SOC 26 min read

Understanding Your SOC 2 Report

Once your SOC 2 audit is complete, you'll receive a formal report from your auditor. Understanding what's in this report, and how to interpret it, helps you use it effectively with customers and stakeholders.

Key Takeaways

Point Summary
Report structure Five main sections: auditor's opinion, management assertion, system description, controls, and test results
The opinion matters An "unqualified" opinion means your controls are working as designed
Exceptions are normal Having some exceptions noted doesn't mean you failed
Confidentiality SOC 2 reports are typically shared under NDA with customers
Validity Reports are typically considered current for 12 months

Quick Answer: Your SOC 2 report is a formal document from your auditor containing their opinion on your controls, a description of your system, the controls tested, and the results of testing. An unqualified opinion indicates your controls are designed and operating effectively.

The Five Sections of a SOC 2 Report

Section 1: Independent Service Auditor's Report (The Opinion)

This is the most important section. It contains the auditor's formal opinion on your controls.

Types of opinions:

Opinion Type Meaning
Unqualified Controls are designed and operating effectively (what you want)
Qualified Controls are generally effective, but with specific exceptions
Adverse Significant control failures identified
Disclaimer Auditor couldn't form an opinion

An unqualified opinion is the standard result for a successful audit.

Section 2: Management's Assertion

This section contains your organization's formal statement about:

  • The accuracy of the system description
  • The controls in place
  • The period covered by the report

It demonstrates that management takes responsibility for the control environment.

Section 3: System Description

A detailed description of your organization and systems, including:

Element What It Covers
Company overview Description of your organization
Services What services are covered by the report
Infrastructure Technology and systems in scope
Software Applications and tools used
People Roles and responsibilities
Data Types of data processed
Subservice organizations Third parties used
System boundaries What's in and out of scope

This section helps readers understand what was actually examined.

Section 4: Applicable Trust Services Criteria and Controls

Lists all the controls tested against the Trust Services Criteria:

  • Which criteria are included (Security, Availability, etc.)
  • Your specific controls that address each criterion
  • How controls are implemented

Section 5: Tests of Controls and Results

The detailed results of auditor testing:

  • Which controls were tested
  • What testing procedures were performed
  • The results of each test
  • Any exceptions or deviations identified

This is the evidence that controls are actually working.

Reading Your Report Effectively

Start with the Opinion

The opinion letter tells you the overall result. Look for:

  • Type of opinion (unqualified is the goal)
  • Any scope limitations
  • The period covered

Review the System Description

Check that it accurately reflects:

  • Your organization as it was during the audit period
  • The systems and services covered
  • The boundaries defined during scoping

Examine Test Results

For each control area:

  • Were tests performed?
  • What were the results?
  • Are any exceptions noted?

Understand Exceptions

Exceptions are specific instances where a control didn't work as expected. They don't necessarily mean failure:

Exception Type Typical Handling
Minor deviation Noted but doesn't affect opinion
Isolated incident Noted with context
Remediated issue Noted as resolved
Systemic problem May affect opinion

What Customers Look For

When customers review your SOC 2 report, they typically focus on:

The Opinion

  • Is it unqualified?
  • Does it cover the right period?

Scope Coverage

  • Are the systems they care about included?
  • Are the relevant Trust Services Criteria covered?

Specific Control Areas

  • Access controls
  • Change management
  • Data encryption
  • Incident response
  • Vendor management

Exceptions

  • How many exceptions?
  • What type?
  • Were they remediated?

Type 1 vs Type 2 Reports

Type 1 Report Contents

Section Coverage
Opinion On design of controls at a point in time
System description As of audit date
Controls Listed and described
Testing Design evaluation only

Type 2 Report Contents

Section Coverage
Opinion On design AND operating effectiveness
System description During observation period
Controls Listed, described, and tested
Testing Operating effectiveness over the period

Type 2 reports are more comprehensive because they demonstrate controls working over time.

Sharing Your Report

With Customers

Standard approach:

  • Share under NDA
  • Provide watermarked PDF
  • Use a secure sharing portal

What to include:

  • Full report
  • Any clarifying context if needed

Publicly

SOC 2 reports are not typically shared publicly. For public-facing information:

  • Consider SOC 3 (public summary)
  • Use your Trust Center
  • Reference your SOC 2 status on your website

Report Validity and Currency

How Long Is a Report Valid?

Technically, SOC 2 reports don't expire. However:

  • Industry expects annual renewal
  • Reports over 12 months old are considered stale
  • Customers typically want reports from within the past year

Bridge Letters

If your report is aging while you await renewal:

  • Request a bridge letter from your auditor
  • Confirms no material changes since last report
  • Bridges the gap until new report is ready

See our SOC 2 Bridge Letters guide for more details.

Interpreting Common Report Elements

Control Categories

Controls are typically organized by Trust Services Criteria categories:

Category What It Covers
CC1 Control environment
CC2 Communication and information
CC3 Risk assessment
CC4 Monitoring activities
CC5 Control activities
CC6 Logical and physical access
CC7 System operations
CC8 Change management
CC9 Risk mitigation

Testing Terminology

Term Meaning
Inquiry Auditor asked personnel about controls
Observation Auditor watched control in operation
Inspection Auditor examined documentation or evidence
Reperformance Auditor re-executed the control procedure

Exception Descriptions

When exceptions are noted, you'll typically see:

  • Description of the control
  • What was expected
  • What was observed
  • Impact assessment

Using Your Report for Sales

Security Questionnaires

Your SOC 2 report can help answer security questionnaire questions:

  • Reference specific controls
  • Point to relevant report sections
  • Demonstrate third-party validation

Sales Conversations

Use your report to:

  • Demonstrate security commitment
  • Differentiate from competitors
  • Reduce time spent on security reviews

Marketing

While the full report is confidential, you can:

  • Mention SOC 2 compliance status
  • Display SOC 2 badge on website
  • Reference in sales materials

After Receiving Your Report

Immediate Actions

  • Review for accuracy
  • Note any exceptions that need attention
  • Set up secure sharing process
  • Update marketing materials

Ongoing

  • Track report expiration
  • Plan for annual renewal
  • Address any noted exceptions
  • Monitor for scope changes

The Bastion Approach

We help you get the most from your SOC 2 report:

  • Pre-audit preparation - Ensuring controls are ready so exceptions are minimized
  • Report review - Helping you understand your report and its implications
  • Sharing setup - Establishing secure processes for customer sharing
  • Exception remediation - Addressing any noted issues before next audit

Questions about your SOC 2 report? Talk to our team


Sources