Common SOC 2 Audit Exceptions and How to Address Them
Even well-prepared organizations sometimes receive exceptions in their SOC 2 reports. Understanding common exceptions, and how to prevent them, helps you approach your audit with confidence.
Key Takeaways
| Point | Summary |
|---|---|
| Exceptions are normal | Having some exceptions doesn't mean you failed |
| Prevention is better | Most exceptions are preventable with proper preparation |
| Context matters | How you address exceptions matters to customers |
| Remediation helps | Showing you've fixed issues demonstrates maturity |
| Patterns matter | Systemic issues are more concerning than isolated incidents |
Quick Answer: SOC 2 exceptions are specific instances where controls didn't work as expected. Common exceptions include access review delays, missing change approvals, and incomplete offboarding. Most are preventable with proper processes and preparation.
What Are SOC 2 Exceptions?
An exception (sometimes called a "deviation" or "finding") is a specific instance where:
- A control wasn't operating as designed
- Evidence of control operation wasn't available
- A process wasn't followed correctly
Exceptions are documented in Section 5 of your SOC 2 report (Tests of Controls and Results).
How Exceptions Affect Your Report
Impact on Opinion
| Situation | Likely Opinion |
|---|---|
| Few isolated exceptions | Unqualified (clean) |
| Some exceptions, all addressed | Unqualified with exceptions noted |
| Pattern of control failures | May be qualified |
| Significant systemic issues | Qualified or adverse |
Most organizations with exceptions still receive unqualified opinions. The key is whether exceptions indicate systemic problems or isolated incidents.
Customer Perception
Customers reviewing your report will notice:
- Number of exceptions
- Nature of exceptions
- Whether exceptions were remediated
- Your response to identified issues
Most Common SOC 2 Exceptions
1. Access Management Exceptions
Access Reviews Not Completed on Time
What happens: Quarterly access reviews are required but weren't completed for one or more quarters.
How to prevent:
- Set calendar reminders for review deadlines
- Assign clear ownership for reviews
- Use automation to facilitate reviews
- Build buffer time before deadlines
Terminated User Access Not Promptly Removed
What happens: An employee left and their access wasn't removed within the required timeframe.
How to prevent:
- Integrate offboarding with HR processes
- Use automated deprovisioning where possible
- Have clear offboarding checklists
- Set short SLAs for access removal
Missing Access Approval Documentation
What happens: New access was granted but approval wasn't documented.
How to prevent:
- Require ticket-based access requests
- Configure systems to require approval workflow
- Train team on access request procedures
- Audit access provisioning regularly
2. Change Management Exceptions
Changes Deployed Without Approval
What happens: Code changes went to production without documented approval.
How to prevent:
- Configure branch protection rules
- Require pull request approvals
- Use CI/CD gates that enforce approval
- Train developers on change process
Missing Code Review Evidence
What happens: Changes were approved but code review wasn't documented.
How to prevent:
- Require pull request reviews in your workflow
- Configure GitHub/GitLab to require reviews
- Archive review evidence automatically
Emergency Changes Not Properly Documented
What happens: An urgent fix was deployed without following normal process, but wasn't properly documented as an emergency change.
How to prevent:
- Have a clear emergency change process
- Document emergency changes retroactively
- Review all emergency changes afterward
3. Security Operations Exceptions
Vulnerability Not Remediated Within SLA
What happens: A vulnerability was identified but wasn't fixed within your stated remediation timeframe.
How to prevent:
- Set realistic remediation SLAs
- Track vulnerabilities in ticketing system
- Have escalation process for aging issues
- Prioritize based on actual risk
Missing Security Monitoring Evidence
What happens: Auditors couldn't find evidence that security monitoring was active.
How to prevent:
- Configure alerts to create tickets/records
- Maintain security monitoring dashboards
- Document monitoring coverage
- Perform periodic monitoring reviews
Incident Not Documented
What happens: A security incident occurred but wasn't recorded per your incident response process.
How to prevent:
- Train team on incident identification
- Make incident reporting easy
- Have clear incident thresholds
- Review and document all potential incidents
4. Human Resources Exceptions
Training Not Completed
What happens: One or more employees didn't complete required security training.
How to prevent:
- Track training completion automatically
- Set reminders for approaching deadlines
- Escalate incomplete training
- Make training accessible
Missing Background Check
What happens: An employee was hired without completing a background check (or evidence wasn't available).
How to prevent:
- Integrate background checks into hiring workflow
- Maintain evidence of completed checks
- Don't allow system access until checks complete
- Audit hiring records regularly
Onboarding Documentation Incomplete
What happens: New hire security acknowledgments or training weren't documented.
How to prevent:
- Use structured onboarding checklists
- Require acknowledgments before system access
- Track onboarding completion
- Audit recent hires periodically
5. Vendor Management Exceptions
Missing Vendor Risk Assessment
What happens: A vendor handling customer data wasn't formally assessed.
How to prevent:
- Maintain vendor inventory
- Categorize vendors by data access
- Require assessments for critical vendors
- Review vendor list quarterly
Vendor SOC Report Not Reviewed
What happens: You rely on a vendor's SOC 2 report but didn't review it when received.
How to prevent:
- Document vendor SOC report reviews
- Create review checklist
- Track vendor report expiration
- Request updated reports proactively
6. Business Continuity Exceptions
Backup Restoration Not Tested
What happens: Backups were taken but restoration wasn't tested during the audit period.
How to prevent:
- Schedule regular restoration tests
- Document test results
- Make testing part of routine operations
DR Test Not Conducted
What happens: Disaster recovery plans existed but weren't tested.
How to prevent:
- Schedule annual DR tests
- Document test procedures and results
- Update plans based on test findings
Preventing Exceptions
Systematic Approaches
Automation
- Automate evidence collection
- Configure workflow enforcement
- Use automated reminders
Documentation
- Document processes clearly
- Maintain evidence repositories
- Create standard templates
Training
- Train team on control requirements
- Reinforce expectations regularly
- Address gaps quickly
Monitoring
- Track control operation
- Identify issues early
- Address before audit
Pre-Audit Review
Before your audit:
- Review all recurring controls
- Verify evidence is complete
- Address any gaps proactively
- Conduct internal testing
Addressing Exceptions in Your Report
During the Audit
If an exception is identified:
- Understand exactly what occurred
- Provide context to auditors
- Show remediation if completed
- Don't make excuses. Acknowledge and address
In the Report
How exceptions typically appear:
- Description of control tested
- Testing procedure performed
- Exception identified
- Your response or remediation
Customer Conversations
When customers ask about exceptions:
- Acknowledge the finding
- Explain context if relevant
- Describe what you've done to address
- Demonstrate process improvement
Exception Remediation
Immediate Actions
When an exception is identified:
- Understand root cause
- Fix the immediate issue
- Document the remediation
- Update processes to prevent recurrence
Long-term Improvements
To prevent future exceptions:
- Address systemic causes
- Update procedures
- Improve training
- Enhance monitoring
- Automate where possible
The Bastion Approach
We help minimize exceptions through:
- Pre-audit preparation - Identifying potential issues before auditors arrive
- Process design - Building processes that naturally produce evidence
- Continuous monitoring - Catching issues throughout the year
- Evidence management - Ensuring documentation is complete and organized
- Remediation support - Addressing any issues that arise quickly
Our goal is a clean report, and when exceptions do occur, demonstrating mature handling.
Questions about preparing for your SOC 2 audit? Talk to our team
Sources
- AICPA Trust Services Criteria - Control requirements that are tested
- AICPA SOC 2® Guide - Guidance on testing and exception handling
