Table of Contents

Reach SOC 2 Compliance in 6 Weeks or Less.

  / ,

  / What is SOC 2- A Complete Guide

What is SOC 2- A Complete Guide

If your company sells software, handles customer data, or operates in the cloud, chances are you have already been asked for a SOC 2 report. Sometimes by a prospect, sometimes by a procurement team, sometimes by a very persistent security questionnaire that refuses to go away.

And if you are early in your compliance journey, that request can feel confusing, intimidating, or even slightly unfair.

What exactly is a SOC 2 report? What does it include? How does the process actually work? And do you really need one right now?

This article answers those questions clearly, without legal jargon or unnecessary complexity. Whether you are a startup selling internationally or a SaaS company expanding into enterprise deals, this guide will give you the full picture on SOC 2 compliance.

Reach SOC 2 Compliance in 6 Weeks or Less

Schedule Your Free SOC 2 Assessment Today

What does SOC 2 stand for?

SOC 2 stands for System and Organization Controls 2. It is part of a broader family of SOC reports created to help organisations demonstrate how they manage and protect information.

In a nutshell, its a voluntary framework that proves that a company stores and manages data in a safe way.

The “2” matters because it distinguishes this report from others in the SOC framework:

 

Report TypePrimary FocusTypical Audience
SOC 1
Controls relevant to financial reporting
Auditors, finance teams, regulators
SOC 2
Controls related to security, availability, processing integrity, confidentiality, and privacy
Customers, partners, procurement teams
SOC 3
High-level public summary of SOC 2 controls
General public, marketing, prospects

When customers ask for “SOC 2,” they are seeking evidence that your internal systems and processes are designed to protect their data consistently and measurably. And this can be evaluated through a SOC 2 report.

SOC 2 vs SOC 1 vs SOC 3: what’s the difference?

SOC reports serve different purposes, and choosing the wrong one can create unnecessary work.

SOC 1 focuses exclusively on controls related to financial reporting. It is primarily relevant for service providers whose systems impact a customer’s financial statements, such as payroll processors or financial platforms.

SOC 2 evaluates controls related to security, availability, processing integrity, confidentiality, and privacy. It is the most commonly requested report for SaaS companies, cloud providers, and B2B service organisations because it directly addresses data protection and operational risk.

SOC 3 is a high-level, public summary of a SOC 2 report. It contains far less detail and is typically used for marketing or high-level assurance, not for procurement or vendor risk assessments.

If customers, partners, or regulators need detailed evidence of how you protect data, SOC 2 is almost always the correct choice.

Benefits of SOC 2 Compliance- Why do Companies Pursue Compliance?

Companies invest in SOC 2 compliance for the commercial and operational advantages it delivers.

But besides that, being able to produce a SOC 2 report will allow to cast a wider net and work with customers that you would otherwise not be able to work with. Some examples:

  • Cloud service providers, SaaS companies, and Data Centers looking to win big enterprise contracts: These businesses are often required to do Vendor Risk Assessment due to regulations such as GDPR, HIPAA, PCI DSS, SOX, and NYDFS.
  • Companies in tightly regulated industries: Finance, healthcare, and technology are typically regulated by norms that required SOC 2 reports and Vendor Risk Assessment.
  • Companies bidding for government contracts: While not always required, some government bodies will ask for an SOC 2 report or ISO 27001 certification to accept bids. 

SOC 2 reports are becoming widespread since they cascade down: Most SOC 2 compliant businesses will require vendors to produce a SOC 2 report, and not having an SOC 2 report will often make you lose a compliant client.

Besides that, the most immediate benefit is trust. A SOC 2 report reduces friction during sales cycles by answering security questions upfront, rather than repeatedly through bespoke questionnaires. So even when its not strictly required, having a SOC 2 report will be beneficial.

It also improves internal discipline. Preparing for SOC 2 forces teams to formalise access controls, incident response, change management, and monitoring processes that often exist informally.

Finally, SOC 2 can be a growth enabler. Many enterprise buyers will not progress without it. Having a current report keeps deals moving and prevents compliance from becoming a last-minute blocker.

A 2023 procurement study published by Wired noted that vendor security reviews are now standard even for contracts under six figures, reflecting how deeply embedded assurance expectations have become.

Who typically needs SOC 2 compliance?

SOC 2 is most often pursued by organisations that handle customer data on behalf of others, especially where trust and security influence buying decisions.

This commonly includes:

  • SaaS and cloud-based software companies

  • Managed service providers, IT, and security firms

  • Data platforms, infrastructure providers, and APIs

  • Companies selling into regulated or enterprise markets

Beyond industry, SOC 2 is often triggered by stage and scale. Startups moving upmarket, companies entering enterprise sales cycles, or vendors undergoing formal vendor risk assessments are frequently asked for a SOC 2 report before deals can progress.

Even when not explicitly required, SOC 2 often becomes a commercial necessity. Customers increasingly expect structured, independent assurance that security controls are not improvised, but designed, documented, and consistently followed.

 

What is a SOC 2 report?

A SOC 2 report is an independent assurance report that evaluates how well an organisation protects customer data. It is issued by a licensed CPA firm and is based on the Trust Services Criteria (TSC) developed by the American Institute of Certified Public Accountants (AICPA).

In simple terms, a SOC 2 report answers one core question:

Can this company be trusted to handle sensitive information securely and responsibly?

Unlike ISO standards, SOC 2 is not a “certification” in the traditional sense. There is no pass or fail badge. Instead, the report documents:

  • Your control environment
  • How controls are designed
  • How they operate over time
  • Any exceptions or gaps identified by the auditor

The result is a detailed report that customers and partners use to assess your security posture.

You can read the official AICPA definition here

SOC 2 Type 1 vs. SOC 2 Type 2 reports

The difference between Type I and Type II is about timing and evidence.

A SOC 2 Type I report evaluates whether controls are suitably designed at a specific point in time. It answers the question: Do these controls exist, and are they designed appropriately today?

A SOC 2 Type II report goes further. It assesses whether those controls operated effectively over a defined period, typically three to twelve months. This shows consistency, not just intent.

Many companies start with Type I to establish a baseline and move to Type II once controls are stable. Customers, especially in enterprise or regulated environments, often prefer Type II because it reflects real operational history rather than a snapshot.

Should I pursue a SOC 2 Type 1 report, Type 2, or both?

If you’re a company pursuing SOC 2 due to vendor requirements, your clients will typically specify which report type they need. Large enterprise and government bodies will usually ask for type 2, whilst smaller companies are typically fine with type 1 reports.

At Axipro, we rarely treat this as an either-or decision. Our standard approach is to implement controls correctly from day one, deliver SOC 2 Type 1 fast, and structure everything so Type 2 is a smooth continuation, not a restart.

Producing both Type 1 and the Type 2 reports will increase your potential customer base, and signals a more serious commitment to data protection and treatment.

What does a SOC 2 type 1 report include?

A SOC 2 type 1 report is far more than a single-page letter or summary. Most reports range from 20 to 50+ pages, depending on scope and complexity.

At a high level, the SOC 2 type 1 report includes the following core sections:

Management’s assertion
This is a formal statement from your leadership confirming responsibility for the design and operation of controls. It sets the tone. Auditors expect this to be accurate and defensible.

System description
This section explains how your product or service works, what data flows through it, and which systems, people, and processes are in scope. It is written in business language but scrutinised carefully by auditors and customers alike.

Trust Services Criteria in scope
SOC 2 is built around five criteria:

  • Security
  • Availability
  • Confidentiality
  • Processing Integrity
  • Privacy

Security is mandatory. The others are optional, selected based on your business model and customer expectations. Most SaaS companies start with Security only, then expand.

The official criteria are published by AICPA and publicly available here

Control descriptions and testing results
This is the heart of the report. Each control is described, mapped to criteria, and tested. Auditors explain what evidence they reviewed and whether the control operated effectively.

Exceptions and auditor opinion
If something did not work as intended, it appears here. Not all exceptions are deal-breakers, but patterns or serious failures raise red flags during customer reviews.

SOC Type 1 Report Example Structure

Independent Service Auditor’s Report

  • Independent Service Auditor’s Report
  • Scope
  • Service Organization’s Responsibilities
  • Service Auditor’s Responsibilities
  • Inherent Limitations
  • Other Matter (if applicable)
  • Opinion
  • Restricted Use

Management’s Assertion

  • Management’s Assertion
  • Description Criteria

Description of the System

Overview of Operations

  • Company Background
  • Description of Services Provided

Principal Service Commitments and System Requirements

Components of the System

  • Infrastructure
  • Software
  • People
  • Procedures / Processes
  • Data

Boundaries of the System

Subservice Organizations

Complementary User Entity Controls

Control Environment and Governance

  • Control Environmen
  • Risk Assessment Process
  • Information and Communication
  • Monitoring Activities

Changes to the System (if applicable)

Incidents (if applicable)

Criteria Not Applicable to the System (if applicable)

Trust Services Criteria

  • Trust Services Categories in Scope
  • Trust Services Criteria for Security
  • Additional Trust Services Criteria (Availability, Confidentiality, Processing Integrity, Privacy — if applicable)

Control Activities

  • Control Activities Specified by the Service Organization

Information Provided by the Service Auditor

  • Guidance Regarding the Information Provided by the Service Auditor

What does a SOC 2 type 2 report include?

 

A SOC 2 Type 2 report demonstrates that a company’s controls are not only properly designed, but also operated effectively over a defined period of time (typically 3–12 months).

In practical terms, the goal is to provide evidence of sustained, real-world compliance, not just intent.
Where a Type 1 answers “Are the controls designed correctly as of a point in time?”, a Type 2 answers:

“Did those controls actually work, consistently, in day-to-day operations?”

It typically includes a lot of the same sections as the type 1 report, with a focus on how they changed through time.

 

SOC Type 2 Report Example Structure

Independent Service Auditor’s Report

  • Independent Service Auditor’s Report
  • Scope
  • Service Organization’s Responsibilities
  • Service Auditor’s Responsibilities
  • Independence and Ethical Responsibilities
  • Inherent Limitations
  • Opinion
  • Restricted Use

Management’s Assertion

  • Management’s Assertion

Description of the System

Overview of Operations

  • Company Background
  • Description of Services Provided

Principal Service Commitments and System Requirements

Components of the System

  • Infrastructure
  • Software
  • People
  • Procedures / Processes
  • Data

Boundaries of the System

Subservice Organizations

Complementary User Entity Controls

Complementary Subservice Organization Controls

Control Environment and Governance

  • Integrity and Ethical Values
  • Commitment to Competence
  • Organizational Structure and Assignment of Authority
  • Risk Assessment Process
  • Information and Communication
  • Monitoring Activities

Changes to the System During the Period

Incidents During the Period

Criteria Not Applicable to the System

Trust Services Criteria

  • Trust Services Categories in Scope
  • Trust Services Criteria for Security
  • Additional Trust Services Criteria (Availability, Confidentiality, Processing Integrity, Privacy — if applicable)

Tests of Controls

  • Testing Methodology
  • Scope of Testing
  • Tests of Operating Effectiveness
  • Results of Tests
  • Controls Not Tested (if applicable)

Other Information Provided by the Service Organization (if applicable)

What a SOC 2 report does not do

A SOC 2 report does not guarantee that a company will never be breached. It does not replace penetration testing. It does not automatically satisfy GDPR, HIPAA, or other regulatory obligations.

What it does provide is independent, structured confidence. It shows that security is not improvised or ignored, but designed, monitored, and reviewed. It also shows that you are ready to do business with other ISO 27001 and SOC 2 compliant companies. 

The SOC 2 compliance lifecycle (from readiness to maintenance)

SOC 2 compliance is not a single event. It follows a clear lifecycle, from early preparation through ongoing operation.

Most companies start by defining scope: which systems, services, and Trust Services Criteria are actually relevant to their business. From there, they assess current controls, identify gaps, and implement the policies, processes, and technical safeguards required to meet the in-scope criteria.

Once controls are in place, a readiness assessment helps confirm whether the organisation is audit-ready before engaging an auditor. The formal audit then evaluates control design (Type I) and, where applicable, control effectiveness over time (Type II).

After the report is issued, the work does not stop. Controls must be operated, monitored, and maintained continuously to remain defensible in future audits and customer reviews. Treating SOC 2 as an ongoing operational process, rather than a one-off project, is what separates clean reports from painful remediation cycles.

What is an SOC 2 audit?

A SOC 2 audit is the formal examination conducted by an independent auditor to evaluate your controls against the Trust Services Criteria in scope.

The process involves evidence collection, walkthroughs, and testing. Auditors review policies, system configurations, logs, tickets, and operational records. They also speak directly with team members to confirm that documented processes reflect reality.
For Type II reports, this testing occurs across the entire audit period, not just at the end.

The audit is not about perfection. It is about demonstrating that controls exist, are understood, and are followed consistently.

How long does it take to get SOC 2 compliant?

The timeline depends less on company size and more on readiness.

For organisations starting from scratch, initial preparation often takes several weeks to a few months. This includes defining scope, implementing missing controls, and training teams.
A Type I report can typically be completed relatively quickly once controls are in place. At Axipro, we aim to complete the readiness assessment and Type 1 report within 6 weeks

A Type II report requires an operating period, commonly three to six months, before the audit can conclude.

Common mistakes companies make

Many SOC 2 efforts fail or stall for avoidable reasons.

Some start the audit window before controls are ready. Others rely entirely on automation tools without understanding what auditors actually test. Some underestimate the operational effort required from engineering, IT, HR, and leadership.

Perhaps the most expensive mistake is treating SOC 2 as a checkbox exercise rather than a business process. Customers can tell the difference when they read your report.

Ready to move forward?

If you are considering SOC 2, or already under pressure from customers, the best next step is clarity.

A short readiness assessment can tell you:

  • Whether you are closer to Type I or Type II
  • How long your audit window should be
  • What gaps could delay your report

Book a SOC 2 readiness call or request a tailored audit plan to understand your fastest, lowest-risk path to a clean report. 

Reach SOC 2 Compliance in 6 Weeks or Less

Schedule Your Free SOC 2 Assessment Today

Frequently Asked Questions

Is a SOC 2 report a certification?

No. SOC 2 is not a certification and there is no official “SOC 2 certified” status. Instead, the report documents an auditor’s opinion on whether controls are suitably designed and, for Type II reports, whether they operate effectively over time.

Who issues a SOC 2 report?

SOC 2 reports can only be issued by licensed CPA firms authorised to perform SOC examinations. Automation platforms and consultancies cannot issue the report themselves.

What Trust Services Criteria are included in a SOC 2 report?

SOC 2 reports are based on five criteria:

  • Security (mandatory) 
  • Availability 
  • Confidentiality 
  • Processing Integrity 
  • Privacy 

Most organisations include Security only at first and expand scope as customer or regulatory expectations increase.

How long is a SOC 2 report valid?

SOC 2 reports do not technically “expire,” but customers generally expect a report that is no more than 12 months old. Older reports may be rejected during vendor risk reviews.

Does a SOC 2 report guarantee security?

No. A SOC 2 report does not guarantee that an organisation will never experience a breach. It demonstrates that controls were designed and operated in accordance with defined criteria during the audit period.

Is a SOC 2 Report Sufficient for Vendor Risk Management?

A SOC 2 report is a strong starting point, but it is not sufficient on its own. It provides independent assurance that defined controls operated effectively for specific systems, helping establish baseline trust.

However, SOC 2 does not cover financial, legal, or business-specific risks, nor does it assess areas outside the report’s scope. Most organizations use SOC 2 as one input, alongside questionnaires and risk-based reviews, to determine whether a vendor truly meets their requirements.

Are exceptions allowed in a SOC 2 report?

Yes. A SOC 2 report can contain exceptions. Minor exceptions are common and not always disqualifying, but frequent or severe exceptions can raise concerns during customer reviews.

Can customers see our SOC 2 report?

SOC 2 reports are considered restricted-use documents. They are typically shared under NDA with customers, prospects, or partners as part of due diligence.

Does a SOC 2 report cover GDPR or privacy laws?

SOC 2 does not replace GDPR or other privacy regulations. However, if the Privacy criterion is included, parts of the report may support broader compliance conversations.

How long does it take to receive a SOC 2 report?

After the audit window closes, audit fieldwork and report issuance typically take 2–4 weeks, depending on readiness, responsiveness, and report complexity.

Why do customers ask for SOC 2 reports?

Customers use SOC 2 reports to assess vendor risk, reduce internal security reviews, and gain confidence that data is handled responsibly and consistently.

Axipro Author

Picture of Pedro Dias

Pedro Dias

Pedro has been writing online for over 10 years. With experience in all things programming, cyber security, and compliance, he is our editor-in-chief at Axipro.

Blog Highlights

Explore More Articles

Defense contractors handling Controlled Unclassified Information now face a choice that shapes their entire compliance budget: lock down the whole organization, or draw a tight boundary around CUI and protect only that. The second path is kown as the CMMC enclave. For many companies in the Defense Industrial Base, it is the faster, more affordable, and more operationally sensible route to certification, but only if it is scoped and implemented correctly. This article explains what a CMMC enclave is, how it differs from enterprise-wide compliance, and what it takes to build one that will actually hold up under assessment. What Is a CMMC Enclave? A CMMC enclave is a logically or physically isolated segment of your IT environment where all CUI is processed, stored, and transmitted. Everything inside the enclave boundary is in scope for a CMMC assessment. Everything outside is not. Think of your company as a building. The enclave is a locked, monitored room inside it. Only specific people are authorized to enter, all activity within the room is logged, and the security controls governing the room are documented and continuously enforced. The rest of the building operates normally, unaffected by the rigorous controls applied inside. The concept is explicitly supported by DoD guidance. The CMMC Level 2 Scoping Guide states that organizations “may limit the scope of the security requirements by isolating the designated system components in a separate CUI security domain.” That isolation can be achieved through physical separation, logical separation, or a combination of both. How a CMMC Enclave Differs from Enterprise-Wide Compliance Enterprise-wide compliance means applying all 110 NIST SP 800-171 controls across your entire organization: every endpoint, every user account, every application that touches any part of your network. That is the default interpretation many contractors start with, and it is expensive. A larger scope means more assets to harden, more users to train, more systems to document, and a bigger, more complex assessment. An enclave approach inverts the logic. Instead of bringing the whole organization up to CMMC Level 2 standards, you identify the minimum set of systems and users that genuinely need to touch CUI — and you apply full controls to only that subset. The result is a smaller, focused compliance footprint. The financial difference is real. Published case studies show that well-scoped enclaves reduce CMMC implementation costs by 20 to 45 percent compared to enterprise-wide approaches. A 40-person manufacturer, for example, reduced its projected CMMC implementation cost from $140,000 to $78,000 by migrating CUI into a cloud-based enclave. The savings compound: fewer assets to secure, fewer people to train, a smaller assessment scope, and lower ongoing maintenance costs year after year. Physical Separation vs. Logical Separation in a CMMC Enclave The DoD’s own scoping guidance is clear that security domains may use physical separation, logical separation, or a combination of both. Understanding the difference matters because your choice affects architecture, cost, and how an assessor will evaluate your boundary. Physical separation means CUI assets live on dedicated hardware, in a separate room or cage, disconnected from general-purpose networks at the cable level. It is the most defensible form of separation, but it also carries higher hardware costs and operational overhead. For some regulated environments — particularly those subject to Level 3 requirements or handling the most sensitive categories of CUI — physical separation may be necessary. Logical separation uses network segmentation, firewall rules, VLANs, and access controls to isolate CUI assets within a shared physical infrastructure. It is cheaper, faster to implement, and the more common approach for CMMC Level 2 enclaves — but it requires architectural rigor. A VLAN boundary that is not technically enforced, or a firewall rule that permits general IT traffic to reach CUI systems, will not hold up during assessment. A critical point the DoD has reinforced in its updated FAQ guidance: logical separation must be provable and documented. Saying you have logical separation is not enough. You need enforceable architecture, tested configurations, and the documentation to demonstrate both. Important: A common mistake is treating logical separation as a policy statement rather than an architectural fact. Assessors will test your boundary controls, not just read your System Security Plan. If traffic can flow between your corporate network and your CUI enclave — even indirectly — the enterprise network may be pulled into scope. Why CMMC Scoping Matters Before Choosing an Enclave Approach Scoping is the decision that determines everything downstream: which systems you secure, which employees you train, how much the assessment costs, and how confident you can be that you will pass. Getting it wrong in either direction creates problems. Over-scoping wastes money. If your compliance boundary includes systems that never touch CUI, you are paying to harden infrastructure that does not need it. Under-scoping is worse: if CUI flows through systems outside your declared enclave — shared email servers, unmanaged endpoints, a consumer file-sharing tool someone uses informally — your boundary is invalid and your assessment will fail. NIST SP 800-171 offers a useful framing: organizations “will not want to spend money on cybersecurity beyond what it requires for protecting its missions, operations, and assets.” Scoping is how you align security investment with actual risk. Every asset you can legitimately keep out of scope is a saving. How to Scope a CMMC Enclave Scoping starts with a single question: where does CUI actually go in your environment? The answer is usually more distributed than people expect. CUI flows through email. It lands in shared drives, project management tools, collaboration platforms, and sometimes personal devices. Before you can define an enclave, you need to map all of it. The DoD scoping process works through asset categories: CUI Assets (systems that directly process, store, or transmit CUI), Security Protection Assets (systems that enforce security functions for CUI assets), Contractor Risk Managed Assets, Specialized Assets (IoT, OT, test equipment), and Out-of-Scope Assets. Only Out-of-Scope Assets can be excluded from assessment — and to qualify, they must be provably isolated from CUI flows. The key

A well-built SOC 2 runbook is the difference between a finding and a clean opinion. It converts the abstract language of a control into a sequence of actions someone actually performed, in a verifiable order, with a paper trail attached. Auditors do not fail companies for having incidents. They fail them for not being able to prove how those incidents were handled. This guide shows you how to build a runbook that holds up under scrutiny — covering what a SOC 2 runbook is, what makes it audit-ready, how it differs from a playbook, the components every runbook should include, the control areas where runbooks are expected, and how to keep them current between annual examinations. What Is a SOC 2 Runbook? A SOC 2 runbook is a documented, repeatable procedure that operationalises a specific SOC 2 control. Where a policy states what must happen and why, a runbook states exactly how: the trigger, the steps, the people, the systems touched, the evidence captured, and the sign-off that closes it out. Runbooks live closest to the engineers and operations staff actually doing the work. They are the layer auditors care about most because they are where the control either operates or fails. A well-written runbook turns a control objective into something testable, traceable, and survivable across staff turnover. SOC 2 Runbook vs. SOC 2 Playbook: Key Differences The terms get used interchangeably, but they describe two different artefacts. The cleanest distinction is scope and audience. Dimension Runbook Playbook Scope One specific procedure Multi-step strategy across functions Audience Engineers, on-call responders, operations teams Leadership, legal, communications, incident response coordinators Detail Level Commands, queries, exact tooling Decisions, escalation paths, stakeholder roles Example Isolating an affected EC2 instance using a documented AWS CLI command Coordinating a ransomware response across legal, PR, and law enforcement Length Short, tactical, and scannable Longer, narrative, and decision-oriented A mature SOC 2 programme uses both. The playbook frames the response. The runbook executes pieces of it. Why SOC 2 Auditors Expect Runbooks The AICPA’s Trust Services Criteria describe what auditors test, but at the level of objectives, not procedures. CC7.3 says you must respond to security incidents. It does not tell you how. The runbook is your answer to how. Auditors are looking for two things when they evaluate a control: that it was designed appropriately, and that it operated effectively across the audit period. Runbooks are how you show both. The document itself is the design. The completed runbook artefacts (tickets, logs, sign-offs, post-mortems) are the operating evidence. Which SOC 2 Trust Services Criteria Require Runbook Documentation Every Common Criteria area benefits from runbooks, but the strongest expectation sits in CC6 (logical and physical access), CC7 (system operations, including incident detection and response), CC8 (change management), and CC9 (risk mitigation, vendor management, and BCP/DR). For a deeper look at how these criteria are structured and what auditors are actually testing, the Trust Services Criteria breakdown is worth reading before you start mapping your runbooks. If your scope includes the Availability criteria, A1.2 and A1.3 will require runbooks for failover, restoration, and capacity management. Confidentiality and Privacy add data handling and retention runbooks on top. If you are still determining which criteria apply to your organisation, a structured gap analysis is the most reliable starting point. Why Your Organization Needs a SOC 2 Runbook The common failure pattern is not the absence of policies. It is the absence of a credible bridge between the policy and what people actually do at 2am during an incident. How Runbooks Demonstrate Control Effectiveness to Auditors Auditors sample. For a Type II report covering twelve months, they will pull a population of incidents, changes, access reviews, or vendor onboardings, and trace a sample of them end to end. Without runbooks, that trace usually breaks. Engineers describe what they did from memory, ticket histories are inconsistent, and the auditor has no baseline to test against. With runbooks, the auditor compares the documented steps to what actually happened in the artefacts. If the runbook says approval is required, the ticket should show it. If it says evidence must be retained for ninety days, the log should be there. The runbook turns a subjective conversation into an objective trace. Runbooks as Evidence: Avoiding the Audit Evidence Trap A specific failure mode is what practitioners call the evidence trap: the control exists, the team is doing the right thing, but nothing was captured at the time. Three months later, the SIEM has rotated the logs, the on-call engineer has left, and the only record is a Slack thread no one can find. Runbooks prevent this when they make evidence capture a step in the procedure itself, not an afterthought. A line in the runbook that reads export the relevant CloudTrail entries to the incident folder before remediation is what stands between you and a qualified opinion. Pro Tip: Build evidence capture into the runbook as a numbered step, not a footer note. Auditors test what is written. If “save the screenshot” is step 7, it gets done. If it is buried in a paragraph at the bottom, it usually does not. SOC 2 Type I vs. Type II: How Runbooks Support Each A SOC 2 Type I report assesses the design of controls at a single point in time. For Type I, the runbook itself, together with the policies it references, is most of what auditors need. Type II is a different beast. It tests operating effectiveness over a period (typically six to twelve months), and that is where runbooks earn their keep. Each completed run produces evidence: a ticket, a log entry, a screenshot, a signed approval. Over twelve months those artefacts become the case for control effectiveness. Without runbooks, evidence collection is reactive and full of gaps. With them, it is a byproduct of normal work. For a fuller picture of what to expect across both report types, the SOC 2 compliance checklist is a useful companion to this guide.   Core Components