SOC 2 Type 2 evaluates controls against the Trust Services Criteria, which commonly include the following areas.
1. Security
Security controls ensure systems are protected against unauthorized access, misuse, or compromise.
Auditors evaluate controls such as:
These controls demonstrate that customer systems and data are protected from internal and external threats.
2. Availability
Availability controls verify that systems are designed and operated to remain accessible as committed.
This typically includes:
For customers, this provides confidence that services are resilient and operational continuity is actively managed.
3. Confidentiality
Confidentiality controls ensure sensitive data is protected throughout its lifecycle.
Auditors review:
These controls are especially important for customers handling proprietary, regulated, or customer-owned data.
4. Processing Integrity (When Applicable)
Processing integrity controls validate that systems process data accurately, completely, and in a timely manner.
This may include:
These controls help ensure infrastructure behaves predictably and reliably.
5. Privacy (When In Scope)
When applicable, privacy controls evaluate how personal data is collected, used, retained, and protected in accordance with stated policies and applicable regulations.
Why the Type 2 Designation Matters
The Type 2 designation is critical.
Rather than evaluating controls at a single point in time, auditors:
This confirms that security and reliability are embedded into daily operations, not applied temporarily for audit purposes.