SOC 2 readiness.
SOC 2 is a sales unblock before it's a security framework. We get you ready for Type I in three to four months, hand you a policy library you actually maintain, and sit beside you during the audit.
Why companies pursue SOC 2
The trigger is almost always a customer request. Enterprise procurement teams now ask for a SOC 2 report before they finish technical evaluation. Without one, deals stall in security review for months. With one, they unblock.
What's included
- Trust Services Criteria selection (Security mandatory; Availability, Confidentiality, Processing Integrity, Privacy as needed)
- System scope definition (which products, environments, third parties are in scope)
- Gap analysis against the AICPA TSC
- Policy and procedure library (~22 documents tailored to your stack)
- Control matrix mapped to evidence artifacts and owners
- Evidence collection runbook for the observation period
- Auditor introductions and audit accompaniment
Engagement phases
- Scoping & gap analysis. System description and gap report. 2–3 weeks.
- Remediation & policy authorship. Policy library and control matrix. 6–10 weeks.
- Type I audit fieldwork. Type I attestation issued by an independent CPA firm. 2–4 weeks.
- Type II observation window. Continuous evidence collection. 3–12 months (optional).
- Type II audit fieldwork. Type II attestation. 4–8 weeks.
Common questions
Do we need a compliance platform like Vanta or Drata?
Helpful but not required. The platforms automate evidence collection. We'll recommend one if your team will benefit, or run the engagement on a documented runbook if a platform doesn't justify its cost.
Can we use existing policies we already have?
Yes, where they fit. We redline, restructure, or replace as needed and you'll see exactly which policies were authored fresh versus modified.
What if the auditor finds gaps?
That's what readiness work prevents. If the auditor surfaces a finding we missed, we remediate it before the report is issued.