top of page

SOC 2
Regeln und Vorschriften

What SOC 2 Is (and Is Not)

SOC 2 is a voluntary compliance framework developed by American Institute of Certified Public Accountants (AICPA).

It is:

  • An attestation report (not a law)

  • Used to prove security, availability, and privacy controls

  • Required de facto by enterprise customers, banks, healthcare, fintech

It is not:

  • A certification

  • A one-time checklist

  • A government regulation

 

The SOC 2 Trust Services Criteria (TSC)

SOC 2 compliance is measured against five Trust Services Criteria:

 

1️⃣ Security (Mandatory)

Protection against unauthorized access and system misuse.

Required controls include:

  • Access controls (least privilege)

  • MFA & authentication

  • Logging & monitoring

  • Incident response

  • Risk assessment

  • Vendor security oversight

Every SOC 2 report includes Security

2️⃣ Availability (Optional)

System uptime and resilience.

Controls include:

  • Uptime SLAs

  • Disaster recovery plans

  • Backup & restore testing

  • Capacity monitoring

3️⃣ Confidentiality (Optional)

Protection of sensitive business data.

Controls include:

  • Data classification

  • Encryption at rest/in transit

  • Secure data disposal

4️⃣ Processing Integrity (Optional)

Systems process data accurately and completely.

Controls include:

  • Input validation

  • Error detection

  • Change management

  • QA controls

5️⃣ Privacy (Optional)

Personal data handling aligned to privacy commitments.

Controls include:

  • Privacy notices

  • Data minimization

  • Retention schedules

  • DSAR handling

  • Breach notification procedures

 

Often paired with GDPR / HIPAA

 

SOC 2 Report Types

SOC 2 Type I

  • Snapshot of control design

  • Point-in-time (audit date)

  • Faster, cheaper

  • Used for early sales cycles

SOC 2 Type II

  • Tests design + operating effectiveness

  • Covers 3–12 months

  • Gold standard for enterprises

  • Required by most large buyers

Core SOC 2 Requirements (Rules in Practice)

🔹 Governance

  • Written security & privacy policies

  • Risk assessment process

  • Defined roles & responsibilities

  • Management oversight

 

🔹 Access Controls

  • User provisioning/deprovisioning

  • MFA for sensitive systems

  • Role-based access

  • Periodic access reviews

 

🔹 Security Operations

  • Logging & monitoring

  • Incident response plan

  • Vulnerability scanning

  • Penetration testing (often expected)

 

🔹 Change Management

  • Code review process

  • Change approvals

  • Rollback procedures

  • Environment separation (prod vs dev)

 

🔹 Vendor Management

  • Vendor risk assessments

  • Security reviews

  • Contractual controls

  • Ongoing monitoring

 

🔹 Evidence & Logging

Auditors require proof, not promises:

  • Screenshots

  • Logs

  • Tickets

  • Training records

  • Policy version history

 

What Auditors Actually Test

Auditors verify:

  • Controls exist

  • Controls are designed properly

  • Controls operate consistently

  • Evidence matches the control description

Missing evidence = failed control, even if security is strong.

 

Who Needs SOC 2?

SOC 2 is effectively required if you sell to:

  • Enterprise SaaS customers

  • Financial institutions

  • Healthcare orgs

  • Government contractors

  • AI & data platforms

  • B2B infrastructure companies

 

Common SOC 2 Misconceptions

“We use AWS, so we’re SOC 2 compliant”
→ AWS helps, you are still responsible

“SOC 2 is a checklist”
→ It’s a control system + evidence discipline

“We can rush Type II in a month”
→ Minimum 3 months of operation

 

Penalties for Not Having SOC 2

SOC 2 has no fines, but very real consequences:

  • Lost enterprise deals

  • Failed vendor security reviews

  • Procurement rejection

  • Lower company valuation

Über uns | Team | Nutzungsbedingungen | Datenschutzrichtlinie | Richtlinie zur akzeptablen Nutzung

© 2026 On Target Compliance. Alle Rechte vorbehalten.
Entwickelt für KI-Governance, Auditbereitschaft und regulatorisches Vertrauen.

bottom of page