Preparing for a Successful SOC 2 Audit

Chris Heighes
|
Senior Consultant at URM
|
|
PUBLISHED on
16
October
2025
SUMMARY

In this blog, we outline what organisations can expect in a SOC 2 audit, from the typical audit timeline and evidence requirements through to audit meetings and reporting.  We break down the key considerations in defining your SOC 2 audit scope and what the audit will cover, including the types of evidence that will be collected.  We also discuss the importance of your system description and how to create one that adds real value to your organisation, along with practical guidance on handling exceptions and planning for a successful audit.

Since its introduction in 2010, the SOC 2 framework has become one of the most widely recognised and trusted ways for organisations to demonstrate to clients that their services are secure and client data is appropriately protected.  Its comprehensive nature, however, means that receiving a favourable SOC 2 report requires significant coordination and commitment across the business.  For organisations approaching a SOC 2 audit, having clarity on what the process entails and how best to prepare is essential to navigating it successfully.  

Under the SOC 2 framework, organisations can obtain either a Type 1 or Type 2 report.

  • A Type 1 report assesses your controls and processes at a specific point in time.
  • A Type 2 report evaluates how those controls have operated over a defined period.

As discussed in our SOC 2 Explained blog, Type 2 reports provide a higher level of assurance and, in most cases, are what clients requesting the report will expect to see, unless there is a strong justification for pursuing a Type 1 report.  As such, this blog focuses on practical guidance for organisations preparing for a SOC 2 Type 2 audit.

What to expect from your SOC 2 audit

SOC 2 audits are comprehensive and demanding, requiring substantial preparation and thorough documentation to demonstrate compliance through verifiable evidence.  Due to their comprehensive nature, SOC 2 audits typically span several weeks.  The auditor will work with you to determine the most appropriate timeline for your organisation, however the following represents a  typical SOC 2 audit timeline:

  • Week 1 – Audit scope and timelines agreed with auditors
  • Week 2 – Auditors provide a list of evidence requests
  • Weeks 3-6 – Organisation provides evidence and the system description
  • Weeks 7-8 – Auditor holds audit meetings
  • Weeks 9-10 – Auditor produces draft SOC 2 report
  • Week 11 – SOC 2 report is reviewed and signed off
  • Week 12 – Final SOC 2 report is delivered.

As demonstrated by the above timeline, SOC 2 audit organisations will provide you with a list of the evidence that they require.  This list will be very substantial, with potentially hundreds of lines of evidence being required, which is why you are likely to be allocated a window of around a month (or perhaps even longer) to provide evidence against these requests.  The auditor's evidence request list will include both policy and process documentation, as well as evidence to demonstrate that these policies and processes are being followed (screenshots of system configurations, governance meeting minutes, audit reports, results of technical tests, etc.).  

Since SOC 2 Type 2 audits assess operating effectiveness, the evidence you submit must clearly demonstrate that your policies and procedures have been consistently and effectively followed throughout the entire reporting period.  For example, when evidencing change management, your auditor will want to review your change management policy, minutes of change request board meetings, etc., but will also ask for a list of all change requests from within the reporting period, and review a sample of these requests and the associated detail.  

Unlike an ISO 27001 audit, where the auditor will want to hold interviews for each of the in-scope control areas, SOC 2 audit meetings will generally only occur if the auditor has questions about or does not understand some of the evidence you have provided, or if there is evidence missing.*  If the auditor is satisfied with the evidence you have provided for a particular area, that area will not require any additional discussion and will be marked as compliant.  So, you do not need to schedule audit meetings with representatives for every process, but should instead wait for the auditor to tell you which areas require a follow-up discussion.

*To learn more about the relationship between SOC 2 and ISO 27001, read our blog ISO 27001 vs SOC 2 - Part 2.

How do you define your scope?

Within your SOC 2 report, you will need to articulate your service scope very clearly so that clients receiving the report have an accurate understanding of what it will and will not include.  The way your audit scope is defined will depend on the unique characteristics and operational structure of your organisation, however the key aspect to consider is your clients and their expectations.  Which clients require a SOC 2 report?  And which Trust Services Criteria (TSC) matter to them?  And, crucially, which of your services are they utilising? Answering these questions can help you figure out which parts of your business actually need a SOC 2 report (i.e., those used by your target group of existing or prospect clients) and which ones don’t, so you can leave them out of the audit.

What will be audited?

The aim of a SOC 2 audit is to assure the ‘system’ that delivers your in-scope service(s).  The ‘system’ comprises everything that is utilised and the activities conducted to support a service’s delivery, such as the technical controls that secure the service, back-office functions that support it, the personnel that develop/deliver/secure the service, wider organisational governance elements (risk management, HR processes, communications, etc.), to name a few.   So, the audit will cover the following elements as they relate to the service(s) you have included within your scope:

  • Processes and controls
  • Infrastructure
  • Software
  • Departments and teams (organisational structure)
  • Third parties.

These aspects will all need to be documented within your SOC 2 report.  The system description (one of the four standard sections that make up SOC 2 reports) includes a section where you will need to detail the infrastructure, software, and departments and teams that support your service.  There is also a detailed section where you will need to specify the key third parties that are delivering particular controls for your organisation (e.g., the data centres where your infrastructure is hosted) and how the security of these suppliers is assured. Ideally, these third parties will have their own SOC 2 report, which you can request and use as evidence within your report.

How do you describe your system?

As the audited organisation, it is your responsibility to produce the system description.  The description you produce will need to document the in-scope services you deliver, and, as referenced above, the infrastructure, software, teams, etc., that are delivering those services.  Your system description also allows you to articulate the ethos and culture of your organisation, and how this is implemented.  

It is not uncommon for organisations to treat the system description as an afterthought, due to being so focused on the audit process itself and delivering the evidence requested by the auditors.  However, this approach fails to recognise the importance of the system description and the benefits it can provide; your description is an opportunity for you to present your organisation in the best possible light, and highlight the maturity of the processes and controls it has in place.  As such, you need to ensure that an appropriate amount of time is allocated to produce the system description, and that the correct staff write, review, and approve it.  Often, your audit organisation will provide a template for your description, which functions as an extremely useful starting point, but should not be relied upon too heavily.  Ultimately, it is your system description, and should be crafted to reflect your organisation’s specific strengths.

How do you respond to exceptions?

In the context of SOC 2, an audit exception is an instance of noncompliance with your documented policies or processes; for example, if your change management policy specifies that each change request should include a rollback plan, and the auditor identifies a change request that does not include this, then an exception is likely to be raised.  If a potential exception is raised by your auditor, it is important that you investigate and understand whether it is actually an exception, instead of immediately accepting it without question.  If you can justify and provide an appropriate explanation for it, the auditor may be able to withdraw the exception.  

However, if an exception cannot be explained or justified, it will be documented in your report and you will have an opportunity to provide context for the exception and explain the steps you have taken to address it.   So, even if exceptions are raised, you will still be able to demonstrate accountability and continuous improvement to stakeholders reading your report.

What audit planning is required?

Undertaking a SOC 2 audit is a major commitment and will demand considerable time, effort, and resources.  You will need to work with your audit organisation to understand your fieldwork start and end dates, i.e., when you will receive your evidence requests, when they will expect those evidence requests to be fulfilled, etc.  You also need to identify which members of your organisation (including technical subject matter experts) will be providing evidence, ensure they understand what is required, and agree processes for evidence collection and validation.  For example, will you work on the basis that your subject matter experts know their processes, so will deliver evidence directly without this needing to be validated?  Or, will your compliance team collect the evidence from subject matter experts, perform a validation check of this evidence to ensure it is compliant, and then provide this to the auditor?  Either approach is acceptable, but it is important to ensure that the evidence collection and validation process you adopt is followed consistently by all personnel involved in the audit. Finally, you will need to assign someone within your organisation with responsibility for tracking audit progress and managing issues, as this will ensure you are aware if there is evidence that can’t be delivered, or if any other problems arise.

Conclusion

A SOC 2 Type 2 audit represents both a challenge and an opportunity: a challenge in terms of the preparation and resources required, and an opportunity to demonstrate the strength and maturity of your organisation’s information security management.  By approaching the process with foresight and discipline, your organisation will be far more likely to achieve a smooth and successful audit, receive an unqualified SOC 2 Type 2 report, and subsequently reinforce trust with key clients and stakeholders.  Ultimately, the effort invested in a SOC 2 audit delivers value far beyond the report itself.

How URM Can Help

If your organisation is looking to achieve SOC 2 compliance, URM can leverage its nearly 2 decades of experience helping organisations conform and certify to information security frameworks and standards to support your SOC 2 journey.   Our consultants can offer a full range of services to support you through the entire process; for example, we can conduct a SOC 2 gap analysis, where our experts will help you determine the most appropriate audit scope, and identify which criteria and controls will be included.  We will then conduct a detailed evaluation of the in-scope policies, processes and controls against the framework’s requirements, allowing you to understand where further work is needed for you to become ready for your SOC 2 assessment, and the amount of effort, resources and time that will be required to do so.   Having established what actions are required to achieve compliance, URM’s consultants can work with you to remediate any gaps, support your SOC 2 implementation and ensure you are ideally positioned to receive an unqualified report. During the formal audit, our expert can be on hand to offer guidance on evidence gathering, the presentation of control maturity, interpreting the questions you are asked and on how best to demonstrate that you are meeting the framework’s requirements.

Chris Heighes
Senior Consultant at URM
Chris is a Senior Consultant at URM who has worked in IT for over 30 years, with more than 14 years’ experience in information security. He is a Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Payment Card Industry Qualified Security Assessor (PCI QSA), ISO 9001 Certified Lead Auditor and an ISO 27001 Certified Lead Implementer.
Read more

All you need to meet SOC 2 requirements

If your organisation has received a request for a SOC 2 report and is looking to meet all the necessary requirements, URM can offer you informed guidance and practical support.
Thumbnail of the Blog Illustration
Information Security
Published on
10/7/2023
ISO 27001 vs SOC 2 - Part 3

3rd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
3/7/2023
ISO 27001 vs SOC 2 - Part 2

2nd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
11/10/2024
SOC 2 Explained

URM’s blog answers key questions about SOC 2, including what it is & who it applies to, why it is beneficial, how SOC 2 reports are structured & more.

Read more
I know many Cyber Essentials providers are rigid to the point of not understanding the goal of CE, but we haven’t found that with URM. We are extremely happy with the service we’ve received – our Cyber Essentials recertifications are always painless and straightforward. The different assessors we’ve had have all been great and pitch to the right level, as well as having an extremely strong knowledge of the subject matter. The account management side is also excellent. Our Account Manager checks in with us on a regular basis, and is very approachable and credible, with a comprehensive understanding of Cyber Essentials.
CISO at University of Surrey
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.