: March 2026.