Does the scope of a SOC 2 audit cover your own service providers and suppliers?

If you work with any third parties to support the delivery of your service that are responsible for your information security controls (either fully or partially), these third parties will be termed a ‘subservice organisation’ in a SOC 2 context and will need to be identified within your SOC 2 report.  The report will also need to identify the SOC 2 criteria and the information security controls they are responsible for, and how it fulfils your requirements for those controls.

Here, the ideal scenario is for your subservice organisations to have their own SOC 2 report, as this can be used as evidence.  However, if the subservice organisation does not have a SOC 2 report but does have an ISO 27001 certification, for example, you can utilise information relating to this certification and the controls they have in place to maintain it.

On our path of growing our business, we have found in URM a very capable and knowledgeable consultancy firm to guide and structure our processes towards SOC 2 compliance. The consultancy by URM played an essential role in building our competences and expanding the compliance framework for our SaaS based propositions.
Scientific data platform
Contact SOC 2 Experts Today

SOC 2 Explained

Published on
27 Mar
2025

URM’s blog answers key questions about SOC 2, including what it is & who it applies to, why it is beneficial, how SOC 2 reports are structured & more.

Read more
"
The whole gap analysis process was very informative for all departments of the business. Our URM consultant was great at explaining the SOC2 audit process and what evidence may be required for each area. As a business, it has really assisted us in our implementation strategy and improving our compliance programme as a whole.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.