Skip to main content

On-demand webinar coming soon...

Blog

What is a SOC 2 report?

Systems and Organization Controls is an attestation that evaluates your company's ability to securely manage collected data.

September 28, 2022

Orange and yellow gradient

Today, we’re going to break down a SOC 2 report example, so you know what to look for when yours arrives. 

Service organizations and service auditors may organize and present information in a variety of formats, but this is a great snapshot of what to expect.

While this example report contains Trust Service Criteria (TSC) and Cloud Controls Matrix (CCM), most SOC 2 reports only contain TSC, and that’s what this blog will focus on.

 

What is a SOC 2 report?

Systems and Organization Controls 2 (SOC 2) is an attestation that evaluates your company’s ability to securely manage the data you collect from your customers and use during business operations. A certified public accountant (CPA) that you hire performs the audit. When it’s completed you’ll receive the SOC 2 report. 

When the audit is over, the report you receive feels slightly like a choose your own adventure book written in a foreign language. It’s full of technical jargon. The content is constantly referencing other passages that involve page flipping to jog your memory. But if you understand the structure, it’s a little less intimidating.

Let’s start at the beginning. 

 

SOC 2 section 1: Assertion of the management

The assertion provides the reader the facts and assertions, or statements, made by the service organization’s management related to the system(s) under audit. This section is produced by your company as the service organization. It’s a summary of your product, services, structure and lightly covers your IT systems, teams and controls. 

 

SOC 2  section 2: Independent service auditor’s report

If you’re one of those people who like to flip to the good parts in a book or read spoilers, this is the section that you’re looking for. Your auditor divulges what they did over the stated time period and explains the scope. They also explain if you passed or failed your audit.

Kinds of opinions presented by the auditor in this section and what they mean: 

  • Unqualified — You pass!  

  • Qualified — You fail.  

  • Adverse — You really fail! Your system can’t be trusted. 

  • Disclaimer of Opinion — Incomplete. You didn’t provide the auditor with enough information for them to form an opinion.

While this does refer to the CCM, the SOC 2 Report Example above is an unqualified opinion. The auditor didn’t report any concerns and this is what you hope to see! It would be worded in a similar manner for TSC.

But often, there’s room for improvement. Qualified or adverse opinions may look like:

  • The description does not fairly present the system that was designed and implemented throughout the period. 

  • The controls related to the control objectives stated in the description were not suitably designed to provide reasonable assurance that the control objectives would be achieved if the controls operated effectively throughout the period [date] to [date]. 

  • The controls tested, which were those necessary to provide reasonable assurance that the control objectives stated in the description were achieved, did not operate effectively throughout the period from [date] to [date].

Source: Reporting on an Examination of Controls at a Service Organization Relevant to User Entities’ Internal Control Over Financial Reporting Guide

 

SOC 2  section 3: Description of your system

This is one of the most comprehensive and detailed sections in the report, written by your company as the service organization. This section is an overview of the company being assessed and builds upon the items mentioned in section one. It encompasses the detail of the system(s) being reported on, boundaries, infrastructure, controls, sub-service organizations, user entity controls, and other systems information. Lists, charts, and graphics add another layer of data for readers to immerse themselves in. The risk assessment and Trust Service Criteria are also referenced and described in detail. Anything included in this section must be capable of being audited to meet the control objectives and receive a passing report.

Like section one, you may have already seen this content while you were putting information together to submit to your auditor.

 

SOC 2  section 4: Applicable trust service categories, criteria, related controls, tests of controls and results of tests

Section four is a great deal longer than section two but just as exciting because it shows the why behind your auditor’s opinion. For a SOC 2 Type 2, the objective of testing is to determine the operating effectiveness of the controls you specified in section 3 throughout your examination period. Testing provides reasonable, but not absolute, assurance that the specified controls were achieved throughout the examination period.

This section includes:

  • Control objectives related to the applicable trust service categories 

  • Controls in place at the service organization to meet the objectives 

  • Auditor’s tests of the controls and test procedures 

  • Results of the tests performed by the auditor

The SOC 2 report example states, “The system is protected against unauthorized access (both physical and logical). The system is available for operation and use as committed or agreed.”

The statement reaffirms the auditor’s unqualified opinion from section two before breaking everything down into a detailed chart of tests and verifications completed by the auditor. The charts will vary from auditor to auditor. You’ll notice that the AICPA example report referenced above is pretty simple, but that’s not always the case. For instance, in our SOC 2 report, this section is broken out into six columns, and our chart spans 23 pages.

 

SOC 2  section 5: Organization information not covered by service auditor’s report

Remember those projects you could do for extra credit in school? Section five is optional and not tested by your auditor, but it looks good if you chose to include it. 

It provides additional information about your organization’s future plans for new systems or key aspects of your control environment that is not covered by section three but you would like to communicate to your customers. It won’t be subjected to the procedures applied in the examination. The SOC 2 report example omits section five for brevity, but it looks similar to the other sections chock-full of text, charts and tables. 

Learn more about gaining compliance by downloading this eBook about the ISO 27001 journey. To request a demo for OneTrust’s Compliance Automation tool, go here.   


You may also like

Webinar

Technology Risk & Compliance

Understanding the NIS 2 Directive: Compliance insights and best practices

This DataGuidance webinar explores the latest and expected developments in the implementation of the NIS 2 Directive, focusing on practical compliance strategies to ensure your organization is prepared.

December 04, 2024

Learn more

Webinar

Technology Risk & Compliance

Elevating client compliance with OneTrust Automation: Key strategies for partners

Discover how to use OneTrust Compliance Automation to establish client baselines, improve efficiency, and drive scalability. Learn key strategies to enhance your compliance impact.

November 21, 2024

Learn more

Webinar

Technology Risk & Compliance

Tech risk and compliance masterclass: An evidence-based approach to building by-design risk and compliance practices

Discover strategies to embed compliance and risk management into business processes with minimal disruption, using technology-driven solutions for efficiency, scalability, and improvement.

November 06, 2024

Learn more

Webinar

Technology Risk & Compliance

Building a strong security posture: Managing compliance, risk, and business engagement in a dynamic landscape

Join our webinar to learn how to optimize security posture, streamline compliance, and leverage automation to manage IT risk in today's complex digital landscape. Register now!

October 29, 2024

Learn more

Webinar

Privacy Automation

Build resiliency and operationalize compliance with OneTrust: Fall product release recap, 2024

Join our upcoming product release webinar to explore how these new capabilities can help your organization navigate complex frameworks, streamline third-party management, and accelerate AI and data innovation.

October 22, 2024

Learn more

Webinar

Technology Risk & Compliance

Compliance Automation product demonstration

Join our live demonstration and see how Compliance Automaiton can help boost compliance efficiency with automated workflows, shared evidence, and 40+ frameworks.

October 02, 2024

Learn more

Webinar

Technology Risk & Compliance

Tech risk & compliance masterclass: The anatomy of a framework

Master the fundamentals of constructing robust compliance frameworks that can seamlessly integrate with organizational operations while aligning with regulatory and strategic mandates to deliver measurable insights on your progress and gaps.

August 14, 2024

Learn more

Webinar

Technology Risk & Compliance

Tech risk and compliance masterclass

Unlock tech risk management & compliance excellence. Master risk management, build robust frameworks, and foster cross-functional collaboration for long-term resilience.

August 07, 2024

Learn more

Webinar

Technology Risk & Compliance

Introducing OneTrust Compliance Automation

Join us as we explore OneTrust Compliance Automation, a holistic and fully integrated solution that streamlines and optimizes workflows, compliance, and attestation.

July 25, 2024

Learn more

Webinar

Data Discovery & Classification

Catch it live: See the all-new features in OneTrust's Spring Release and Post-TrustWeek recap

Join us as Ryan Karlin, Senior Director of Product Marketing highlights important updates from TrustWeek including an inside look into OneTrust's new platform features that make it easier for customers to activate data responsibly, surface and mitigate risk, and navigate the complex regulatory environment.

June 06, 2024

Learn more

Report

AI Governance

GRC strategies for effective AI Governance: OCEG research report

Download the full OCEG research report for a snapshot of what organizations are doing to govern their AI efforts, assess and manage risks, and ensure compliance with external and internal requirements.

May 22, 2024

Learn more

Infographic

Third-Party Risk

Streamline compliance with the Digital Operational Resilience Act (DORA)

Download our infographic to learn about the new DORA regulation, who needs to comply, and how OneTrust can help streamline the process.

April 29, 2024

Learn more

Webinar

Ethics Program Management

EthicsConnect: Risk - It’s not just for breakfast anymore

Join us for a deep dive into embedding privacy by design into the fabric of your business to promote the responsible use of data.

April 25, 2024

Learn more

Infographic

Technology Risk & Compliance

Rethinking risk assessments: Bridging the gap between best practices and action

Download our infographic to learn the main challenges faced during risk assessments, proven frameworks for assessing risks, and how to translate guidance into action.

March 07, 2024

Learn more

Webinar

Technology Risk & Compliance

PCI DSS Compliance: How to scope and streamline monitoring with Certification Automation

Join our PCI DSS webinar where we discuss how Certification Automation can help free up valuable InfoSec resources, streamline audits, and stay continuously compliant.

March 05, 2024

Learn more

eBook

Ethics Program Management

Business messaging apps: A guide to corporate compliance

How can your business use third-party messaging apps while staying compliant? Dive into key usage considerations based on the DOJ’s 2023 guidance.

February 13, 2024

Learn more

Webinar

Technology Risk & Compliance

5 automation trends to modernize InfoSec compliance

Join our webinar for insights on transforming InfoSec program management. Navigate the complexities of modern security with a flexible, scalable, and cost-effective approach.

February 07, 2024

Learn more

Infographic

Third-Party Risk

4 top-of-mind challenges for CISOs

What key challenges do CISOs face going into the new year? Download this infographic to hear what experts from industries across the board have to say.

January 30, 2024

Learn more

eBook

Technology Risk & Compliance

NIST CSF 2.0: Changes, impacts and opportunities for your Infosec program

Get your free guide to the NIST Cybersecurity Framework 2.0 and learn how its proposed changes will impact your InfoSec programs.

December 18, 2023

Learn more

Resource Kit

Technology Risk & Compliance

NIST CSF essentials: Empowering cybersecurity excellence

Download our NIST CSF Essentials resource kit and master cybersecurity compliance with expert insights, strategies, and real-world case studies.

December 15, 2023

Learn more

Webinar

Technology Risk & Compliance

Demonstrating GDPR compliance with Europrivacy criteria: The European Data Protection Seal

Join our webinar to learn more about the European Data Protection Seal and to find out what the key advantages of getting certified.

November 30, 2023

Learn more

Checklist

Technology Risk & Compliance

SOC 2 checklist: 8 steps to achieve compliance

This SOC 2 checklist provides clear action steps that enable you to mature your security program and fast-track your way to compliance.

November 28, 2023

Learn more

Data Sheet

Technology Risk & Compliance

Integrations to automate your framework compliance: ISO 27001, SOC 2, and NIST CSF

Explore how OneTrust integrations can help you automate compliance with today’s most popular InfoSec frameworks.

November 28, 2023

Learn more

Webinar

Ethics Program Management

Ethics Exchange: Risk assessments

Join our risk assessments experts as we discuss best practices, program templates, and how provide an assessment that provides the best value for your organization.

October 25, 2023

Learn more

Infographic

Technology Risk & Compliance

Understanding Europe's Top InfoSec and Cybersec Frameworks

Learn the ins and outs of Europe’s top InfoSec and cybersec frameworks, including ISO 27001, UK Cyber Essentials, the NIS2 Directive, DORA, and more.

October 05, 2023

Learn more

Infographic

Technology Risk & Compliance

5 key areas for improved automation in InfoSec compliance

Streamline and scale your organization’s InfoSec compliance program by focusing on these five key areas of automation.

October 02, 2023

Learn more

eBook

Technology Risk & Compliance

Prioritizing the right InfoSec frameworks for your organization

In this free eBook, we explore the basics of three top InfoSec frameworks and how to decide which is the best fit for your organization.

September 27, 2023

Learn more

Webinar

Third-Party Risk

Live Demo EMEA: How OneTrust can help advance your third-party risk management program

Join us for a live demo of OneTrust's third-party risk management solution and see how it can help automate and streamline your TPRM program.

September 19, 2023

Learn more

Webinar

GRC & Security Assurance

Breaking down Europe’s top InfoSec & Cybersecurity frameworks: Tips to evaluate your current state or next steps

In this webinar, we examine the ISO/IEC 27001 and how it compares to other cybersecurity frameworks and regulations such as the SOC 2 and the EU Cybersecurity Act.

September 12, 2023

Learn more

eBook

Privacy Management

Responsible data use: Navigating privacy in the information lifecycle eBook

Download this eBook and get the insights you need to safeguard customer privacy and ensure responsible data use in the information lifecycle.

August 22, 2023

Learn more

Webinar

Technology Risk & Compliance

How to successfully implement ISO 27001 to demonstrate security and assurance across any jurisdiction

Join our live webinar and hear from security professionals on how to get ISO 27001 certified, streamline audit preparation, and demonstrate security assurance across any regulatory jurisdiction.

June 28, 2023

Learn more

eBook

Third-Party Risk

InfoSec's guide to third-party risk management: Key considerations and best practices

Download our eBook to learn practical advice on how to approach third-party risk management like an InfoSec expert.

June 05, 2023

Learn more

Webinar

GRC & Security Assurance

Combating InfoSec compliance fatigue: Insights for navigating growingly complex requirements

In this webinar, you will hear first-hand from information security experts experts what are the key pain-points and their strategies to be audit ready. 

February 27, 2023

Learn more

Webinar

Technology Risk & Compliance

Introducing OneTrust Certification Automation: Build, scale, and automate your InfoSec compliance program webinar

In this webinar, learn how to right-size your compliance scope for different frameworks across various business dimensions and enable an agile audit process.

February 15, 2023

Learn more

Webinar

GRC & Security Assurance

Introducing OneTrust Certification Automation: Reinforce privacy accountability with automated InfoSec compliance

Learn how to enable an agile audit process by breaking down complex InfoSec requirements into actionable tasks to help automate your compliance program.

February 10, 2023

Learn more

Webinar

GRC & Security Assurance

How to automate compliance for ISO 27001 – Scoping and streamlining control management for the latest InfoSec landscape

In this session we'll showcase how OneTrust Certification Automation can help you streamline control management for the latest InfoSec landscape.

December 14, 2022

Learn more

Webinar

Third-Party Risk

Canada and ISO 27001:2022: How automation streamlines compliance

Join OneTrust for a demo on how our privacy management platform helps Canadian businesses streamline ISO 27001:2022 compliance.

November 30, 2022

Learn more

Webinar

GRC & Security Assurance

Analyzing ISO 27001:2022 reinforcing privacy and security compliance with automation webinar

Learn how InfoSec teams can automate scoping mandatory requirements and streamline generating evidence to prove compliance across ISO.

November 17, 2022

Learn more

Webinar

GRC & Security Assurance

ISO 27001: 2022 – What’s new and how can automation simplify compliance webinar

Learn how automation can streamline compliance projects at scale across multiple business units and products throughout your organization. 

October 31, 2022

Learn more

eBook

Technology Risk & Compliance

The future of information security

Learn how to respond to the security landscape and build a proactive InfoSec program to help your customers and business.

October 10, 2022

Learn more

eBook

Technology Risk & Compliance

The art of the enterprise IT risk assessment

Ensure your enterprise IT risk assessment is a success with a top-down approach that gets executive buy-in from the start

September 16, 2022

Learn more

eBook

Technology Risk & Compliance

The enterprise DevSecOps playbook

As a unified business function, DevSecOps combines rapid software development with top-notch security at scale.

September 02, 2022

Learn more

Webinar

GRC & Security Assurance

How to reinforce your InfoSec risk program in a “Not If, But When” incident environment webinar

Learn how scaling your approach to managing IT assets & risk assessments can deliver a complete picture to better measure and inform program investments.

August 16, 2022

Learn more

Webinar

GRC & Security Assurance

5 critical mistakes to avoid when answering security questionnaires

Avoid these 5 critical mistakes when answering security questionnaires and streamline responses with this webinar.

March 01, 2022

Learn more

Webinar

GRC & Security Assurance

How successful security teams manage risk to build Trust and drive Growth

Watch this webinar to learn what makes a successful risk management program and how effective security teams build trust.

January 12, 2022

Learn more

Webinar

Privacy Management

Build an incident management playbook

Prepare for privacy and security incidents by building an incident management playbook.

August 27, 2021

Learn more

Fundamental to Comprehensive: Where Does Your Compliance Program Stand? Infographic | Resources | OneTrust

Learn more