Skip to content

SOC 2

Best for: Any technology or cloud service provider that handles customer data and needs to prove its security posture to enterprise buyers. SaaS companies, managed service providers, data centers, and IT outsourcing firms run into SOC 2 requirements during sales cycles. There is no revenue or size threshold; even a five-person startup selling to a Fortune 500 will be asked for a SOC 2 Type II report.

Mandatory?Voluntary โ€” required by enterprise procurement
Who validates?Licensed CPA firm (SSAE 18) ยท No self-assessment
RenewalTypically annual
Observation periodType II: 3โ€“12 months

๐Ÿ› American Institute of Certified Public Accountants (AICPA) ยท 2017 TSC (2022 revised) Official source โ†’

Get Started

module "..." {
  source  = "soc2.compliance.tf/terraform-aws-modules/<module>/aws"
  version = "<version>"
}

What Compliance.tf Covers vs. What You Handle

  • What Compliance.tf automates

    • Encryption at Rest: Covers encryption configuration across API Gateway caches, Backup recovery points, and CloudFront distributions. Any service where encryption is available but not enabled will surface as a finding.
    • Encryption in Transit: Checks CloudFront distribution TLS enforcement and field-level encryption settings, including whether HTTPS is required and HTTP-to-HTTPS redirect policies are in place.
    • Audit Logging: Covers 11 controls across CloudTrail (multi-region trail, S3 data events for both read and write), API Gateway stage logging, AppSync field-level logging, Athena workgroup logging, Bedrock invocation logging, and CloudFront access logging.
    • Backup and Recovery: Confirms backup plans exist in configured regions, enforces minimum 35-day retention, validates deletion protection on recovery points, and checks that individual recovery points meet retention requirements.
    • Certificate Management: Flags ACM certificates expiring within 30 days so teams can renew before expiration triggers an availability or security event.
  • What you handle

    • Encryption at Rest: Your encryption policy document, KMS key rotation schedules, and ensuring your encryption standards are reflected accurately in the SOC 2 system description.
    • Encryption in Transit: TLS version floor decisions (e.g., requiring TLS 1.2 minimum), custom SSL certificate management, and documenting encryption-in-transit requirements in vendor agreements.
    • Audit Logging: Log review cadence, SIEM integration, alert tuning, and demonstrating to the auditor that logs are reviewed on a defined schedule. Evidence of actual review is what assessors ask for.
    • Backup and Recovery: RPO and RTO definitions, annual restoration testing, documented recovery procedures, and mapping backup coverage to the commitments stated in your system description.
    • Certificate Management: A certificate lifecycle management process, ownership assignment for renewals, and tracking any certificates issued outside ACM.

Controls by Category

Data Retention and Backup (A1.2, A1.3) (1 control)

Evidence here centers on backup plan configuration and regional coverage. Assessors want to see plans covering all in-scope systems with retention periods that match the organization's stated commitments, deletion protections on recovery points, and backup jobs running in every region where workloads operate. The typical gap: backups are configured in the primary region but absent from disaster recovery regions.

Encryption and Data Protection (CC6.1, CC6.7, C1.1) (3 controls)

The most common finding in this category is selective encryption: some services are protected while adjacent components like API Gateway caches are left in plaintext. Assessors check TLS enforcement across all in-scope endpoints, key management practices, and whether default encryption settings are actually applied to caches and storage throughout the environment.

Logging and Monitoring (CC7.1, CC7.2, CC7.3) (4 controls)

This category draws the most scrutiny. Auditors verify that logging is enabled across all in-scope services, that logs are retained for the full review period, and that someone actually reviews them. They check CloudTrail coverage across all regions (not just the primary region), S3 data event logging for both reads and writes, and evidence of log integrity controls. Gaps for newer services like Bedrock are a frequent deficiency, particularly when teams added those services mid-period.

Additional Controls (103)

AWS CloudTrail (4)

AWS CodeBuild (1)

AWS Database Migration Service (2)

AWS IAM (1)

AWS KMS (1)

AWS Lambda (3)

AWS Step Functions (1)

AWS WAF (1)

Amazon CloudWatch (3)

Amazon CloudWatch Logs (1)

Amazon DynamoDB (3)

Amazon DynamoDB Accelerator (1)

Amazon EBS (3)

Amazon EC2 (8)

Amazon ECR (1)

Amazon EFS (1)

Amazon EMR (1)

Amazon ElastiCache (2)

Amazon Kinesis (3)

Amazon MQ (1)

Amazon MSK (1)

Amazon Neptune (1)

Amazon OpenSearch Service (2)

Amazon RDS (17)

Amazon Redshift (6)

Amazon S3 (15)

Amazon SNS (1)

Amazon SageMaker (3)

Amazon VPC (2)

Elastic Load Balancing (3)

Other (10)

Frequently Asked Questions

Does SOC 2 apply to my company?

SOC 2 is voluntary. No law requires it. Enterprise customers and their procurement teams, however, often make a SOC 2 Type II report a contract prerequisite for B2B software or services that touch their data. The trigger is customer demand, not regulation.

What is the difference between Type I and Type II?

Type I evaluates whether your controls are properly designed at a single point in time. Type II evaluates both design and operating effectiveness over a period, usually 6 to 12 months. Most enterprise buyers require Type II because it proves controls actually worked, not just that they existed on paper. A Type I can serve as a stepping stone for first-time audits.

How long does it take to get SOC 2 certified?

SOC 2 produces an attestation report, not a certification (a distinction auditors will correct you on). If you have no existing controls, plan for 3 to 6 months to implement them, then 3 to 12 months of operating them for the Type II observation window, then 4 to 8 weeks for the audit itself. Organizations with mature security programs move faster. A Type I can typically be obtained within 2 to 4 months from the start of readiness work.

Which Trust Services Categories should I include?

Security (Common Criteria) is mandatory. The other four (Availability, Processing Integrity, Confidentiality, Privacy) are optional and should reflect your actual customer commitments. SaaS providers typically include Security and Availability at minimum. Add Confidentiality if you handle sensitive data. Privacy is worth including only if you process personal information and want to address it within the SOC 2 scope rather than a separate privacy framework.

How much does a SOC 2 audit cost?

CPA firm fees run from $20,000 to $100,000+ depending on scope, number of Trust Services Categories, company size, and environment complexity. First-year audits cost more because of the readiness assessment phase. Factor in internal costs too: staff time for evidence collection, tooling for continuous monitoring, and remediation work on any gaps found during readiness.