24 Documents Available

SOC 2 Compliance Documents

Complete documentation package for SOC 2 Type I and Type II audits. Policies mapped to Trust Service Criteria, control matrices, evidence guides, and audit preparation templates.

Included with any security package

What is SOC 2?

SOC 2 (Service Organization Control 2) is an auditing framework developed by the AICPA that evaluates how organizations manage customer data based on five Trust Service Criteria.

SOC 2 compliance is increasingly expected by enterprise customers, especially in B2B SaaS. It demonstrates that your organization has implemented controls to protect data security, availability, and privacy.

Who needs SOC 2?

  • SaaS companies selling to enterprises
  • Cloud service providers
  • Data processors and hosting providers
  • Any company responding to security questionnaires

Trust Service Criteria (TSC)

S

Security (Required)

Protection against unauthorized access

A

Availability

System uptime and reliability

PI

Processing Integrity

Accurate, complete data processing

C

Confidentiality

Protection of confidential information

P

Privacy

Personal information handling

SOC 2 Document Library

All documents mapped to Trust Service Criteria requirements.

Core Security Policies (21 Documents)

Information Security Policy

TSC: CC1.1, CC1.2

Master policy establishing security governance framework

Acceptable Use Policy

TSC: CC1.4, CC6.2

Defines proper use of company IT resources

Access Control Policy

TSC: CC6.1, CC6.2, CC6.3

RBAC, authentication, authorization requirements

Password/Authentication Policy

TSC: CC6.1

MFA, password standards, credential management

Data Classification Policy

TSC: CC6.1, C1.1

Public/Internal/Confidential/Restricted tiers

Encryption Policy

TSC: CC6.1, CC6.7

Data at rest and in transit encryption standards

Change Management Policy

TSC: CC8.1

Controlled changes to systems and code

Incident Response Policy

TSC: CC7.3, CC7.4, CC7.5

Detection, response, and recovery procedures

Business Continuity Policy

TSC: A1.2

Maintaining operations during disruptions

Disaster Recovery Policy

TSC: A1.2, A1.3

IT system recovery procedures

Vendor Management Policy

TSC: CC9.2

Third-party risk management

Asset Management Policy

TSC: CC6.1

Hardware/software inventory and lifecycle

Network Security Policy

TSC: CC6.6

Firewalls, segmentation, monitoring

Physical Security Policy

TSC: CC6.4

Facility access and protection

Remote Work Policy

TSC: CC6.1, CC6.7

Secure remote access requirements

BYOD Policy

TSC: CC6.1, CC6.7

Personal device security requirements

Mobile Device Policy

TSC: CC6.1

Mobile security and MDM

Data Retention & Disposal Policy

TSC: C1.2, P4.3

Data lifecycle management

Backup Policy

TSC: A1.2

Backup frequency and testing

Logging & Monitoring Policy

TSC: CC7.1, CC7.2

Audit logging and alerting

Risk Management Policy

TSC: CC3.1, CC3.2

Risk assessment methodology

SOC 2 Audit Preparation Documents (6 Documents)

SOC 2 Control Matrix

All TSC Categories

Maps your controls to each Trust Service Criteria requirement. Shows coverage and gaps.

Evidence Collection Guide

All TSC Categories

Detailed list of evidence needed for each control. Screenshots, logs, configs.

Readiness Assessment Checklist

Pre-Audit

Self-assessment checklist before engaging auditor. Identify gaps early.

Management Assertion Template

Audit Requirement

Board/management attestation letter template for auditor.

System Description Template

Type II Requirement

Template for describing your system, boundaries, and infrastructure.

Vendor Security Questionnaire Response

Customer Requests

Pre-filled responses for common security questionnaire questions.

Operational Documents (Supporting SOC 2)

Incident Response Plan

CC7.3, CC7.4, CC7.5

Step-by-step incident handling procedures

Business Continuity Plan

A1.2

Operational continuity during disruptions

Disaster Recovery Plan

A1.2, A1.3

IT system recovery procedures

Vendor Risk Assessment Template

CC9.2

Questionnaire for evaluating vendor security

Employee Onboarding Checklist

CC1.4

Security onboarding for new hires

Employee Offboarding Checklist

CC6.2

Access revocation and secure separation

Typical SOC 2 Timeline

How these documents fit into your SOC 2 journey.

1

Foundation (Month 1-2)

Implement core security policies, establish governance framework. → Use our 21 policy templates

2

Gap Assessment (Month 2-3)

Use readiness checklist to identify control gaps. → Use our Control Matrix & Readiness Assessment

3

Remediation (Month 3-4)

Address gaps, implement missing controls, collect evidence. → Use our Evidence Collection Guide

4

Type I Audit (Month 5)

Point-in-time audit of control design. → Use our Management Assertion & System Description

5

Type II Observation Period (Months 6-12)

3-12 month period where controls are tested for operating effectiveness.

Get Access to All SOC 2 Documents

All 24 SOC 2 documents included with any security package.

Full Document Library Access

Included with Any Security Package

Get all 24 SOC 2 documents plus 80+ other compliance templates when you purchase any of our security packages. Starting at $1,997.

All documents are templates for informational purposes. Review with your auditor and legal team.

Ready to start your SOC 2 journey?

Get the complete document package and cut months off your timeline.