SOC 2 Trust ServicesCompliance
52 controls across 5 Trust Services Principles, continuously monitored and audit-ready. The gold standard for demonstrating security to enterprise customers.
The 5 Trust Services Principles
SOC 2 is built on five principles. Security is always required; the others are chosen based on your service commitments to customers.
Security
Always RequiredProtection against unauthorized access and system vulnerabilities
Availability
System accessibility for operation and use as committed
Processing Integrity
System processing is complete, valid, accurate, and authorized
Confidentiality
Information designated as confidential is protected as committed
Privacy
Personal information is collected, used, and retained appropriately
13 Control Categories
SOC 2 controls are organized into 13 categories, with the first 9 (CC1-CC9) forming the Common Criteria that apply to all engagements. Additional criteria apply based on which Trust Services Principles you include.
Our platform continuously monitors evidence across all categories:
- Common Criteria (CC1-CC9): 33 controls for Security
- Availability (A1): 3 additional controls
- Processing Integrity (PI1): 5 additional controls
- Confidentiality (C1): 2 additional controls
- Privacy (P1-P8): 9 additional controls
Control Categories
Type I vs Type II: Which Do You Need?
Type I is a snapshot; Type II proves controls work over time. Most enterprise customers require Type II for vendor assessments.
| Aspect | Type I Report | Type II Report |
|---|---|---|
| Scope | Design of controls | Design + Operating effectiveness |
| Time period | Point-in-time (single date) | 6-12 month observation period |
| Evidence required | Policies and procedures | Policies + execution evidence |
| Audit complexity | Lower (less testing) | Higher (sampling & testing) |
| Market acceptance | Initial assessment only | Industry standard for trust |
| Cost | Lower ($20K-$50K typical) | Higher ($30K-$100K+ typical) |
Our Recommendation
Start with Type I to validate your control design, then immediately begin your observation period for Type II. With continuous monitoring, you'll collect evidence automatically throughout the observation period, making your Type II audit straightforward.
Evidence From Your Existing Stack
SOC 2 evidence is collected automatically from tools you already use. No manual screenshots or spreadsheet maintenance.
Acronis Cyber Protect Cloud
- Backup job statusA1.2
- Encryption at restCC6.1
- Disaster recovery testsA1.3
- Agent deploymentCC6.6
- Malware detectionCC6.8
Microsoft GDAP
- Privileged accessCC6.2
- MFA enforcementCC6.1
- Role assignmentsCC6.3
- Access reviewsCC6.2
Microsoft Entra
- User authenticationCC6.1
- Conditional accessCC6.3
- Identity governanceCC6.2
Always Audit-Ready, Never Scrambling
Traditional SOC 2 prep means weeks of gathering screenshots, updating spreadsheets, and chasing down evidence. With continuous monitoring, you're always audit-ready.
- Continuous control monitoring with evidence collection
- Automated policy documentation and version control
- Real-time gap detection and remediation tracking
- Auditor-ready evidence packages on demand
- Historical evidence retention for observation periods
- Control effectiveness dashboards and trend analysis
SOC 2 Opens Enterprise Doors
Enterprise customers require SOC 2 reports during vendor assessments. A clean SOC 2 Type II report accelerates sales cycles and reduces friction.
Faster Sales Cycles
Skip lengthy security questionnaires. Share your SOC 2 report and move straight to contract negotiations with enterprise prospects.
Vendor Assessments
Pass third-party risk assessments with confidence. SOC 2 is the most requested compliance report in enterprise procurement.
Competitive Advantage
Win deals against competitors who lack SOC 2. Enterprise buyers choose vendors who can demonstrate security controls.
Frequently Asked Questions
Start Your SOC 2 Journey Today
No credit card required. 14-day trial. Cancel anytime.
Connect your existing tools and begin collecting SOC 2 evidence immediately. Reduce audit prep from weeks to hours.