Announcement: We’re excited to share that we’ve raised our next investment round, led by People Ventures and EIFO
SOC 2 can feel abstract until you connect it to the day-to-day controls your team already runs: access reviews, logging, backups, change approvals, incident drills, and vendor checks.
The SOC 2 Trust Services Criteria (TSC) are the evaluation framework auditors use to determine whether those controls are suitably designed and operating effectively.
For startups and growing SaaS companies, the most practical approach is to treat the Trust Services Criteria as structured control categories and intentionally scope which criteria apply based on your service commitments, system boundaries, and data handling practices.
SOC 2 is an AICPA attestation framework for service organizations.
The Trust Services Criteria define how auditors assess controls relevant to the security, availability, processing integrity, confidentiality, and privacy of a system.
There are five criteria:
Security is often referred to as the Common Criteria because it forms the required baseline.
The other four criteria are included only if they are relevant to the services described in your system description. However, once a criterion is included in scope, all applicable controls under that criterion must be met and tested.
“Optional” refers to scoping, not reduced rigor.
A SOC 2 report is only as effective as its scope.
Include criteria that do not reflect your actual service commitments and you create unnecessary operational burden. Exclude criteria that enterprise buyers expect and security reviews may stall.
A practical scoping framework:
What failure would most materially impact customers: breach, downtime, incorrect processing, or data misuse?
What do you contractually commit to: uptime targets, RTO/RPO, confidentiality obligations, breach notification timelines?
What data do you process: internal-only data, confidential business data, or regulated personal information?
Many B2B SaaS companies begin with Security + Confidentiality. Organizations offering uptime guarantees or mission-critical workflows often add Availability.
Scope should reflect your real risk profile and customer expectations, not aspirational positioning.
When planning your SOC 2 audit, you must decide between a Type I and Type II report.
A SOC 2 Type I evaluates whether controls are suitably designed at a specific point in time.
A SOC 2 Type II evaluates whether controls are both suitably designed and operating effectively over a defined observation period, typically three to twelve months.
Early-stage companies sometimes begin with Type I to demonstrate initial control design. However, most enterprise buyers prefer a Type II report because it provides evidence of sustained operating effectiveness.
If enterprise sales acceleration is a priority, planning directly for a SOC 2 Type II often avoids duplicative audit cycles.
Purpose: Protect systems against unauthorized access, unauthorized disclosure, and security events.
Security is mandatory in every SOC 2 report and forms the backbone of the Trust Services Criteria.
Auditors evaluate whether your organization consistently maintains:
Even when additional criteria are included, Security remains the structural foundation of your SOC 2 program.
Control: “Terminated users lose access promptly.”
Evidence may include:
Auditors test whether controls are operating consistently over time, not whether policies merely exist.
Purpose: Ensure systems remain available as committed or agreed with customers.
Availability is relevant when uptime, recoverability, or service continuity are material to your service commitments.
Auditors evaluate whether you:
This criterion commonly aligns with business continuity and disaster recovery controls.
If uptime guarantees or operational continuity are part of your contractual commitments, Availability is typically in scope.
Purpose: Ensure that system processing is accurate, complete, timely, and authorized.
Processing Integrity is most relevant when your service’s value depends on the correctness of outputs, such as billing systems, analytics pipelines, financial calculations, or automated workflows.
Auditors assess whether processing produces intended results without unauthorized manipulation.
Strong Processing Integrity includes both preventive controls (validation, approvals, test coverage) and detective controls (reconciliations, anomaly detection).
Purpose: Protect information designated as confidential in accordance with commitments.
Confidentiality extends beyond personal data. It may include:
Your policies must clearly define what constitutes confidential information, and your technical and administrative controls must enforce that definition.
Auditors typically validate Confidentiality through encryption settings, data flow documentation, and access review evidence.
Purpose: Govern the collection, use, retention, disclosure, and disposal of personal information in accordance with organizational commitments.
The Privacy criterion aligns with the AICPA’s Generally Accepted Privacy Principles (GAPP).
Privacy is typically included when:
Merely processing personal data does not automatically require including the Privacy criterion. Inclusion depends on how your system description and commitments are defined.
Auditors evaluate whether privacy commitments are operationalized, not just documented.
Each SOC 2 Trust Services Criterion maps to defined controls and recurring evidence.
Examples:
Exact testing procedures vary based on scope and auditor methodology.
Auditors evaluate:
A useful control structure:
Most audit findings stem from inconsistent execution or missing evidence, not absence of intent.
Common evidence types:
Consistency and documentation maturity make SOC 2 audits predictable.
SOC 2 programs become inefficient when evidence is fragmented across tools and stakeholders.
Automation improves reliability by:
Platforms like Klaay support this model by centralizing SOC 2 controls, automating evidence collection across integrated systems, and maintaining continuous monitoring aligned to the Trust Services Criteria. For lean teams, this reduces manual coordination and keeps audit readiness continuous rather than deadline-driven.
Automation does not replace governance decisions or control ownership.
You still need:
Automation increases efficiency. Operational discipline maintains compliance integrity.
If you’re mapping controls to the Trust Services Criteria for the first time, a centralized system can prevent drift and reduce audit back-and-forth. Klaay is designed to streamline SOC 2 audit preparation for SaaS teams.
Before drafting policies, create a concise scope statement defining:
That scope statement determines:
Once scope is intentionally defined and controls are operating consistently, the SOC 2 Trust Services Criteria stop reading like compliance terminology and start functioning as a structured security operating model:
When implemented thoughtfully, SOC 2 becomes less about passing an audit and more about sustaining operational maturity.