SOC 27 min read

How to Define Your SOC 2 Audit Scope

Defining the right scope for your SOC 2 audit is one of the most important decisions you'll make in the process. Getting it right helps ensure you demonstrate the security that matters to your customers while avoiding unnecessary complexity and cost.

Key Takeaways

Point Summary
Scope determines effort Broader scope means more systems, controls, and evidence to manage
Start focused Many organizations begin with their core product and primary infrastructure
Customer requirements matter Let your customers' needs guide what you include
Systems, not just criteria Scope includes which systems, services, and infrastructure are covered
Document thoroughly Clear scope documentation helps avoid surprises during the audit

Quick Answer: SOC 2 scope defines which systems, services, and Trust Services Criteria are included in your audit. Starting with a focused scope covering your core product and primary customer data handling is often the most effective approach for first-time audits.

What Is SOC 2 Scope?

Your SOC 2 scope has two main dimensions:

1. Trust Services Criteria (TSC)

Which criteria are included:

  • Security (required for all SOC 2 audits)
  • Availability (optional)
  • Processing Integrity (optional)
  • Confidentiality (optional)
  • Privacy (optional)

See our Trust Services Criteria guide for details on each criterion.

2. Systems and Infrastructure

Which systems, services, and infrastructure are covered:

  • Production applications and databases
  • Cloud infrastructure (AWS, GCP, Azure accounts)
  • Supporting services and integrations
  • Internal tools that process customer data
  • People and processes

Why Scope Matters

For Your Audit

Scope Impact Consideration
Complexity More systems = more controls to document and test
Timeline Broader scope can extend implementation time
Cost More comprehensive scope typically increases investment
Evidence burden More systems mean more evidence to collect and maintain

For Your Customers

Scope Impact Consideration
Coverage Scope should cover what customers care about
Credibility Scope should meaningfully address your service
Questions Customers may ask why certain things are excluded

Common Scope Patterns

Pattern 1: Core Product Focus

Includes:

  • Primary customer-facing application
  • Production database
  • Supporting cloud infrastructure
  • CI/CD pipeline
  • Employee systems that access production

Excludes:

  • Internal tools not touching customer data
  • Development and staging environments
  • Marketing and sales systems

Best for: First-time SOC 2, focused product companies

Pattern 2: Full Platform Coverage

Includes:

  • All customer-facing products and services
  • All supporting infrastructure
  • Data processing pipelines
  • Analytics and reporting systems
  • Internal tools accessing customer data

Best for: Mature organizations with multiple products, enterprise customers with comprehensive requirements

Pattern 3: Specific Service Focus

Includes:

  • One specific service or product line
  • Only the infrastructure supporting that service
  • Relevant employee access

Excludes:

  • Other products or services
  • Unrelated infrastructure

Best for: Organizations with multiple distinct products serving different markets

How to Determine Your Scope

Step 1: Understand Customer Requirements

Start by understanding what your customers actually need:

  • Review security questionnaires you've received
  • Identify common themes in customer security requirements
  • Consider which systems customers are most concerned about
  • Note any specific criteria customers request

Step 2: Map Your Data Flows

Document how customer data moves through your systems:

  • Where does data enter your systems?
  • Where is it stored?
  • What processes access it?
  • Where does it leave your systems?
  • What third parties are involved?

Step 3: Identify Critical Systems

Determine which systems are essential to include:

System Category Questions to Ask
Applications Which applications handle customer data?
Databases Where is customer data stored?
Infrastructure What cloud accounts and services support production?
Integrations What third-party services process customer data?
People Who has access to customer data and systems?

Step 4: Define Boundaries

Create clear boundaries for what's in and out of scope:

In scope:

  • Systems that store, process, or transmit customer data
  • Infrastructure supporting those systems
  • People with access to those systems
  • Third parties that handle data on your behalf

Potentially out of scope:

  • Development environments (unless they have production data access)
  • Internal tools not accessing customer data
  • Marketing and sales systems
  • Corporate systems unrelated to service delivery

Scope Considerations by Criterion

Security (Required)

Always included. Covers:

  • Access controls
  • Change management
  • Vulnerability management
  • Incident response
  • Physical and environmental controls

Availability

Consider including if:

  • You have SLAs with customers
  • Uptime is critical to your service
  • Customers ask about availability

Adds:

  • Capacity planning
  • Disaster recovery
  • Business continuity
  • Performance monitoring

Processing Integrity

Consider including if:

  • You process transactions or calculations
  • Data accuracy is critical
  • Customers depend on correct processing

Adds:

  • Data validation
  • Processing accuracy controls
  • Error handling
  • Reconciliation procedures

Confidentiality

Consider including if:

  • You handle sensitive business information
  • Customers share proprietary data
  • Confidentiality commitments exist

Adds:

  • Data classification
  • Confidentiality agreements
  • Data handling procedures
  • Disclosure controls

Privacy

Consider including if:

  • You process personal information
  • GDPR or similar regulations apply
  • Customers require privacy attestation

Adds:

  • Privacy notice requirements
  • Consent management
  • Data subject rights
  • Privacy impact assessments

Common Scope Mistakes

Mistake 1: Over-Scoping

Problem: Including too many systems or criteria creates unnecessary complexity.

Solution: Start focused. You can expand scope in subsequent years based on customer feedback.

Mistake 2: Under-Scoping

Problem: Excluding systems that customers expect to be covered.

Solution: Ensure scope covers your core service and primary customer data handling. Check customer requirements.

Mistake 3: Unclear Boundaries

Problem: Ambiguous scope creates audit issues and customer confusion.

Solution: Document scope clearly with specific systems named. Review with your auditor before starting.

Mistake 4: Ignoring Subservice Organizations

Problem: Third parties that process data on your behalf aren't considered.

Solution: Identify all subservice organizations. Either include their controls or rely on their SOC 2 reports (carve-out method).

Subservice Organizations

If you use third-party services that handle customer data, you have two approaches:

Inclusive Method

You take responsibility for the third party's controls:

  • More complex
  • Requires testing their controls
  • Greater assurance to customers

Carve-Out Method

You rely on the third party's own SOC 2 report:

  • More common approach
  • Simpler to manage
  • Reference their report in yours

Most organizations use the carve-out method for major cloud providers (AWS, GCP, Azure) and other SOC 2-certified vendors.

Documenting Your Scope

Your scope documentation should include:

System Description

  • Overview of services provided
  • Components of the system
  • Principal service commitments
  • System requirements
  • Applicable trust services criteria

Boundaries

  • Specific systems and applications included
  • Infrastructure covered
  • Types of data in scope
  • Subservice organizations and method used
  • What is explicitly out of scope

Trust Services Criteria

  • Which criteria are included
  • Rationale for inclusion/exclusion

Scope Changes Over Time

Expanding Scope

Common reasons to expand:

  • Customer requests for additional criteria
  • New products or services
  • Regulatory requirements
  • Competitive considerations

Process:

  • Identify what's being added
  • Implement additional controls
  • Update documentation
  • Include in next audit cycle

Narrowing Scope

Be cautious about narrowing scope:

  • Customers may question removed elements
  • May require explanation
  • Consider timing carefully

Working with Your Auditor

Before the Audit

  • Review proposed scope with auditor
  • Confirm auditor understanding of your systems
  • Agree on boundaries
  • Clarify subservice organizations

During Scoping

  • Walk through system architecture
  • Identify data flows
  • Confirm system boundaries
  • Document any assumptions

Scope Changes Mid-Audit

  • Communicate changes promptly
  • Understand impact on timeline
  • Update documentation accordingly

The Bastion Approach to Scoping

We help you define the right scope through:

  • Customer requirements analysis - Understanding what your customers actually need
  • System mapping - Documenting your data flows and critical systems
  • Criteria recommendation - Advising on which Trust Services Criteria make sense
  • Boundary definition - Creating clear, defensible scope boundaries
  • Documentation - Preparing comprehensive scope documentation

Our goal is a scope that meaningfully addresses customer requirements without unnecessary complexity.


Have questions about defining the right scope for your SOC 2? Talk to our team


Sources