SOC 2 Report Example
SOC 2 Report Example
Report Example
Report on [Company Name]’s Description of the [System
Name] and on the Suitability of the Design and Operating
Effectiveness of Its Controls Relevant to [TRUST SERVICES
CRITERIA] Throughout the Period [Start Date] to [End Date]
Note: This example is based on the Illustrative SOC 2® Type 2 Report provided by the AICPA as
well as a report template created by one of our trusted audit partners.
Like the AICPA’s example, this is nonauthoritative and provided only for informational
purposes to show how a service organization may organize and present the information
required by DC section 200, 2018 Description Criteria for a Description of a Service
Organization’s System in a SOC 2® Report (With Revised Implementation Guidance — 2022).
For brevity’s sake, this example does not include all information that might be described in an
actual report. For instance, you will only see four sections in this example. Some SOC 2 Type 2
reports may include a fifth section if the service organization wishes to include additional
information, such as future plans for new systems, qualitative information such as marketing
claims, or responses from management to deviations identified by the service auditor. Section
III also does not include everything that might be described in the description of a service
organization’s system for brevity’s sake.
1
Table of Contents
Section I: Independent Service Auditor’s Report 03
2
Section I: Independent Service Auditor’s Report
To the Management of [Company Name],
Scope
We have examined [Company Name]’s accompanying description of its [System Name] titled
“[Company Name] Description of Its [System Name]” throughout the period [Start Date] to
[End Date], based on the criteria for a description of a service organization’s system in DC
Section 200, 2018 Description Criteria for a Description of a Service Organization’s System in a
SOC 2® Report (AICPA, Description Criteria) (description criteria) and the suitability of the
design and operating effectiveness of controls stated in the description throughout the period
[Start Date] to [End Date], to provide reasonable assurance that [Company Name]’s service
commitments and system requirements were achieved based on the trust services criteria
relevant to [applicable trust services criteria] set forth in TSP section 100, 2017 Trust Services
Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust
Services Criteria).
● Preparing the description and assertion, including the completeness, accuracy, and
method of presentation of the description and assertion;
● Providing the services covered by the description;
3
● Selecting the applicable trust services criteria and stating the related controls in the
description; and
● Identifying the risks that threaten the achievement of the service organization’s service
commitments and system requirements.
Our examination also included performing such other procedures as we considered necessary
in the circumstances.
4
We are required to be independent and to meet our other ethical responsibilities in
accordance with relevant ethical requirements relating to the engagement.
Inherent Limitations
The description is prepared to meet the common needs of a broad range of report users and
may not, therefore, include every aspect of the system that individual users may consider
important to meet their informational needs. There are inherent limitations in any system of
internal control, including the possibility of human error and the circumvention of controls.
Because of their nature, controls may not always operate effectively to provide reasonable
assurance that the service organization’s service commitments and system requirements are
achieved based on the applicable trust services criteria. Also, the projection to the future of
any conclusions about the suitability of the design and operating effectiveness of controls is
subject to the risk that controls may become inadequate because of changes in conditions or
that the degree of compliance with policies or procedures may deteriorate.
Opinion
In our opinion, in all material respects—
a. The description presents [Company Name]’s [System Name] that was designed and
implemented throughout the period [Start Date] to [End Date], in accordance with the
description criteria.
b. The controls stated in the description were suitably designed throughout the period
[Start Date] to [End Date] to provide reasonable assurance that [Company Name]'s
service commitments and system requirements would be achieved based on the
applicable trust services criteria, if its controls operated effectively throughout that
period and if the [Subservice Organization] and user entities applied the
complementary controls assumed in the design of [Company Name] controls
throughout that period.
c. The controls stated in the description operated effectively throughout the period [Start
Date] to [End Date] to provide reasonable assurance that [Company Name]'s service
commitments and system requirements were achieved based on the applicable trust
services criteria, if complementary subservice organization controls and
complementary user entity controls assumed in the design of [Company Name]
controls operated effectively throughout that period.
5
Restricted Use
This report, including the description of tests of controls and results thereof in Section IV, is
intended solely for the information and use of [Company Name], user entities of [Company
Name]’s [System Name] during some or all of the period [Start Date] to [End Date], business
partners of [Company Name] subject to risks arising from interactions with the [System Name],
practitioners providing services to such user entities and business partners, prospective user
entities and business partners, and regulators who have sufficient knowledge and
understanding of the following:
This report is not intended to be, and should not be, used by anyone other than these specified
parties.
6
Section II: [Company Name]’s Management Assertion
[Company Name’s Letterhead]
Date: [Report Date]
We have prepared the accompanying description titled “[Company Name]’s Description of the
[System Name]” for the period [Start Date] to [End Date], based on the criteria set forth in DC
Section 200, 2018 Description Criteria for a Description of a Service Organization’s System in a
SOC 2® Report, in AICPA Description Criteria (description criteria). This description is intended
to provide report users with relevant information about [Company Name]’s [System Name],
particularly concerning system controls designed, implemented, and operated to provide
reasonable assurance that [Company Name]’s service commitments and system requirements
were achieved in line with the trust services criteria related to [applicable trust services
criteria] as outlined in TSP Section 100, 2017 Trust Services Criteria for Security, Availability,
Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Criteria).
[Company Name] uses a subservice organization to [describe subservice's role in the system].
The description outlines the complementary subservice organization controls that are suitably
designed and operating effectively. These are necessary alongside the controls at [Company
Name] to meet service commitments and system requirements in line with the relevant trust
services criteria. However, the description does not disclose the subservice organization’s
controls.
● The description presents [Company Name]’s [System Name] as it was designed and
implemented throughout the period [Start Date] to [End Date], in accordance with the
description criteria.
● The controls stated in the description were suitably designed throughout the period
[Start Date] to [End Date], to provide reasonable assurance that [Company Name]’s
service commitments and system requirements were achieved based on the applicable
trust services criteria, provided that the controls operated effectively, and the
complementary subservice organization controls worked as assumed in the design.
● The controls stated in the description operated effectively throughout the period [Start
Date] to [End Date], providing reasonable assurance that [Company Name]’s service
commitments and system requirements were met based on the applicable trust
services criteria, if the complementary subservice organization controls assumed in the
design of [Company Name]’s controls operated effectively during the same period.
7
Section III: [Company Name]’s Description of the
System
This description details the [System Name] and the related policies, procedures, and control
activities for the [System Name]. This description does not include any other services or
policies, procedures, and control activities at any subservice organizations.
[Company Name] has established system requirements, which are communicated via service
agreements and consist of the following:
The components that directly support the services provided to user entities are as follows:
Infrastructure
The [System Name] is comprised of the following components:
8
Component Description Location
Software
The software component consists of the applications, programs, and other software that
support the system. The list of software and ancillary software used to build, support, secure,
maintain, and monitor the system are as follows:
Data
Data consists of transaction streams, files, databases, tables, and output utilized or processed
by the system.
All data that is managed, processed and stored as a part of the [System Name] is classified as
per the Data Classification Policy which establishes a framework for categorizing data based
on its sensitivity, value, and criticality to achieving the objectives of the organization.
Further, all customer data is treated as confidential. The availability of this data is also limited
by job function. All customer data storage and transmission follow industry-standard
encryption. The data is also regularly backed up as documented in the Data Backup Policy.
People
The following functional key areas/groups are responsible for planning, directing, and
controlling operations:
[Organizational chart, table, or list outlining key areas of authority and responsibility]
9
Policies
[Company Name] has implemented the following policies, which serve as the basis for
Company procedures. These are made accessible to all relevant employees and contractors,
and are reviewed annually:
Control Environment
10
New Personnel and Ongoing Training
To foster a culture of security awareness, [Company Name] requires new hires to complete
background checks, sign confidentiality agreements, and acknowledge their obligations under
the Code of Conduct. Personnel also undergo training upon hiring and receive annual
refreshers on topics critical to maintaining information security. This training includes the
appropriate use of system resources, handling of confidential data, and responding to security
incidents. Additionally, training records are maintained to track compliance and reinforce
[Company Name]'s commitment to a secure and compliant environment.
[Company Name] provides detailed information on its systems and services via internal
documentation and its public website, ensuring transparency for internal and external
stakeholders. Communication channels include [Tool Name], which allows personnel and
users to report concerns related to [applicable trust services criteria]. Any reported issues are
addressed per the Security Incident Response Plan. Policies like the Change Management
Policy and Security Incident Response Plan outline communication protocols for significant
events, such as system updates, incidents, or unauthorized disclosures.
Risk Management
The risk management framework at [Company Name] identifies, assesses, and addresses risks
relevant to the organization’s operational and security objectives. The Chief Risk Officer (CRO)
oversees risk management activities and ensures alignment with the organization’s risk
appetite and strategic goals. Regular risk assessments are conducted across all departments to
evaluate the evolving risk landscape and identify areas for improvement. Risks identified in
assessments are addressed through policies, controls, or process modifications to prevent
potential incidents, data loss, or system unavailability.
11
Risk monitoring is supported by documented policies that provide guidance for high-priority
areas, including data protection, user access, and incident response. These policies are
reviewed periodically to ensure they remain relevant and effective in mitigating risks.
Monitoring Activities
Monitoring controls are embedded within [Company Name]'s processes to verify that all
operational and security controls are functioning as designed. The responsibility for
monitoring lies with both line management and the Internal Control group, which reports to
the CRO. Monitoring activities include:
● Periodic review of key control metrics that are tracked and reported automatically
where feasible.
● Regular staff and departmental meetings to review operational and control metrics and
identify areas for corrective action.
● Quarterly control self-assessments by functional departments to evaluate control
effectiveness and address any deficiencies.
The Internal Control group consolidates monitoring outcomes, and the CRO presents them
quarterly to the Management Committee. Independent evaluations by the internal audit team
supplement these activities, assessing the adequacy of controls, testing their effectiveness,
and providing recommendations for improvements.
Control Activities
Control activities within [Company Name] are implemented to ensure that objectives
regarding system security, data confidentiality, and operational availability are achieved.
These activities include policies, procedures, and mechanisms to support access control,
change management, vulnerability management, and incident response.
Access Control
Access control measures at [Company Name] safeguard information systems from
unauthorized access. All system access is governed by an Access Control Policy, which outlines
user authentication, authorization, and privilege management procedures. Role-based access
is enforced, limiting system access based on job responsibilities. New hires and internal
transfers are required to have their access rights reviewed to confirm alignment with their
roles, and access is removed promptly upon employee termination or role change.
Quarterly access reviews are conducted by managers to verify that access permissions remain
consistent with employee responsibilities, and any necessary changes are addressed. User
access is continuously monitored for unusual activity through automated security information
and event management (SIEM) alerts.
12
Change Management
The Change Management Policy at [Company Name] governs the process for implementing
changes to systems and applications. This policy ensures that changes are documented,
tested, reviewed, and approved before being deployed. Any change that could impact system
security or operations must go through a formal review process, including risk assessment, to
prevent disruptions or unintended consequences.
Changes are tested in a controlled environment to evaluate their effectiveness and potential
impact on system stability. Once approved, changes are communicated to relevant
stakeholders, and any necessary training or documentation updates are provided to affected
personnel. A post-change review is conducted to confirm successful implementation and
identify any follow-up actions.
Vulnerability Management
[Company Name] implements a proactive vulnerability management program that includes
regular scanning, patch management, and periodic penetration testing. The vulnerability
management process follows these steps:
Quarterly reports are generated to track the status of vulnerability remediation, and findings
are presented to the CRO and senior management for review.
Incident Response
[Company Name] maintains a robust Incident Response Plan (IRP) to ensure that any security
incidents are promptly identified, contained, and resolved. The IRP outlines procedures for the
detection, documentation, escalation, and resolution of incidents. Incident response activities
include:
Identification
The identification phase involves promptly detecting potential security incidents to mitigate
impact and begin the response process.[Company Name] uses automated monitoring
systems, such as a Security Information and Event Management (SIEM) solution, which
generates alerts for any suspicious activity, anomalies, or potential threats within the
13
environment. Additionally, employees and third parties can report incidents through
established communication channels.
During this phase, security analysts at[Company Name] assess the alerts and reports to
determine if an incident has occurred. Once confirmed, the incident is categorized by severity,
type, and potential impact to prioritize response efforts. Incident identification logs are
documented and reviewed by the incident response team, who initiate further actions
according to the IRP.
Containment
Containment aims to limit the impact of the incident and prevent its spread while maintaining
system stability.[Company Name] employs two levels of containment:
Containment efforts are continuously monitored, with logs documenting all actions taken, and
the incident is escalated if necessary.[Company Name] management is updated regularly on
containment status.
Eradication
In the eradication phase, the root cause of the incident is identified and addressed to prevent
recurrence. Security analysts at[Company Name] analyze compromised systems, investigate
vulnerabilities exploited by attackers, and remove any malicious code or artifacts from the
environment. Common eradication measures include:
Recovery
In the recovery phase, [Company Name] implements measures to restore systems and data to
normal operations following the containment and eradication of the incident. This phase is
14
designed to ensure that all affected assets are returned to a secure state, and business
processes can resume without additional risk of compromise.
1. System Restoration: After verifying that the threat has been fully eradicated, impacted
systems are restored from clean, trusted backups. Recovery processes are executed in
alignment with the organization’s Business Continuity and Disaster Recovery (BCDR)
plans to ensure minimal downtime and data integrity.
2. System Validation: After restoration, [Company Name] conducts comprehensive
testing and validation of restored systems to confirm that all security controls are
functioning as expected. This includes verifying patches, configurations, and updates
applied during the eradication phase.
3. User Access Restoration: Access to systems, applications, or data that was restricted
during containment is re-enabled for authorized users following successful validation
of the system’s security posture.
4. Post-Incident Monitoring: Enhanced monitoring of the affected systems and networks
is conducted for a defined period to detect any signs of recurring issues or
vulnerabilities related to the initial incident. Monitoring helps verify that systems
remain secure post-recovery.
5. Documentation and Review: Recovery activities, findings, and lessons learned are
documented to improve future incident response efforts. The incident response team
conducts a post-recovery analysis to assess what worked effectively and what needs
improvement, feeding these insights into future response and recovery planning.
By following these recovery steps, [Company Name] ensures resilient operations and builds
stronger defenses to mitigate the impact of potential future incidents.
Testing
The IRP is tested semi-annually to ensure its effectiveness, with adjustments made based on
test results to continuously improve incident response capabilities.
15
User Entity Control Relevant Criteria
[Subservice Organization]
The services provided by XYZ Cloud Hosting, a subservice organization, are outside the scope
of this report. However, [Company Name] management assumes that complementary
subservice organization controls (CSOCs) are implemented effectively. These are detailed in
the table below.
System Incidents
During the reporting period from [Start Date] to [End Date], no significant system incidents
were identified that affected the effectiveness of the controls in place or resulted in the failure
to achieve service commitments.
16
Section IV: Trust Services Criteria, Related Controls, and
Tests of Controls
In addition to the above procedures, for tests of controls and system controls based on Trust
Services Criteria requiring management’s use of IPE in the execution of the controls (e.g.,
periodic reviews of user access listings), [Auditor Name] inspected management’s procedures
to assess the validity of the IPE source and the completeness, accuracy, and integrity of the
source data or inputs.
Testing Methods
The following methods were employed in testing the operating effectiveness of the controls:
17
● Inquiry: The service auditor conducted interviews with management, operations,
administrative and other relevant personnel who are responsible for developing,
ensuring adherence to and applying controls
● Observation: The service auditor observed the application of control activities by the
service organization’s personnel to validate implementation.
● Inspection: The service auditor inspected source documents, reports, system
configurations, and other items as necessary to confirm the performance of specified
control activities.
● Re-performance: The service auditor independently executed procedures or controls
originally performed by the service organization to validate their effectiveness.
18
Tests of Controls and Results
The following table outlines the tests of controls and the results thereof in relation to the
control activities specified above.
19