SOC 2 Compliance Checklist: The ONLY one Need | anecdotes

Batya Steinherz
May 23, 2024
May 5, 2021
Simplify the process of preparing for an audit with anecdotes’ SOC 2 Compliance checklist
Table of Contents

Are you chasing an endless trail of screenshots? Awake at 3:00 am, stressed about bugging your stakeholders for evidence--again? Wondering why you decided that this dang compliance framework was worth it?

Congrats! You must be preparing for a SOC 2 audit.

Soc 2 Compliance Checklist - How to Prepare for an Audit

Becoming compliant with SOC 2 is an important move in any company. Developed by The American Institute of Certified Public Accountants (AICPA), SOC 2 applies to nearly all businesses collecting, storing, and sharing customer data. Achieving compliance serves as a powerful external measure of competency and credibility, enabling organizations to feel confident about using your services.

But as important as it is to achieve SOC 2 compliance, it can be, shall we say, slightly stressful.

Organizations typically spend months preparing for an audit, setting up the needed controls and ensuring the existing compliance/security posture is optimal. A ton of manual work is required, which leaves plenty of room for errors to occur. This maddening situation has given the concept of prepping for SOC 2 somewhat of a negative image.

So to help you get there as painlessly as possible, we’ve created this SOC 2 Compliance checklist. Use it as a self-assessment tool to enable your organization to prepare for, and achieve, SOC 2 certification with less stress and worry.


Step 1 - Define the Scope of the Report

AICPA has outlined 5 Trust Service Criteria, which serve as the basis for audits and your organization must choose which criteria to be audited for. These are:

Security - How the business protects data, systems, and networks from breaches and attacks. This is also referred to as the Common Criteria, the most prominent—and only mandatory—section of any SOC 2 audit.  

Availability - How the business ensures the uptime of systems.  

Confidentiality - How the business ensures the data it stores remains confidential.

Processing Integrity - How the business ensures that processing is, in the words of the AICPA, complete, valid, accurate, timely, and authorized.

Privacy - How the business collects, uses, shares, stores, and deletes personally identifiable information (PII).

The only required criteria is the Security, or Common, Criteria. The remaining ones are not required, but may be required by certain organizations—for example, organizations storing sensitive financial data may require organizations they partner with to include the Confidentiality Criteria. Other businesses where uptime is critical may require partners to include the Availability Criteria. On the other hand, many businesses won’t opt to fulfil the Privacy Criteria, as they are already working towards aligning their privacy efforts with the requirements needed for GDPR compliance.

So which ones should you choose to include on your SOC 2 checklist? It depends on what you’re hearing from your leads—what is most important to them?

Step 2 - Pick the Type of Report

The next step on your SOC 2 Compliance checklist is selecting the type of report. There are two flavors of SOC 2 reports - Type 1 and Type 2. Which one should you choose? Here’s how to determine which one meets your needs better:

SOC 2 Type 1 assesses security design controls at a specified point in time. The intention is to demonstrate that best practices are being followed and is a fast and relatively easy way to show customers that security is important to your organization. It’s sort of like looking at your kid’s latest math test. The grade on the test is an indication of her performance at one point in the year.

SOC 2 Type 2 assesses your organization's security design controls but goes much deeper and examines how effectively the controls are managed and upheld over a specified period of time, instead of simply looking at one point in time. This is more similar to a cumulative grade given at the end of the year, to assess how well your kid did over the course of many months.

SOC 2 evidence collection for Type 2 is definitely harder to prepare for and achieve, but is the gold standard in InfoSec Compliance, and further, may be required by some organizations.

Step 3 - Self-Evaluate Your SOC 2 Readiness

Now is the time to check your SOC 2 readiness: evaluate your controls and look for any gaps or deficiencies. Start by gathering any evidence you've got regarding procedure documentation or policies, based on the criteria you've chosen to include in the audit. You may have some of this information from other Compliance frameworks your organization may be compliant with. The key here is to tick off this step on your SOC 2 Compliance checklist early ie. do the SOC 2 evidence collection well in advance of the audit, since there will likely be many gaps to be filled.

Step 4 - Work on Remediating Gaps

In this final SOC 2 Compliance checklist step, create a plan to address the SOC 2 requirements gaps identified in Step 3. This plan should include changing process workflows, setting up new security controls, and adding in missing policies, if needed. Once you have addressed the gaps, test them to determine if your remediation plan was successful. Rinse and repeat as necessary.

That’s it!!

Make Achieving SOC 2 Compliance Simple

Okay, we know you don’t assume it’s going to be a breeze...and if you do, well, think again. But the thing is that as complex as achieving SOC 2 compliance is, it doesn't have to be quite so arduous. With automated evidence collection, organizations can take the frustrations out of meeting SOC 2.

With the right solution, you can automate SOC 2 and collect hundreds of pieces of (normalized) evidence in minutes to meet your compliance SOC 2 requirements simply and easily. Using a SOC checklist can help you achieve Compliance easily and seamlessly.

Stick around as we share more SOC 2 checklist tips and tricks that might even make you say, "hey, prepping for SOC 2 isn't so bad after all!"

Batya Steinherz
Veteran explainer of complicated stuff. Loves all things coffee and cyber security-related (yes, even Compliance). Content Marketing Manager at anecdotes.
Link 1
Link 1
Link 1