Company: [Your Company Name]
Product / Service: [Name of product/service]
SOC 2 Report Type: [Type I / Type II]
Report Period: [Start date] to [End date]
Auditor: [CPA firm name]
Trust Services Criteria Included: [Security / Availability / Confidentiality / Processing Integrity / Privacy]
1) What’s in scope (system boundary)
In scope:
- [Core application(s)]
- [Production infrastructure/cloud environment]
- [People/processes supporting the service: support, IR, change mgmt]
Out of scope / user entity responsibilities:
- [Customer-managed devices/endpoints]
- [Customer identity controls if they manage SSO]
- [Customer internal access controls for their users]
2) Where data is hosted and processed
Hosting region(s): [e.g., Canada / US / multi-region]
Data types handled: [e.g., business contact info, customer content, logs]
Encryption: [plain-language statement for at rest and in transit]
3) Key security controls (what buyers care about)
- Access control: MFA for admins; RBAC; quarterly access reviews
- Change management: peer review + approvals; tracked deployments
- Monitoring: logging and alerting; defined escalation
- Incident response: documented plan; tabletop/testing; notification approach
- Vendor management: critical vendors reviewed; security terms in contracts
4) Subservice organizations (key vendors we rely on)
- [Cloud provider: AWS/Azure/GCP]
- [Identity provider: Okta/Entra ID]
- [Monitoring/security tooling (if applicable)]
- [Support tooling (if applicable)]
Vendor oversight: We assess critical vendors and review independent assurance reports where available.
5) Exceptions (if applicable)
Exceptions noted in report: [Yes/No]
If yes: [brief summary] • [corrective action] • [status + verification]
6) How to request the full SOC 2 report
Full report available under NDA upon request.
Contact: [security@company.com / compliance contact]
Typical turnaround: [e.g., 1 business day]
7) Fast questionnaire mapping (buyer shortcut)
MFA → Section 3 (Access control)
Logging/monitoring → Section 3 (Monitoring)
Incident response → Section 3 (Incident response)
Vendor risk → Section 4 (Subservice orgs)