What Matters
- -SOC 2 isn't a law - it's an audit standard, but enterprise customers treat it as a requirement for vendor selection
- -Type I confirms your controls exist; Type II confirms they work over time - enterprise customers want Type II
- -The five Trust Service Criteria are Security (mandatory), Availability, Processing Integrity, Confidentiality, and Privacy (choose what applies)
- -Plan for 6-12 months from starting SOC 2 prep to receiving your Type II report
- -Building SOC 2 controls into your app from day one costs 10-15% extra; retrofitting an existing product takes 3-6 months of dedicated work
A B2B SaaS startup spent 18 months building a product, signed up 40 small customers, and then landed a meeting with a Fortune 500 prospect. The deal was worth more than all existing customers combined.
Three weeks into the procurement process, the prospect's security team asked for a SOC 2 Type II report. The startup didn't have one. Didn't even have a Type I. The prospect said they'd revisit in 6-12 months - after the startup completed the SOC 2 process.
That deal didn't close for another year. And it's not an unusual story. In B2B SaaS, SOC 2 is the minimum bar for enterprise sales. If you don't have it when the prospect asks, you lose months of sales momentum.
What SOC 2 Actually Is
SOC 2 is an auditing framework, not a certification. An independent CPA firm examines your security controls and issues a report on whether they meet the AICPA's Trust Service Criteria. The report is your proof to customers that you take data protection seriously.
What it's not: SOC 2 isn't a government regulation. Nobody will fine you for not having one. But in the B2B world, it functions as a de facto requirement. Enterprise security teams use it as a filter - no SOC 2, no contract.
The two types:
Type I - Examines whether your controls are properly designed at a specific point in time. Think of it as a snapshot: "On March 15, 2026, these controls existed and were properly designed." Faster to get (2-3 months), but carries less weight with buyers.
Type II - Examines whether your controls operated effectively over a period (typically 3-12 months). This is the one enterprise customers want. It proves your security isn't just designed well - it actually works day in, day out.
Most companies get a Type I first (to demonstrate commitment while the observation period runs), then transition to Type II. Some skip Type I entirely and go straight to Type II if they can handle a longer timeline.
The Five Trust Service Criteria
SOC 2 is organized around five categories called Trust Service Criteria. Security is mandatory. The other four are optional - choose based on what your customers care about.
Security (Common Criteria) - Mandatory
Protection of information and systems against unauthorized access. This is the foundation of every SOC 2 audit.
What it covers:
- Access controls (who can access what, and how is that enforced?)
- Network security (firewalls, intrusion detection, network monitoring)
- Change management (how are code and infrastructure changes controlled?)
- Risk assessment (how do you identify and manage security risks?)
- Incident response (what happens when something goes wrong?)
- Vendor management (how do you vet and monitor third-party services?)
- Employee security (background checks, training, offboarding)
Availability - Recommended for SaaS
Your system is available for operation and use as committed. If you have uptime SLAs with customers, include this.
What it covers:
- Uptime monitoring and SLAs
- Disaster recovery and business continuity planning
- Capacity planning
- Backup and restore procedures
- Incident management for availability events
Processing Integrity - Recommended for Data/Finance Apps
System processing is complete, valid, accurate, timely, and authorized. Include this if your app processes transactions, calculations, or data transformations.
What it covers:
- Data processing accuracy and completeness
- Error detection and correction
- Input/output validation
- Processing monitoring
Confidentiality - Recommended When Handling Sensitive Business Data
Information designated as confidential is protected. Include this if you handle trade secrets, financial data, or other business-sensitive information.
What it covers:
- Data classification
- Encryption of confidential data
- Access restrictions to confidential information
- Secure data disposal
Privacy - Recommended When Handling Personal Information
Personal information is collected, used, retained, disclosed, and disposed of properly. Similar to GDPR requirements. Include this if you handle end-user personal data.
What it covers:
- Notice and consent for data collection
- Data subject access and correction rights
- Data retention and disposal
- Disclosure and sharing controls
Most B2B SaaS companies start with: Security + Availability. Add the others as your customer base and product mature.
What SOC 2 Controls Look Like in Practice
SOC 2 doesn't prescribe specific technologies. It defines objectives, and you choose how to meet them. Here's what typical controls look like for a SaaS app:
Access Controls
- Single sign-on (SSO) for all internal tools
- MFA required for all employees
- Role-based access with least-privilege principle
- Quarterly access reviews (verify people still need their access)
- Immediate access revocation when employees leave
Change Management
- All code changes require pull request reviews
- No direct commits to production branches
- Automated CI/CD pipelines with security checks
- Infrastructure changes tracked in version control (IaC)
- Change approval records maintained
Monitoring and Logging
- Centralized log collection (all application and infrastructure logs)
- Automated alerting on security events
- Log retention for 12+ months
- Regular log review (can be automated)
Incident Response
- Documented incident response plan
- Defined severity levels and escalation paths
- Post-incident review process
- Customer notification procedures for security incidents
Vendor Management
- Security assessment of all third-party vendors
- Annual vendor reviews
- Data processing agreements in place
- Vendor SOC 2 reports collected and reviewed
Employee Security
- Background checks for new hires
- Security awareness training (annual minimum)
- Acceptable use policies
- Clean desk / screen lock policies
The SOC 2 Timeline
| Phase | Duration | What Happens |
|---|---|---|
| Gap assessment | 2-4 weeks | Audit current controls against SOC 2 requirements, identify gaps |
| Remediation | 1-3 months | Implement missing controls, set up compliance tooling, write policies |
| Type I audit (optional) | 2-4 weeks | Auditor examines controls at a point in time |
| Observation period | 3-6 months (minimum 3) | Controls operate and are monitored. Evidence is collected continuously. |
| Type II audit | 4-6 weeks | Auditor reviews evidence from the observation period, tests controls |
| Report delivery | 2-4 weeks | Auditor writes and delivers the SOC 2 Type II report |
Total: 6-12 months from start to Type II report.
If your app was built with SOC 2 controls from the beginning (access controls, logging, change management baked into the development process), the remediation phase shrinks significantly and the observation period can start sooner.
How SOC 2 Affects Your App Architecture
| SOC 2 Requirement | Architecture Impact |
|---|---|
| Access controls | SSO integration, RBAC at the application level, session management, MFA support |
| Audit logging | Centralized logging pipeline, structured log format, 12-month retention |
| Encryption | Data encrypted at rest (AES-256) and in transit (TLS 1.2+) |
| Change management | CI/CD pipeline with code review gates, no manual production deployments |
| Monitoring | Application performance monitoring, error tracking, security event alerting |
| Data backup | Automated backups, tested restore procedures, defined RPO/RTO |
| Incident response | Alerting system, on-call rotation, status page for customer communication |
Compliance Automation Tools
Most companies use a compliance automation platform to manage SOC 2 evidence collection. These tools integrate with your infrastructure and continuously collect evidence that your controls are operating.
Popular options:
- Vanta - Integrates with AWS, GCP, Azure, GitHub, Jira, HR systems. Automates ~80% of evidence collection.
- Drata - Similar coverage. Good for companies needing multiple frameworks (SOC 2 + ISO 27001 + HIPAA).
- Secureframe - Focuses on speed to audit. Good onboarding experience.
These tools typically cost $10K-$30K/year, but they dramatically reduce the manual effort of collecting evidence and preparing for audits. Without them, you're managing spreadsheets and screenshots - which doesn't scale.
What SOC 2 Costs
| Component | Cost Range | Notes |
|---|---|---|
| Compliance automation platform | $10K-$30K/year | Vanta, Drata, or Secureframe |
| Remediation (implementing controls) | $20K-$100K+ | Depends on gap size. Building from scratch costs more than fixing gaps. |
| Auditor fees (Type II) | $20K-$80K | Depends on scope and auditor. Big 4 firms charge more. |
| Penetration test | $5K-$20K | Required annually by most auditors |
| Ongoing maintenance | $15K-$40K/year | Tool subscriptions, annual audit, policy updates |
Year 1 total: $50K-$200K+. Subsequent years: $30K-$80K (less remediation, same tooling and audit costs).
The ROI calculation: if SOC 2 unlocks one enterprise deal worth $100K+ ARR, it pays for itself. Most B2B SaaS companies find that SOC 2 removes the biggest objection in enterprise sales cycles.
Questions to Ask Your Development Partner
-
"Do you build apps with SOC 2 controls from the start?" - Look for: CI/CD with code review gates, centralized logging, RBAC, encryption at rest and in transit, automated backups. These should be standard practice, not add-ons.
-
"How do you handle change management in your development process?" - SOC 2 requires documented change management. Your partner should use pull requests, code reviews, and no-direct-commit policies as standard practice.
-
"What logging and monitoring do you include?" - Centralized logging and monitoring should be in the base architecture, not bolted on later. Ask about structured logging, log retention, and alerting.
-
"Have you worked with SOC 2 compliance platforms?" - Experience with Vanta, Drata, or similar tools means they understand what auditors look for and can build evidence-friendly controls.
-
"Can your architecture support a SOC 2 observation period from day one?" - If controls are in place from the first deployment, your observation period can start immediately after launch - shaving months off the timeline.
Your SOC 2 Readiness Checklist
Before development starts:
- Decide which Trust Service Criteria to include (Security is mandatory; add Availability, Processing Integrity, Confidentiality, Privacy as needed)
- Choose a compliance automation platform (Vanta, Drata, Secureframe)
- Select an audit firm (get proposals from 2-3 firms)
- Set your target timeline for Type II report
During development (build these in from day one):
- Implement SSO and MFA for all internal access
- Implement RBAC at the application level
- Set up centralized logging with 12+ month retention
- Implement encryption at rest (AES-256) and in transit (TLS 1.2+)
- Set up CI/CD with mandatory code reviews (no direct commits)
- Set up infrastructure as code (all infra changes version-controlled)
- Implement automated backups with tested restore procedures
- Set up application monitoring and security alerting
Before the observation period:
- Document all security policies (access management, incident response, change management, vendor management, acceptable use)
- Complete employee security training
- Run a penetration test and remediate findings
- Complete a risk assessment
- Connect all systems to your compliance automation platform
- Verify evidence is flowing correctly
During the observation period:
- Maintain all controls consistently (this is what the auditor evaluates)
- Conduct quarterly access reviews
- Respond to and document any security incidents
- Collect evidence of control operation (mostly automated by your platform)
SOC 2 is a repeating cycle - the report covers a specific period, and enterprise customers expect you to renew annually. The first year is the hardest. After that, it's maintenance and continuous improvement.
Frequently asked questions
SOC 2 (System and Organization Controls 2) is an auditing framework developed by the AICPA (American Institute of Certified Public Accountants). It evaluates how a company protects customer data across five criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. A SOC 2 report is issued by an independent CPA firm after auditing your controls. It's the most commonly requested security certification in B2B SaaS sales.
Related Articles
App Compliance Guide (Pillar)
Read articleHow to Evaluate AI Vendors
Read articleQuestions to Ask Your AI Vendor
Read articlePCI DSS Compliance Guide
Read articleFurther Reading
Related posts

App Compliance Laws Every Business Owner Should Know Before Building
GDPR, HIPAA, PCI DSS, SOC 2 - if you're building an app, the wrong compliance miss can cost millions. Here's every regulation you need to know, mapped by geography, industry, and data type.

GDPR Compliance for Apps: What Business Owners Must Know
GDPR isn't a European problem - it applies to any app that collects data from EU residents. Here's what the law requires, how it affects your app's architecture, and what to ask your development team before they write a line of code.

GDPR vs CCPA: Key Differences for Business Owners Building Apps
Your app serves both EU and California users? You need both GDPR and CCPA compliance - but they work differently. Here's a side-by-side comparison of what each law requires and where they clash.
