What Is a SOC 2 Report? A Practical Guide to the Framework and Audit Types

Avatar photo

Bill Schaumann

SOC 2 is an auditing framework designed to help service organizations prove they have effective controls in place to protect customer data. It’s built around the AICPA’s Trust Services Criteria—Security, Availability, Processing Integrity, Confidentiality, and Privacy—and it typically requires organizations to document and demonstrate dozens of controls through policies, evidence, and testing. In this guide, we’ll break down what SOC 2 is, how Type 1 and Type 2 reports differ, and what the control areas usually include; then we’ll look at how Lightbeam can help teams maintain continuous visibility into where sensitive data lives, who can access it, and how that maps to audit-ready evidence.

The SOC2 framework is a roadmap to build and prove controls for protecting customer data. Its core principles are the Trust Services Criteria which focus on Security, Availability, Processing Integrity, Confidentiality, and Privacy controls. The framework relies on assessments, policies, and audits for assuring service organization customers that their sensitive data is well protected. Generally, a SOC 2 audit that focuses on Security and Optional privacy criteria can involve 60-100 controls depending on the organization’s data processing systems and activities.   

The SOC2 framework is administered by the AICPA. The American Institute of Certified Public Accountants (AICPA) which is the national professional organization for Certified Public Accountants (CPAs) in the United States and exists to support global accounting practices. 

There are two primary types of SOC2 audits (Type 1 and Type 2) and a related SOC 3 report, with the key difference being when and how controls are assessed:

  • Type 1 is a snapshot of the control design. 
  • Type 2 assesses the effectiveness of the control
  • Type 3 is a less detailed, public-facing report of a SOC 2 Type 2 

The SOC2 control areas are wide and broad and contain requirements similar to other popular standards. There is not a fixed number of controls for an audit. The number would be determined by the organization’s operations and the data they process. There are both administrative and technical types of  controls. Many administrative controls focus on the organization’s documented policies that demonstrate authority, roles,  and how the controls are applied.  Others are more technical in nature focusing on how the systems and data is managed.  

The framework is organized in both Security and Privacy silos with some controls being  mandatory and some optional. The goal of all SOC2 controls are consistent however in providing assurance to their clients about the protection of their data. Through detailed reports on the assessment of deployed controls organizations can assess risk and build client confidence in the service organizations capabilities.   

How can Lightbeam help ?

Lightbeam’s technologies will help organizations conduct a SOC2 Type 2 audit by providing continuous visibility into where personal data resides, how it flows, who has access to it and how it is used across systems. Through automated data discovery and classification, documenting the records of processing activities, consent management, individual rights management, and privacy and security risk assessments, Lightbeam enables the execution of SOC2 audits by embedding security and privacy governance into day-to-day data operations and creating documented and demonstrable compliance while reducing manual effort and client risk. 

Key SOC2 Control Areas LightBeam Supports
Security Controls  Privacy Controls 
Governance & Risk Governance
Access Control Data Collection and Use
Systems and Network Security Data Subject Rights
Monitoring and Detection  Data Retention and Disposal
Incident Response Data Access & Disclosure
Change Management Data Quality
Vendor and Third Party Mgt Privacy Incident Management