Table of Contents

Reach SOC 2 Compliance in 6 Weeks or Less.

  / ,

  / What is SOC 2- A Complete Guide

What is SOC 2- A Complete Guide

If your company sells software, handles customer data, or operates in the cloud, chances are you have already been asked for a SOC 2 report. Sometimes by a prospect, sometimes by a procurement team, sometimes by a very persistent security questionnaire that refuses to go away.

And if you are early in your compliance journey, that request can feel confusing, intimidating, or even slightly unfair.

What exactly is a SOC 2 report? What does it include? How does the process actually work? And do you really need one right now?

This article answers those questions clearly, without legal jargon or unnecessary complexity. Whether you are a startup selling internationally or a SaaS company expanding into enterprise deals, this guide will give you the full picture on SOC 2 compliance.

Reach SOC 2 Compliance in 6 Weeks or Less

Schedule Your Free SOC 2 Assessment Today

What does SOC 2 stand for?

SOC 2 stands for System and Organization Controls 2. It is part of a broader family of SOC reports created to help organisations demonstrate how they manage and protect information.

In a nutshell, its a voluntary framework that proves that a company stores and manages data in a safe way.

The “2” matters because it distinguishes this report from others in the SOC framework:

 

Report TypePrimary FocusTypical Audience
SOC 1
Controls relevant to financial reporting
Auditors, finance teams, regulators
SOC 2
Controls related to security, availability, processing integrity, confidentiality, and privacy
Customers, partners, procurement teams
SOC 3
High-level public summary of SOC 2 controls
General public, marketing, prospects

When customers ask for “SOC 2,” they are seeking evidence that your internal systems and processes are designed to protect their data consistently and measurably. And this can be evaluated through a SOC 2 report.

SOC 2 vs SOC 1 vs SOC 3: what’s the difference?

SOC reports serve different purposes, and choosing the wrong one can create unnecessary work.

SOC 1 focuses exclusively on controls related to financial reporting. It is primarily relevant for service providers whose systems impact a customer’s financial statements, such as payroll processors or financial platforms.

SOC 2 evaluates controls related to security, availability, processing integrity, confidentiality, and privacy. It is the most commonly requested report for SaaS companies, cloud providers, and B2B service organisations because it directly addresses data protection and operational risk.

SOC 3 is a high-level, public summary of a SOC 2 report. It contains far less detail and is typically used for marketing or high-level assurance, not for procurement or vendor risk assessments.

If customers, partners, or regulators need detailed evidence of how you protect data, SOC 2 is almost always the correct choice.

Benefits of SOC 2 Compliance- Why do Companies Pursue Compliance?

Companies invest in SOC 2 compliance for the commercial and operational advantages it delivers.

But besides that, being able to produce a SOC 2 report will allow to cast a wider net and work with customers that you would otherwise not be able to work with. Some examples:

  • Cloud service providers, SaaS companies, and Data Centers looking to win big enterprise contracts: These businesses are often required to do Vendor Risk Assessment due to regulations such as GDPR, HIPAA, PCI DSS, SOX, and NYDFS.
  • Companies in tightly regulated industries: Finance, healthcare, and technology are typically regulated by norms that required SOC 2 reports and Vendor Risk Assessment.
  • Companies bidding for government contracts: While not always required, some government bodies will ask for an SOC 2 report or ISO 27001 certification to accept bids. 

SOC 2 reports are becoming widespread since they cascade down: Most SOC 2 compliant businesses will require vendors to produce a SOC 2 report, and not having an SOC 2 report will often make you lose a compliant client.

Besides that, the most immediate benefit is trust. A SOC 2 report reduces friction during sales cycles by answering security questions upfront, rather than repeatedly through bespoke questionnaires. So even when its not strictly required, having a SOC 2 report will be beneficial.

It also improves internal discipline. Preparing for SOC 2 forces teams to formalise access controls, incident response, change management, and monitoring processes that often exist informally.

Finally, SOC 2 can be a growth enabler. Many enterprise buyers will not progress without it. Having a current report keeps deals moving and prevents compliance from becoming a last-minute blocker.

A 2023 procurement study published by Wired noted that vendor security reviews are now standard even for contracts under six figures, reflecting how deeply embedded assurance expectations have become.

Who typically needs SOC 2 compliance?

SOC 2 is most often pursued by organisations that handle customer data on behalf of others, especially where trust and security influence buying decisions.

This commonly includes:

  • SaaS and cloud-based software companies

  • Managed service providers, IT, and security firms

  • Data platforms, infrastructure providers, and APIs

  • Companies selling into regulated or enterprise markets

Beyond industry, SOC 2 is often triggered by stage and scale. Startups moving upmarket, companies entering enterprise sales cycles, or vendors undergoing formal vendor risk assessments are frequently asked for a SOC 2 report before deals can progress.

Even when not explicitly required, SOC 2 often becomes a commercial necessity. Customers increasingly expect structured, independent assurance that security controls are not improvised, but designed, documented, and consistently followed.

 

What is a SOC 2 report?

A SOC 2 report is an independent assurance report that evaluates how well an organisation protects customer data. It is issued by a licensed CPA firm and is based on the Trust Services Criteria (TSC) developed by the American Institute of Certified Public Accountants (AICPA).

In simple terms, a SOC 2 report answers one core question:

Can this company be trusted to handle sensitive information securely and responsibly?

Unlike ISO standards, SOC 2 is not a “certification” in the traditional sense. There is no pass or fail badge. Instead, the report documents:

  • Your control environment
  • How controls are designed
  • How they operate over time
  • Any exceptions or gaps identified by the auditor

The result is a detailed report that customers and partners use to assess your security posture.

You can read the official AICPA definition here

SOC 2 Type 1 vs. SOC 2 Type 2 reports

The difference between Type I and Type II is about timing and evidence.

A SOC 2 Type I report evaluates whether controls are suitably designed at a specific point in time. It answers the question: Do these controls exist, and are they designed appropriately today?

A SOC 2 Type II report goes further. It assesses whether those controls operated effectively over a defined period, typically three to twelve months. This shows consistency, not just intent.

Many companies start with Type I to establish a baseline and move to Type II once controls are stable. Customers, especially in enterprise or regulated environments, often prefer Type II because it reflects real operational history rather than a snapshot.

Should I pursue a SOC 2 Type 1 report, Type 2, or both?

If you’re a company pursuing SOC 2 due to vendor requirements, your clients will typically specify which report type they need. Large enterprise and government bodies will usually ask for type 2, whilst smaller companies are typically fine with type 1 reports.

At Axipro, we rarely treat this as an either-or decision. Our standard approach is to implement controls correctly from day one, deliver SOC 2 Type 1 fast, and structure everything so Type 2 is a smooth continuation, not a restart.

Producing both Type 1 and the Type 2 reports will increase your potential customer base, and signals a more serious commitment to data protection and treatment.

What does a SOC 2 type 1 report include?

A SOC 2 type 1 report is far more than a single-page letter or summary. Most reports range from 20 to 50+ pages, depending on scope and complexity.

At a high level, the SOC 2 type 1 report includes the following core sections:

Management’s assertion
This is a formal statement from your leadership confirming responsibility for the design and operation of controls. It sets the tone. Auditors expect this to be accurate and defensible.

System description
This section explains how your product or service works, what data flows through it, and which systems, people, and processes are in scope. It is written in business language but scrutinised carefully by auditors and customers alike.

Trust Services Criteria in scope
SOC 2 is built around five criteria:

  • Security
  • Availability
  • Confidentiality
  • Processing Integrity
  • Privacy

Security is mandatory. The others are optional, selected based on your business model and customer expectations. Most SaaS companies start with Security only, then expand.

The official criteria are published by AICPA and publicly available here

Control descriptions and testing results
This is the heart of the report. Each control is described, mapped to criteria, and tested. Auditors explain what evidence they reviewed and whether the control operated effectively.

Exceptions and auditor opinion
If something did not work as intended, it appears here. Not all exceptions are deal-breakers, but patterns or serious failures raise red flags during customer reviews.

SOC Type 1 Report Example Structure

Independent Service Auditor’s Report

  • Independent Service Auditor’s Report
  • Scope
  • Service Organization’s Responsibilities
  • Service Auditor’s Responsibilities
  • Inherent Limitations
  • Other Matter (if applicable)
  • Opinion
  • Restricted Use

Management’s Assertion

  • Management’s Assertion
  • Description Criteria

Description of the System

Overview of Operations

  • Company Background
  • Description of Services Provided

Principal Service Commitments and System Requirements

Components of the System

  • Infrastructure
  • Software
  • People
  • Procedures / Processes
  • Data

Boundaries of the System

Subservice Organizations

Complementary User Entity Controls

Control Environment and Governance

  • Control Environmen
  • Risk Assessment Process
  • Information and Communication
  • Monitoring Activities

Changes to the System (if applicable)

Incidents (if applicable)

Criteria Not Applicable to the System (if applicable)

Trust Services Criteria

  • Trust Services Categories in Scope
  • Trust Services Criteria for Security
  • Additional Trust Services Criteria (Availability, Confidentiality, Processing Integrity, Privacy — if applicable)

Control Activities

  • Control Activities Specified by the Service Organization

Information Provided by the Service Auditor

  • Guidance Regarding the Information Provided by the Service Auditor

What does a SOC 2 type 2 report include?

 

A SOC 2 Type 2 report demonstrates that a company’s controls are not only properly designed, but also operated effectively over a defined period of time (typically 3–12 months).

In practical terms, the goal is to provide evidence of sustained, real-world compliance, not just intent.
Where a Type 1 answers “Are the controls designed correctly as of a point in time?”, a Type 2 answers:

“Did those controls actually work, consistently, in day-to-day operations?”

It typically includes a lot of the same sections as the type 1 report, with a focus on how they changed through time.

 

SOC Type 2 Report Example Structure

Independent Service Auditor’s Report

  • Independent Service Auditor’s Report
  • Scope
  • Service Organization’s Responsibilities
  • Service Auditor’s Responsibilities
  • Independence and Ethical Responsibilities
  • Inherent Limitations
  • Opinion
  • Restricted Use

Management’s Assertion

  • Management’s Assertion

Description of the System

Overview of Operations

  • Company Background
  • Description of Services Provided

Principal Service Commitments and System Requirements

Components of the System

  • Infrastructure
  • Software
  • People
  • Procedures / Processes
  • Data

Boundaries of the System

Subservice Organizations

Complementary User Entity Controls

Complementary Subservice Organization Controls

Control Environment and Governance

  • Integrity and Ethical Values
  • Commitment to Competence
  • Organizational Structure and Assignment of Authority
  • Risk Assessment Process
  • Information and Communication
  • Monitoring Activities

Changes to the System During the Period

Incidents During the Period

Criteria Not Applicable to the System

Trust Services Criteria

  • Trust Services Categories in Scope
  • Trust Services Criteria for Security
  • Additional Trust Services Criteria (Availability, Confidentiality, Processing Integrity, Privacy — if applicable)

Tests of Controls

  • Testing Methodology
  • Scope of Testing
  • Tests of Operating Effectiveness
  • Results of Tests
  • Controls Not Tested (if applicable)

Other Information Provided by the Service Organization (if applicable)

What a SOC 2 report does not do

A SOC 2 report does not guarantee that a company will never be breached. It does not replace penetration testing. It does not automatically satisfy GDPR, HIPAA, or other regulatory obligations.

What it does provide is independent, structured confidence. It shows that security is not improvised or ignored, but designed, monitored, and reviewed. It also shows that you are ready to do business with other ISO 27001 and SOC 2 compliant companies. 

The SOC 2 compliance lifecycle (from readiness to maintenance)

SOC 2 compliance is not a single event. It follows a clear lifecycle, from early preparation through ongoing operation.

Most companies start by defining scope: which systems, services, and Trust Services Criteria are actually relevant to their business. From there, they assess current controls, identify gaps, and implement the policies, processes, and technical safeguards required to meet the in-scope criteria.

Once controls are in place, a readiness assessment helps confirm whether the organisation is audit-ready before engaging an auditor. The formal audit then evaluates control design (Type I) and, where applicable, control effectiveness over time (Type II).

After the report is issued, the work does not stop. Controls must be operated, monitored, and maintained continuously to remain defensible in future audits and customer reviews. Treating SOC 2 as an ongoing operational process, rather than a one-off project, is what separates clean reports from painful remediation cycles.

What is an SOC 2 audit?

A SOC 2 audit is the formal examination conducted by an independent auditor to evaluate your controls against the Trust Services Criteria in scope.

The process involves evidence collection, walkthroughs, and testing. Auditors review policies, system configurations, logs, tickets, and operational records. They also speak directly with team members to confirm that documented processes reflect reality.
For Type II reports, this testing occurs across the entire audit period, not just at the end.

The audit is not about perfection. It is about demonstrating that controls exist, are understood, and are followed consistently.

How long does it take to get SOC 2 compliant?

The timeline depends less on company size and more on readiness.

For organisations starting from scratch, initial preparation often takes several weeks to a few months. This includes defining scope, implementing missing controls, and training teams.
A Type I report can typically be completed relatively quickly once controls are in place. At Axipro, we aim to complete the readiness assessment and Type 1 report within 6 weeks

A Type II report requires an operating period, commonly three to six months, before the audit can conclude.

Common mistakes companies make

Many SOC 2 efforts fail or stall for avoidable reasons.

Some start the audit window before controls are ready. Others rely entirely on automation tools without understanding what auditors actually test. Some underestimate the operational effort required from engineering, IT, HR, and leadership.

Perhaps the most expensive mistake is treating SOC 2 as a checkbox exercise rather than a business process. Customers can tell the difference when they read your report.

Ready to move forward?

If you are considering SOC 2, or already under pressure from customers, the best next step is clarity.

A short readiness assessment can tell you:

  • Whether you are closer to Type I or Type II
  • How long your audit window should be
  • What gaps could delay your report

Book a SOC 2 readiness call or request a tailored audit plan to understand your fastest, lowest-risk path to a clean report. 

Reach SOC 2 Compliance in 6 Weeks or Less

Schedule Your Free SOC 2 Assessment Today

Frequently Asked Questions

Is a SOC 2 report a certification?

No. SOC 2 is not a certification and there is no official “SOC 2 certified” status. Instead, the report documents an auditor’s opinion on whether controls are suitably designed and, for Type II reports, whether they operate effectively over time.

Who issues a SOC 2 report?

SOC 2 reports can only be issued by licensed CPA firms authorised to perform SOC examinations. Automation platforms and consultancies cannot issue the report themselves.

What Trust Services Criteria are included in a SOC 2 report?

SOC 2 reports are based on five criteria:

  • Security (mandatory) 
  • Availability 
  • Confidentiality 
  • Processing Integrity 
  • Privacy 

Most organisations include Security only at first and expand scope as customer or regulatory expectations increase.

How long is a SOC 2 report valid?

SOC 2 reports do not technically “expire,” but customers generally expect a report that is no more than 12 months old. Older reports may be rejected during vendor risk reviews.

Does a SOC 2 report guarantee security?

No. A SOC 2 report does not guarantee that an organisation will never experience a breach. It demonstrates that controls were designed and operated in accordance with defined criteria during the audit period.

Is a SOC 2 Report Sufficient for Vendor Risk Management?

A SOC 2 report is a strong starting point, but it is not sufficient on its own. It provides independent assurance that defined controls operated effectively for specific systems, helping establish baseline trust.

However, SOC 2 does not cover financial, legal, or business-specific risks, nor does it assess areas outside the report’s scope. Most organizations use SOC 2 as one input, alongside questionnaires and risk-based reviews, to determine whether a vendor truly meets their requirements.

Are exceptions allowed in a SOC 2 report?

Yes. A SOC 2 report can contain exceptions. Minor exceptions are common and not always disqualifying, but frequent or severe exceptions can raise concerns during customer reviews.

Can customers see our SOC 2 report?

SOC 2 reports are considered restricted-use documents. They are typically shared under NDA with customers, prospects, or partners as part of due diligence.

Does a SOC 2 report cover GDPR or privacy laws?

SOC 2 does not replace GDPR or other privacy regulations. However, if the Privacy criterion is included, parts of the report may support broader compliance conversations.

How long does it take to receive a SOC 2 report?

After the audit window closes, audit fieldwork and report issuance typically take 2–4 weeks, depending on readiness, responsiveness, and report complexity.

Why do customers ask for SOC 2 reports?

Customers use SOC 2 reports to assess vendor risk, reduce internal security reviews, and gain confidence that data is handled responsibly and consistently.

Axipro Author

Picture of Pedro Dias

Pedro Dias

Pedro has been writing online for over 10 years. With experience in all things programming, cyber security, and compliance, he is our editor-in-chief at Axipro.

Blog Highlights

Explore More Articles

The CMMC program turned from advisory framework to binding contract requirement on November 10, 2025, when the DoD’s Title 48 acquisition rule took effect.  That single date changed the market for CMMC advisory services overnight, and the Cyber AB Registered Practitioner credential moved from a useful business card to a genuine signal of competence.  Over 80,000 companies in the Defense Industrial Base now need help interpreting the rule, and the RP is the formal entry-level role in the ecosystem authorized to provide it. This guide explains what a CMMC Registered Practitioner is, how the role fits alongside CCPs, CCAs, RPOs, and C3PAOs, what it takes to earn the designation, and how Organizations Seeking Certification (OSCs) should think about engaging one. What Is a CMMC Registered Practitioner (RP)? A CMMC Registered Practitioner is an individual authorized by the Cyber AB, the official accreditation body for the CMMC ecosystem, to provide non-certified advisory and consulting services to Organizations Seeking Certification.  RPs help defense contractors interpret the CMMC model, scope their environments, build documentation, remediate gaps against NIST SP 800-171, and prepare for the formal assessment they will eventually undergo. The credential exists because the CMMC framework is genuinely dense. CMMC Level 2 maps to all 110 controls in NIST SP 800-171, and Level 3 layers on 24 selected requirements from NIST SP 800-172. Most contractors do not have the in-house expertise to implement these controls cleanly, and the Cyber AB needed a way to identify advisors who had at least demonstrated baseline knowledge of the program. An RP does not perform official assessments. That work is reserved for Certified CMMC Assessors (CCAs) operating under a C3PAO. The RP role is strictly advisory, and the Code of Professional Conduct that every RP must sign makes the boundary explicit. How RPs Fit Into the Broader CMMC Ecosystem The Cyber AB structures the ecosystem into two distinct lanes: consulting and implementation on one side, assessment and certification on the other. RPs sit on the consulting side. CCPs, CCAs, and C3PAOs sit on the assessment side. The two are kept deliberately separate so that no firm can audit work it helped configure, a separation that preserves the integrity of the certification process. Registered Practitioners vs. Certified CMMC Professionals (CCPs) The CCP is a more rigorous credential. CCP candidates must complete formal Cyber AB training delivered by a Licensed Training Provider, pass a commercial background check, and sit a proctored exam administered by CAICO. CCPs can participate in actual assessments as part of a C3PAO assessment team, though they cannot lead them. RPs cannot participate in assessments at all. In practical terms, the RP credential is the right starting point for consultants, MSPs, and internal compliance staff who want to demonstrate baseline CMMC fluency. The CCP is the right credential for professionals planning a career in CMMC assessment work. Registered Practitioners vs. C3PAOs A C3PAO (Certified Third-Party Assessment Organization) is the entity authorized to conduct official Level 2 certification assessments and issue formal CMMC status determinations. Fewer than 100 firms held C3PAO authorization as of early 2026, serving an ecosystem of more than 80,000 contractors. C3PAOs are companies. RPs are individuals. They do completely different jobs: the RP prepares the contractor, the C3PAO certifies them. Important: A C3PAO that helps a client implement controls is barred from later assessing that same client. This is a hard line in the Code of Professional Conduct. If you engage a firm for both readiness and certification work, you will end up paying two different organizations regardless, so plan accordingly from the start. What Does a CMMC Registered Practitioner Do? The work of an RP is the work of getting an organization to the starting line of a formal assessment without surprises. That includes interpreting which CMMC level applies to a given contract, scoping the CUI and FCI environments, identifying gaps against NIST SP 800-171, drafting the System Security Plan (SSP) and Plan of Action and Milestones (POA&M), advising on technical remediation, and coaching the OSC through mock assessments before the real one. Who Can a CMMC RP Help? RPs serve any organization in the Defense Industrial Base that needs to achieve a CMMC status. That includes prime contractors, subcontractors at any tier, MSPs, and MSSPs that handle CUI on behalf of defense clients, manufacturers, research universities, and civilian agency contractors whose departments have adopted CMMC-aligned clauses. The flow-down requirements in 32 CFR §170.23 mean that even small subcontractors who process Federal Contract Information (FCI) must hit Level 1, which keeps RP work relevant well past the first wave of large primes. What Services Does a CMMC RP Provide? The core service menu looks consistent across the market: gap assessments against NIST SP 800-171, scope definition, SSP and POA&M drafting, policy and procedure development, technical advisory on encryption, access control and incident response, and pre-assessment readiness reviews. Strong RPs also help clients interpret recent guidance changes, manage their SPRS score, and prepare evidence packages that will survive scrutiny from a C3PAO assessment team. Pro Tip: Evaluating a Registered Practitioner When evaluating an RP, ask whether they have walked a client through a full C3PAO assessment cycle, not just a gap assessment. There is a significant difference between consultants who write SSPs and consultants who have watched assessors actually challenge one. How to Become a CMMC Registered Practitioner The path is straightforward but not trivial. The Cyber AB controls the registration process end-to-end, and every step must be completed in order. Step 1: Complete the Required CMMC Registered Practitioner Training The RP training is delivered online through the Cyber AB’s learning management system. It covers the CMMC model document, the structure of the ecosystem, scoping methodology, FCI and CUI definitions, prime and subcontractor information flow, the assessment process, and the relationship between CMMC and existing DFARS clauses. The course typically takes around eight hours. Candidates should plan for roughly $500 to $600 in combined training and annual registration costs. Step 2: Register with the Cyber AB After training, candidates submit a

A single VS Code extension installed by a single GitHub employee has cost the world’s largest code host roughly 3,800 of its internal repositories. GitHub confirmed the breach in a five-post thread on X on May 20, 2026, attributing the compromise to a poisoned extension that ran on the employee’s machine and gave attackers a foothold inside Microsoft’s flagship developer platform. The threat group TeamPCP, already infamous for a string of supply chain attacks across npm, PyPI, and PHP packages earlier this year, has claimed responsibility on underground forums and is reportedly asking more than $50,000 for the stolen dataset. GitHub’s own assessment is that the attacker’s claim of around 3,800 exfiltrated repositories is directionally consistent with what investigators have found so far. The company says no customer data was touched. What GitHub Disclosed GitHub broke the news in a numbered thread of five short posts on X, with no entry on the official github.blog or githubstatus.com at the time of disclosure. The company said it detected the compromise of an employee device the previous day, removed the malicious extension version from the marketplace, isolated the affected endpoint, and rotated critical secrets overnight, prioritizing the highest-impact credentials first. “Our current assessment is that the activity involved exfiltration of GitHub-internal repositories only,” GitHub wrote, adding that it would continue to monitor logs for follow-on activity and publish a fuller report once the investigation is complete. The phrasing is careful. Saying GitHub-internal repositories only rules out customer repos, enterprise tenants, and organization data hosted on the public platform, but it leaves open what was inside those 3,800 repos: deployment scripts, infrastructure configuration, API documentation, staging credentials, and the architectural blueprints of GitHub itself. Important Note “No customer data” does not mean “no customer risk.” Internal repositories at a platform like GitHub typically contain deployment topology, secret rotation logic, CI workflows, and references to third-party integrations. Even if no customer secrets are inside, the architectural knowledge alone meaningfully reduces the cost of attacking customers downstream. The Attack: A Trojanized Extension Inside a Trusted Marketplace GitHub has not yet named the specific extension. Security researchers tracking TeamPCP’s tradecraft note that the group has spent 2026 weaponizing exactly this surface, planting trojanized code in package registries and development tools that developers trust by default. The mechanism is brutally simple. A developer browses the VS Code Marketplace, installs an extension that looks legitimate, and grants it the same execution privileges as any other process running under their account. From there, the malware can read source files, exfiltrate Git credentials, harvest tokens from ~/.aws, ~/.kube, and password managers, and clone every repository the developer has access to. There is no permission model meaningfully limiting what an extension can do once it executes. A theme can do anything a debugger can do. Browser extensions get treated as a security boundary. IDE extensions, which see your source code, your credentials, and your terminal, do not. That asymmetry is the single largest unaddressed risk in the modern developer toolchain, and the GitHub incident is the most expensive demonstration of it to date. What GitHub Has Done, and What Comes Next The containment steps GitHub described are textbook: detect, isolate, rotate, monitor. The company says it removed the malicious extension version, took the developer’s machine off the network, and rotated the credentials most likely to provide further pivots. The investigation continues, and GitHub has committed to publishing a fuller report later. Where the response is less defensible is in disclosure. Announcing a breach of this scale exclusively on X, a platform that requires a login to view most posts, drew sharp criticism. As of publication, there is no entry on the GitHub Blog and no advisory on the official status page. Customers governed by frameworks such as DORA or NIS2, both of which have hard supplier-incident notification timelines, will be looking for something more substantive than a Twitter thread. Pro Tip: IDE plugins and Cyber Security Treat any IDE plugin like a piece of production software. Pin to specific versions, disable auto-updates on critical machines, restrict the allowed publisher list (in VS Code via the extensions.allowed setting), and ensure that any project containing credentials cannot be opened by an editor that auto-runs .vscode/tasks.json without confirmation. If you maintain CI/CD secrets, assume that any developer machine with both source access and an unverified extension installed is already in the threat model. For organizations downstream of GitHub itself, the immediate hygiene items are clear. Rotate any GitHub personal access tokens or OIDC credentials that were used in conjunction with packages from the TanStack, UiPath, Mistral AI, OpenSearch, or Guardrails AI namespaces during the early May window. Audit .vscode/ and .claude/ directories for files such as router_runtime.js or setup.mjs. Search for the gh-token-monitor daemon, which acts as a dead-man switch and triggers a destructive rm -rf on token revocation if not removed first. An Incident or a Pattern? GitHub has had a rough quarter on availability, with multiple outages drawing public complaints. A confirmed source-code breach by the most prolific supply chain threat actor of 2026 lands at the worst possible moment for that narrative. Independent agencies such as the Cybersecurity and Infrastructure Security Agency and NIST, through its Secure Software Development Framework, have been warning for years that developer tooling and build pipelines are the soft underbelly of every modern company, and the Wikipedia entry for supply chain attack now reads like a chronological list of escalating incidents. The deeper lesson from the GitHub breach is not that one employee made a mistake. It is that the security model of the modern developer workstation has not kept pace with the value of what sits on it. Until IDE extensions are sandboxed with explicit capability grants, until source code repositories are treated as sensitive assets rather than collaboration surfaces, and until the disclosure norms for breaches at platform-level vendors are tightened, the Mini Shai-Hulud playbook will continue to work. GitHub will not be the last victim of this campaign. It is simply, for

Plenty of companies treat an ISO 27001 certificate as proof of GDPR compliance. It is not. The two frameworks overlap heavily, but they answer different questions, and the gap between them is exactly where regulators tend to look. ISO 27001 tells you how to build a defensible security program. GDPR tells you what the law expects when that program touches personal data. Run one without understanding the other, and you will either over-engineer security you do not strictly need, or miss privacy obligations that carry real financial exposure. This article maps where ISO 27001 and GDPR meet, where they part ways, and how to run them as a single coordinated effort rather than two competing projects. What Is ISO 27001? ISO/IEC 27001 is the international standard for an Information Security Management System, or ISMS. The current edition is ISO 27001:2022. It is not a checklist of technical fixes. It is a management framework: a structured, repeatable way to identify information security risks, decide how to treat them, document those decisions, and improve over time. Clauses 4 to 10 of the standard define the mandatory ISMS requirements, covering leadership, risk assessment, internal audit, and management review. Annex A then lists 93 controls grouped into four themes: organisational, people, physical, and technological. You do not implement all 93 by default. You select the controls that address your assessed risks and justify your choices in a document called the Statement of Applicability. Certification against ISO 27001 is voluntary and is granted by an accredited third-party body after an audit. What Is GDPR? The General Data Protection Regulation is European Union law. It has been applied since 25 May 2018, and it applies to any organisation that processes the personal data of people in the EU, wherever that organisation is based. GDPR is fundamentally about the rights of individuals, not just the security of data. It grants people rights over their personal data, including access, correction, erasure and portability. It places obligations on the organisations that decide how data is used (controllers) and those that process it on their behalf (processors). It requires a lawful basis for every processing activity, mandates breach notification, and demands transparency about what happens to people’s information. You do not implement GDPR and receive a certificate. You obey it, and a regulator decides whether you have. Key Differences Between ISO 27001 and GDPR Scope and Purpose ISO 27001 protects all information assets an organisation holds: intellectual property, financial records, operational data, source code and, yes, personal data. Its purpose is the confidentiality, integrity and availability of information in general. GDPR is narrower in one sense and broader in another. It covers only personal data of individuals in the EU, but it protects the person behind the data, not merely the data itself. A system can be flawlessly secure and still violate GDPR. Legal Obligation vs. Voluntary Certification This is the difference that catches people out. GDPR is binding law. If you process EU personal data, compliance is not optional, and there is no opting out. ISO 27001 is a voluntary standard. Organisations pursue it for assurance, for competitive advantage, and because customers increasingly demand it. Crucially, there is no such thing as a GDPR certificate. Regulators assess compliance through investigation and enforcement, not through a badge you can display. Penalties for Non-Compliance GDPR fines run on two tiers under Article 83. Less severe infringements — such as failures around records of processing or breach notification — can reach €10 million or 2% of global annual turnover, whichever is higher. The more serious tier, covering breaches of the core processing principles and data subject rights, can reach €20 million or 4% of global annual turnover. Failing an ISO 27001 audit carries no legal fine at all. The consequence is commercial: you do not get the certificate, or you lose it, and that can cost you contracts. How ISO 27001 and GDPR Align Despite their different purposes, the two frameworks were built on compatible logic, which is why running them together works. Both treat information security as central. GDPR Article 32 requires “appropriate technical and organisational measures” to secure personal data. That phrasing is almost a direct description of what an ISO 27001 ISMS produces. The controls an organisation selects for confidentiality and access already serve the regulation’s security expectations. Both are risk-based. ISO 27001 starts every control decision from a risk assessment. GDPR expects the same proportionality: the measures you apply should match the sensitivity of the data and the likelihood and severity of harm. One risk methodology can serve both, provided you assess personal data processing risks alongside broader security risks. Both demand incident response. ISO 27001’s incident management controls require organisations to detect, assess and respond to security events. GDPR Article 33 requires notifying the supervisory authority of a personal data breach within 72 hours of becoming aware of it. The ISO process is the engine that makes the GDPR deadline achievable. How ISO 27001 Can Help You Comply With GDPR Four areas of an ISMS do direct, practical work toward GDPR compliance. Asset management. ISO 27001 requires an inventory of information and associated assets, with owners assigned. You cannot protect personal data, respond to access requests, or maintain records of processing if you do not know where that data lives. The asset inventory is the foundation for both frameworks. Access control. Identity management, privileged access controls and the principle of least privilege limit who can see personal data. That directly supports the GDPR requirement to ensure confidentiality and to prevent unauthorised access. Operational security. Logging, malware protection, backup and secure configuration keep personal data accurate, available and resistant to compromise. These map cleanly onto the integrity and availability expectations in Article 32. Techniques such as data masking for GDPR and ISO 27001 also sit within this space, reducing exposure without sacrificing operational utility. Incident management. A defined process for detecting and handling security events gives you the evidence trail and the response capability you need to