March 24, 2026|12 min read

SOC 2 Compliance Checklist — The Definitive Guide

A complete SOC 2 compliance checklist organized by Trust Services Criteria. Timeline, costs, pitfalls, and how to pass your audit without losing your mind.

T
The Dictiva Team
Share

The Checklist You Wish You Had Six Months Ago

Every major outage in the history of technology has the same root cause: someone changed something. Usually on a Friday. Usually without telling anyone. SOC 2 exists, in large part, to make sure that when someone changes something, there's a documented trail explaining why it seemed like a good idea at the time.

If you're staring down a SOC 2 compliance checklist for the first time, you've probably noticed something: the AICPA doesn't actually hand you a checklist. They hand you a framework of Trust Services Criteria and wish you the best. What you do with it is between you and your auditor.

This guide fixes that. Below is a practical, organized SOC 2 compliance checklist broken down by each Trust Services Category, with timelines, cost expectations, and the specific mistakes that turn a manageable project into a twelve-month ordeal.

Type I vs Type II — Know What You're Signing Up For

Before you start checking boxes, decide which report you're pursuing. This decision shapes everything that follows.

SOC 2 Type ISOC 2 Type II
ScopeControls designed appropriately at a point in timeControls operating effectively over 3-12 months
Observation periodNone — it's a snapshot3-12 months (6 months is standard)
Audit cost$20,000-$50,000$30,000-$100,000
Time to complete4-8 weeks after controls are ready6-12 months total
Enterprise credibilityAcceptable as a first stepThe actual standard
RenewalOne-time, no renewalAnnual re-audit required

The pragmatic path: Get Type I to unblock sales conversations now. Start your Type II observation window the day after your Type I report is issued. Within 12-18 months, you'll have both. For a deeper look at the startup-specific calculus, see our SOC 2 for startups guide.

The Five Trust Services Criteria

SOC 2 is built on five categories defined by the AICPA's Trust Services Criteria. Security is mandatory. The rest are optional — include them when customer contracts or your risk profile demand it.

CriteriaAlso Known AsRequired?Include If...
SecurityCommon Criteria (CC1-CC9)Yes, alwaysYou exist
AvailabilityA1OptionalYou have SLA commitments
Processing IntegrityPI1OptionalYou process transactions or calculations
ConfidentialityC1OptionalYou handle sensitive business data
PrivacyP1-P8OptionalYou process personal information

Most first-time audits cover Security plus one or two additional categories. Adding all five because it "looks better" is a strategy roughly equivalent to ordering the entire menu at a restaurant — expensive, wasteful, and you'll regret it by the third course.

The Complete SOC 2 Compliance Checklist

What follows is organized by Trust Services Category. Each item represents a control area your auditor will evaluate. Not every item applies to every organization — scoping is half the battle.

Security (Common Criteria) — Required

This is the foundation. If your SOC 2 were a building, Security would be the structural concrete. Everything else is interior design.

#Control AreaWhat to Document & Implement
1Control environmentBoard/management oversight of security, defined org structure, code of conduct
2Risk assessmentFormal risk assessment process, annual review cycle, risk register
3Information & communicationSecurity policies communicated to all employees, incident reporting channels
4Monitoring activitiesRegular review of controls, internal audit function, deficiency tracking
5Logical access controlsRBAC implementation, least privilege, MFA on all remote access
6Access provisioningDocumented approval workflows for new access, role-based templates
7Access revocationRevocation within 24 hours of termination, quarterly access reviews
8Change managementDocumented change process, peer review, approval gates, rollback procedures
9System monitoringCentralized logging, alerting, SIEM or equivalent, log retention policy
10Incident responseDocumented IR plan, defined roles, communication templates, post-incident review
11Vulnerability managementRegular scanning, patching SLAs, penetration testing (annual minimum)
12EncryptionData encrypted in transit (TLS 1.2+) and at rest, key management procedures
13Network securityFirewall rules, network segmentation, intrusion detection
14Vendor managementThird-party risk assessments, security reviews, contractual requirements
15Business continuityBCP/DR plan, tested annually, defined RTO/RPO

Each of these control areas can be expressed as one or more governance statements — discrete, testable requirements with assigned owners. That mapping is not incidental; it's the difference between controls that exist on paper and controls that actually function. More on this approach in our guide to SOC 2 governance statements.

Availability (A1)

#Control AreaWhat to Document & Implement
1Uptime commitmentsDefined SLAs, measurement methodology, public status page
2Capacity planningResource monitoring, scaling procedures, threshold alerting
3Disaster recoveryDR plan, geographic redundancy, tested failover procedures
4Backup & restorationAutomated backups, tested restores (quarterly minimum), offsite storage
5Incident communicationCustomer notification process for outages, post-mortem publication

Processing Integrity (PI1)

#Control AreaWhat to Document & Implement
1Input validationData validation rules at point of entry, error handling procedures
2Processing accuracyReconciliation controls, automated checks, exception reporting
3Output completenessDelivery confirmation, checksums, audit trails for processed data
4Error correctionDocumented procedures for identifying, reporting, and correcting errors

Confidentiality (C1)

#Control AreaWhat to Document & Implement
1Data classificationClassification scheme (public/internal/confidential/restricted), labeling
2Access restrictionsNeed-to-know enforcement, privileged access management
3Secure disposalData destruction procedures, certificate of destruction, retention schedules
4NDA & agreementsConfidentiality agreements with employees, contractors, vendors

Privacy (P1-P8)

#Control AreaWhat to Document & Implement
1NoticePrivacy policy, data collection disclosures, cookie consent
2Choice & consentOpt-in/opt-out mechanisms, consent records, preference management
3CollectionData minimization, purpose limitation, lawful basis documentation
4Use & retentionDefined retention periods, automated purging, purpose-of-use records
5Access & correctionData subject request procedures, identity verification, response SLAs
6DisclosureThird-party data sharing agreements, transfer impact assessments
7Security for privacyEncryption of PII, access logging, breach notification procedures
8QualityData accuracy controls, update mechanisms, completeness checks

The SOC 2 Timeline — What Actually Happens

Everyone quotes "6-12 months." Here's what the months actually contain.

PhaseDurationActivitiesCommon Pitfall
Scoping2-3 weeksDefine TSC categories, system boundaries, select auditorScope creep — including systems that aren't in scope
Gap assessment2-4 weeksInventory current controls, identify gaps against criteriaDiscovering you have no documented policies at all
Remediation6-12 weeksWrite policies, implement controls, deploy toolingUnderestimating engineering time by 3x
Evidence collectionOngoingGather screenshots, exports, logs for every controlManual evidence collection that takes 40+ hours
Type I audit4-6 weeksAuditor reviews control designPolicies that exist but aren't followed
Observation period3-12 monthsControls operating, evidence accumulatingThe controls you implemented in a rush breaking in month 4
Type II audit4-8 weeksAuditor tests operating effectivenessEvidence gaps during the observation window

Total timeline: 9-18 months from "we should do SOC 2" to a Type II report in hand. The biggest variable is the remediation phase. Organizations that start from a governance library with pre-built, auditor-ready statements can compress remediation from months to weeks.

Six Mistakes That Will Cost You Months

1. Writing policies nobody follows. A 40-page Information Security Policy that no one has read since it was copied from a template is worse than useless — it's evidence of a control failure. Write governance statements that are specific enough to be testable and short enough to be read.

2. Starting evidence collection too late. Your observation period starts when you begin collecting evidence, not when you decide to. If your logging wasn't turned on in January, those months don't count. Evidence collection infrastructure should be the first thing you build.

3. Treating SOC 2 as a one-time project. SOC 2 Type II requires annual re-audits. The controls you implement need to be sustainable — not just presentable for eight weeks. Think of it as building a compliance program, not passing an exam.

4. Ignoring the human controls. Technical controls get all the attention. Background checks, security training, acceptable use policies, and employee acknowledgments get forgotten until the auditor asks for evidence — and finds none. These "boring" controls are the ones that generate audit findings.

5. Choosing the wrong auditor. Not all CPA firms are created equal. Some specialize in SOC 2 for SaaS companies and will work with you. Others specialize in making the process as opaque and billable as possible. Ask for references from companies your size.

6. Gold-plating scope. Including all five Trust Services Categories in your first audit because a blog told you to (not this one, obviously). Start with Security. Add categories when specific customer requirements demand them.

What SOC 2 Compliance Actually Costs

Let's dispense with the fiction that SOC 2 is "just the audit fee."

CategoryYear 1 RangeOngoing Annual
Audit fees$20K-$100K$20K-$80K
Compliance tooling$8K-$50K$8K-$50K
Engineering time$15K-$60K$5K-$20K
Policy development$5K-$20K$2K-$5K
Readiness assessment$5K-$15K
Training & awareness$2K-$5K$2K-$5K
Total$55K-$250K$37K-$160K

The wide range reflects company size (20-person startup vs 500-person scale-up), scope (Security only vs all five categories), and how much existing infrastructure you can leverage. The single biggest cost lever is engineering time, and the single biggest way to reduce it is starting with documented controls rather than building them from scratch.

How Statement-Based Governance Maps to SOC 2

Traditional compliance approaches produce monolithic policy documents. SOC 2 auditors then have to dig through them to find the specific requirements that map to each Trust Services Criterion. This is tedious for the auditor and error-prone for you.

A statement-first approach inverts this:

  • One statement per control requirement — "All access to production systems must use multi-factor authentication" is a single, testable governance statement
  • Direct TSC mapping — each statement maps to one or more Trust Services Criteria
  • Assigned ownership — every statement has an owner responsible for compliance
  • Evidence linking — evidence is attached to specific statements, not buried in shared folders
  • Version control — when requirements change, the statement is updated with a full audit trail

This isn't theoretical. The Dictiva governance library contains pre-built statements mapped to SOC 2 Trust Services Criteria. Instead of writing policies from a blank page, you adopt the statements that match your scope, assign owners, and begin collecting evidence. The result is a compliance audit checklist that practically runs itself.

For organizations considering compliance automation tools, the statement-based model also integrates more cleanly with automated evidence collection — each statement becomes an API-addressable control point rather than a paragraph in a PDF.

Your SOC 2 Pre-Audit Readiness Checklist

Before your auditor arrives, confirm the following:

  • Trust Services Criteria scope documented and agreed with auditor
  • System description written (your system, boundaries, and infrastructure)
  • All in-scope policies documented, approved, and communicated
  • Control owners assigned for every in-scope requirement
  • Evidence collection running for the full observation period
  • Access reviews completed for the most recent quarter
  • Vulnerability scans and penetration test results available
  • Incident response plan tested within the last 12 months
  • Employee security training completed with attendance records
  • Vendor risk assessments current for critical third parties
  • Change management logs complete with approvals
  • Backup restoration test completed and documented

If more than two items on that list made you uncomfortable, you have work to do. The good news: it's all doable, and it gets dramatically easier the second year.

Start With What You Can Control

SOC 2 compliance is not a mystery — it's a project. A well-scoped project with clear deliverables, defined timelines, and measurable outcomes. The organizations that struggle are the ones that treat it as an ambiguous mandate rather than an engineering problem.

The most effective first step is also the simplest: document what you're already doing. Most growing companies have more controls in place than they realize — they just haven't written them down. Converting existing practices into governance statements is faster than building from scratch, and it gives your auditor something concrete to evaluate.

If you're starting from zero, the Dictiva governance library provides SOC 2-mapped statements you can adopt today — no blank-page anxiety required. And if you'd like to see how statement-based governance fits into a broader compliance strategy, take a look at our pricing plans to find the right starting point for your organization.

The audit is coming regardless. You might as well be ready.