SOC 28 min read

SOC 2 Trust Services Criteria: A Complete Guide

The Trust Services Criteria (TSC) form the foundation of every SOC 2 audit. Developed by the AICPA, these criteria define the control objectives organizations work toward. Understanding each criterion can help you scope your audit appropriately and implement controls that genuinely support your security posture.

Key Takeaways

Point Summary
Five criteria Security (required), Availability, Processing Integrity, Confidentiality, and Privacy (all optional)
Consider starting focused Many first-time audits include Security + Availability only
Security is mandatory Also called "Common Criteria" - covers 9 control categories (CC1-CC9)
Significant overlap Many controls satisfy multiple criteria, which can reduce additional effort
Expand thoughtfully Additional criteria can be added in subsequent years based on customer needs

Quick Answer: SOC 2 has 5 Trust Services Criteria. Security is required for all audits. For a first SOC 2, many organizations start with Security + Availability (if they have SLAs), then consider additional criteria based on customer requirements.

Overview of Trust Services Criteria

Criterion Required? Focus Area
Security Yes Protection against unauthorized access
Availability No System uptime and accessibility
Processing Integrity No Accurate and complete processing
Confidentiality No Protection of confidential information
Privacy No Personal information handling

Security (Common Criteria): Required

The Security criterion is mandatory for every SOC 2 audit. Also known as the Common Criteria, it establishes the foundation for protecting systems and data against unauthorized access.

Control Categories

CC1: Control Environment

The control environment sets the tone for your organization's commitment to security.

Key controls:

  • Board and management oversight of security
  • Organizational structure and reporting lines
  • Commitment to competence and accountability
  • Security policies and standards

Evidence examples:

  • Organization chart
  • Security policy documents
  • Board meeting minutes discussing security
  • Job descriptions with security responsibilities

CC2: Communication and Information

How your organization communicates security information internally and externally.

Key controls:

  • Internal security communications
  • Security awareness programs
  • External communication of security commitments
  • Reporting channels for security issues

Evidence examples:

  • Security awareness training records
  • Internal security announcements
  • Customer-facing security documentation
  • Incident reporting procedures

CC3: Risk Assessment

How your organization identifies and manages security risks.

Key controls:

  • Risk assessment process
  • Risk identification and analysis
  • Risk treatment decisions
  • Ongoing risk monitoring

Evidence examples:

  • Risk assessment documentation
  • Risk register
  • Risk treatment plans
  • Risk review meeting minutes

CC4: Monitoring Activities

How your organization monitors the effectiveness of security controls.

Key controls:

  • Ongoing monitoring processes
  • Separate evaluations
  • Communication of deficiencies
  • Remediation tracking

Evidence examples:

  • Monitoring dashboards
  • Internal audit reports
  • Remediation tracking records
  • Management review documentation

CC5: Control Activities

The policies and procedures that help ensure security objectives are met.

Key controls:

  • Logical access controls
  • Physical access controls
  • Change management
  • System operations

Evidence examples:

  • Access control configurations
  • Change management records
  • System hardening documentation
  • Operational procedures

CC6: Logical and Physical Access Controls

Detailed controls for restricting access to systems and facilities.

Key controls:

  • User access provisioning and deprovisioning
  • Authentication mechanisms (MFA)
  • Network security controls
  • Physical security measures

Evidence examples:

  • User access reviews
  • MFA configuration screenshots
  • Firewall rules
  • Physical access logs

CC7: System Operations

Controls for detecting and responding to security events.

Key controls:

  • Vulnerability management
  • Security monitoring and alerting
  • Incident detection and response
  • Malware protection

Evidence examples:

  • Vulnerability scan reports
  • Security alert configurations
  • Incident response records
  • Antimalware deployment evidence

CC8: Change Management

Controls for managing changes to systems and applications.

Key controls:

  • Change authorization process
  • Testing before deployment
  • Segregation of duties
  • Emergency change procedures

Evidence examples:

  • Change request tickets
  • Code review records
  • Deployment approvals
  • Testing documentation

CC9: Risk Mitigation

Controls for identifying and mitigating risks from vendors and business partners.

Key controls:

  • Vendor risk assessment
  • Contract security requirements
  • Ongoing vendor monitoring
  • Business continuity considerations

Evidence examples:

  • Vendor assessment questionnaires
  • Contract security clauses
  • Vendor review records
  • Business continuity plans

Availability: Optional

The Availability criterion addresses whether your systems meet the operational and accessibility requirements specified in service agreements.

When to Include Availability

Include if:

  • You offer SLAs with uptime commitments
  • Customers depend on your service for critical operations
  • You provide infrastructure or platform services
  • Downtime would significantly impact customers

Skip if:

  • You don't have formal SLAs
  • Your service is non-critical to customer operations
  • You're optimizing for a faster first audit

Key Control Areas

A1: System Availability

Controls:

  • Capacity planning and monitoring
  • Backup and recovery procedures
  • Disaster recovery planning
  • Environmental controls

Evidence examples:

  • Capacity monitoring dashboards
  • Backup logs and test results
  • DR plan documentation
  • DR test records

Availability-Specific Requirements

Requirement Description
Uptime monitoring Continuous monitoring of system availability
Incident management Process for handling availability incidents
Capacity management Ensuring adequate resources
Recovery procedures Documented and tested recovery processes

Processing Integrity: Optional

The Processing Integrity criterion ensures that system processing is complete, valid, accurate, timely, and authorized.

When to Include Processing Integrity

Include if:

  • You process financial transactions
  • Data accuracy is critical to your service
  • You perform calculations or data transformations
  • Errors could cause significant customer impact

Skip if:

  • You primarily store/retrieve data without transformation
  • Processing accuracy isn't a primary customer concern
  • You're optimizing for a faster first audit

Key Control Areas

PI1: Processing Integrity

Controls:

  • Input validation and completeness checks
  • Processing accuracy monitoring
  • Error handling and correction
  • Output validation

Evidence examples:

  • Data validation rules
  • Processing reconciliation reports
  • Error logs and resolution records
  • Quality assurance documentation

Confidentiality: Optional

The Confidentiality criterion addresses the protection of information designated as confidential.

When to Include Confidentiality

Include if:

  • You handle customer trade secrets
  • You process proprietary business information
  • Contracts specify confidentiality requirements
  • You handle pre-release or sensitive business data

Skip if:

  • You don't handle specially designated confidential data
  • Privacy criterion covers your personal data needs
  • You're optimizing for a faster first audit

Key Control Areas

C1: Confidential Information

Controls:

  • Data classification policies
  • Confidential data identification
  • Access restrictions for confidential data
  • Secure disposal procedures

Evidence examples:

  • Data classification policy
  • Confidential data inventory
  • Access control configurations
  • Disposal certificates/logs

Privacy: Optional

The Privacy criterion addresses the collection, use, retention, disclosure, and disposal of personal information in accordance with your privacy commitments.

When to Include Privacy

Include if:

  • You collect and process personal information
  • You have consumer-facing products
  • You operate in healthcare, HR, or education
  • Privacy regulations (GDPR, CCPA) apply to you

Skip if:

  • You only handle business data, not personal data
  • You're a pure B2B service with no end-user data
  • You're optimizing for a faster first audit

Key Control Areas

P1-P8: Privacy Principles

Controls:

  • Notice and consent mechanisms
  • Data collection limitations
  • Use, retention, and disposal policies
  • Access and correction procedures
  • Disclosure and sharing controls
  • Data quality assurance
  • Monitoring and enforcement

Evidence examples:

  • Privacy policy
  • Consent mechanisms
  • Data retention schedules
  • Subject access request procedures
  • Data processing agreements

Choosing Your Criteria

First-Time SOC 2 Considerations

Your Situation Criteria to Consider
Focused resources, straightforward needs Security only
SaaS with uptime commitments Security + Availability
Handling personal information Security + Privacy
Financial data processing Security + Processing Integrity
Enterprise customers with comprehensive requirements Security + Availability + Confidentiality

A Thoughtful Expansion Approach

It's generally wise to avoid over-scoping a first audit. Many organizations follow a progression like:

Year 1: Security (+ Availability if uptime commitments exist)
Year 2: Consider adding Confidentiality or Privacy based on customer feedback
Year 3: Evaluate full scope based on market requirements

Criteria Selection Checklist

Ask these questions to determine your scope:

  • Do we have SLAs with uptime commitments? → Availability
  • Is data processing accuracy critical? → Processing Integrity
  • Do we handle specially designated confidential data? → Confidentiality
  • Do we collect or process personal information? → Privacy

Control Mapping Across Criteria

Many controls satisfy multiple criteria. Here's how they overlap:

Control Area Security Availability Processing Integrity Confidentiality Privacy
Access Control
Encryption
Monitoring
Backup/Recovery
Change Management

Practical Considerations

Start focused, expand thoughtfully

Adding criteria after your first audit is generally straightforward. Removing criteria can require explanation to customers. Starting with a focused scope tends to work well for most organizations.

Let customer needs guide your decisions

If you're consistently hearing questions about availability from prospects, that's a signal to consider including it. Market demand can be a useful guide for scoping decisions.

Think about framework alignment

If ISO 27001 is on your roadmap, the SOC 2 Security criterion maps closely. The Privacy criterion aligns with GDPR requirements. See our SOC 2 vs ISO 27001 comparison for more details.

Document your rationale

Keeping records of why you included or excluded certain criteria can be helpful. Auditors and customers sometimes ask about scoping decisions.


Have questions about determining the right SOC 2 scope for your organization? Talk to our team →


Sources