SOC 2 Audit Process: What to Expect

This article is for educational purposes only and does not constitute professional compliance advice or legal counsel. Requirements and standards evolve, and you should consult with a qualified compliance professional about your specific situation.


Your auditor is arriving in two weeks. You know your controls exist, but you're not sure what actually happens during the audit, how prepared you need to be, or what the timeline really looks like. The SOC 2 audit process has distinct phases, each with specific deliverables and requirements. Understanding what's coming—what the auditor will ask for, where you'll need to invest effort, what the testing looks like, what success means—gives you the clarity to prepare effectively instead of scrambling at the last minute. This is the walkthrough of what actually happens, phase by phase, from the moment you engage an auditor through the moment you get your report in hand.

Planning and Scoping: Setting Expectations and Boundaries

The audit starts with planning and scoping, which is arguably the most important phase because the decisions you make here determine what's being evaluated and how much the entire audit will cost. You and your auditor have to agree on what systems, processes, and trust service criteria are included in the scope. This is where you draw boundaries. Maybe you're saying "we're evaluating our cloud infrastructure and our data processing systems, but we're not including our internal HR systems or our on-premises legacy systems." Or maybe you're scoping more broadly. Or maybe you're only scoping specific trust service criteria because your customers care about Security and Availability but not Privacy.

Scope is sometimes straightforward and sometimes contentious because bigger scope means more work for the auditor, which means higher fees, but it also means more of your organization is being evaluated. Many companies try to keep scope as narrow as possible to minimize cost, but that creates a limitation: if you tell customers "SOC 2 only covers our cloud infrastructure" but your customers are asking about your overall security posture, you're giving them a partial picture. They'll come back asking why certain systems or processes weren't included. There's a balance between being cost-efficient and being comprehensive enough that the report actually answers customers' questions.

The planning phase also involves logistics that matter. When will the auditor's fieldwork happen, and for how long? How much access will they need to your systems, your people, and your documentation? What documentation do you need to have ready before they arrive? What's your target Type 1 or Type 2 timeline? These aren't trivial logistics. If your auditor says they need two weeks of fieldwork and you didn't plan for their access to systems and people, you're in trouble. Getting this phase right saves weeks of scrambling later because you've set clear expectations upfront. This is also where you should ask questions about the auditor's methodology and experience. Have they audited companies like yours before? How many SOC 2 audits have they done? What's their testing methodology? What level of exception rate is normal? These conversations matter because they help you understand what to expect and whether the auditor's approach matches your needs.

Evidence Collection: Building Your Documentation Library Before the Auditor Arrives

After scoping, you move into what might be the most unsexy but genuinely crucial phase: evidence collection. This is where you're pulling together documentation proving that your controls actually exist and function. You need to be able to show the auditor your security policies and procedures, evidence that you followed those procedures (access logs, screenshots, onboarding documentation), configuration exports showing how your systems are set up, incident reports, access reviews, change management logs, and anything else that proves your controls worked the way you documented them.

Most companies underestimate how much evidence they need and how long it takes to collect. If your policy says "we review user access quarterly," you don't just show one access review. You need to show four access reviews—one per quarter—with documentation of who has access, who reviewed it, what was changed, and who approved the changes. If your policy says "we encrypt data at rest," you need configuration screenshots or technical documentation proving encryption is actually enabled. If your policy says "we patch within 48 hours of release," you need patch management logs showing your actual patching timeline. The auditor won't look at every single log entry or review. They'll sample—maybe they'll review one access review in detail and then spot-check the other three. But they need to have material to sample from, and it all needs to be organized and ready.

The mistake most companies make is waiting until the auditor is there to start collecting evidence. Then you're panicking because you realize you can't find things, or you discover that you documented something informally but never wrote it down, or you realize you didn't actually do something your policy said you'd do. Smart companies start collecting evidence two to three months before the auditor's fieldwork begins. This gives you time to find things that don't exist and fix them before the auditor arrives, rather than discovering gaps during the audit and having to remediate them afterward. If the auditor finds that your access reviews didn't actually happen quarterly, you can run those reviews now and show evidence of them. If they find that encryption wasn't enabled on some systems, you can enable it now and provide evidence. It's much better to fix things before the audit than to discover failures during testing.

Fieldwork: What the Auditor Actually Does

When the auditor's fieldwork phase begins (usually two to four weeks of activity, though not always continuously), they'll conduct interviews, review documentation, and observe systems. They're not trying to break into your systems or find every vulnerability. They're evaluating whether you're doing what you said you would do. The auditor will interview key personnel—IT staff, security staff, management—and ask them to walk through processes. "Show me how you handle user access requests." "Walk me through your process for employee onboarding." "What do you do when someone reports a security incident?" They're listening for consistency between what's documented and what actually happens. If the documentation says "we change default passwords immediately" but the IT person being interviewed says "honestly, I've never done that—I didn't know that was a policy," that's a red flag. That's inconsistency, which means either the policy isn't real or the process isn't being followed.

The auditor will review your evidence library—the documentation, logs, and screenshots you've collected—to verify that your documented processes are actually being followed. They'll ask to see your systems and verify configuration. They might tour your facilities if you have physical infrastructure. They're looking for any disconnects between your claims and reality. This is where things sometimes go sideways. A company's policy says they encrypt customer data but the auditor finds some data that isn't encrypted. That's a control failure. A company documents that they do incident response but there are no incident reports for the entire year. That's a control failure—either they didn't have any incidents (unlikely) or they didn't document them.

The auditor's job in fieldwork is to find these gaps so you can remediate them. This is actually valuable. You want the auditor to find problems while they're still testing, because that gives you the chance to fix them. Finding a problem during fieldwork is better than discovering it later during testing. The interviews are part of the auditor's assessment too. They're evaluating whether the people running your controls understand the controls and care about them. If you have a security monitoring policy but the person responsible for monitoring doesn't understand how the monitoring works, that's a weakness the auditor will note.

Testing: Verifying That Controls Actually Work

After gathering all their evidence through observation, interviews, and documentation review, the auditor moves into the testing phase. This is where they actually verify that your controls function as described. This is different from just reviewing documentation. If your policy says "we require MFA for all user logins," the auditor won't just look at your MFA policy—they'll test actual login attempts to verify MFA is actually enforced. If your policy says "we maintain an incident response plan," the auditor might review the plan and then ask you to walk through a hypothetical incident scenario to verify that people understand their roles and you could actually execute the plan.

If your policy says "we review access quarterly," the auditor will look at actual access reviews and verify they're complete and signed off by management. They're sampling from your normal operations to verify the controls work. Testing can reveal that your controls have gaps. Maybe MFA is enforced for external users but not for internal users. That's a control gap. Your policy says "all users" but you're only protecting some users. The auditor will note this as a finding. Maybe your policy says you review access quarterly and it's now Q2, but you haven't done your Q1 review yet. That's a control failure for the audit period.

Testing is also where timeline issues and process breakdowns sometimes emerge. The auditor's testing is comprehensive but it's sampled. They don't test 100 percent of transactions or users. If you have 10,000 user access records, they'll test 50 of them thoroughly. If you deployed 1,000 patches this quarter, they'll verify a sample of them were deployed within your documented timeline. The idea is that if the sample shows controls working, the auditor can be reasonably confident the controls work overall. If the sample shows problems, they'll dig deeper or note it as a finding.

Remediation: What Happens When You Find Problems During Testing

Not every company passes their SOC 2 audit on the first try. In fact, most companies have at least a few findings that require remediation. This is normal. It's not a sign of failure. It's part of the process. Remediation means fixing the control that didn't work and providing evidence that it's now working. If testing found that you're not actually reviewing access quarterly, you remediate by doing the review and documenting it, then showing the auditor the evidence. If testing found that encryption isn't enabled for all data, you enable it and prove it.

The auditor might want to see evidence that the fix has been in place for a period of time to verify the remediation is sustainable, not a one-time fix for the audit. If you're doing Type 1, remediation can happen relatively quickly and you can still get your report. You fix the issue, show evidence of the fix, and the auditor includes a note about the exception in their report. If you're doing Type 2 and you have significant findings, you might need to remediate during the observation period and then have the auditor verify the fixes in future testing. The timeline impact of remediation depends on how serious the findings are and how quickly you can fix them. A simple control like "we need to document this procedure" might take a week to fix. A technical control like "we need to enable encryption on all systems" might take months.

Your auditor should give you guidance on what remediation looks like and how much additional time and cost it will add. The important mindset is this: remediation is expected. It's not a disaster or a sign that your organization failed. It's how the audit process works. Almost every organization has some findings. The goal isn't a perfect audit with zero findings. The goal is a successful audit where you have few enough findings and you have remediation plans for the ones you do have.

The Report: Your Final Credential

Once testing is complete and any critical findings are remediated, the auditor compiles everything into your final report. The SOC 2 report has a standard structure: the auditor's opinion (did you pass or not?), management's description of your controls and control environment, the auditor's detailed testing results and findings, and supporting documentation. The auditor's opinion is typically "unmodified" (which means "pass") or "qualified" (which means "you passed but with some exceptions"). Exceptions are controls that didn't work as described.

An exception doesn't automatically mean you failed the audit. A qualified opinion with a few minor exceptions is common and generally acceptable to customers. But if you have a lot of exceptions or if critical controls failed, you might get an adverse opinion, which means "you didn't pass." When that happens, you typically have to remediate the issues and sometimes undergo another brief audit to verify the fixes work, which adds cost and timeline. Getting a clean report (unmodified or qualified opinion with minimal exceptions) is the goal, and that's what most companies achieve.

Once you have a report, you get a final document that's typically 80 to 150 pages. It describes your system, your controls, the criteria they were tested against, and the auditor's opinion on whether those controls are effective. It includes detailed control descriptions so customers can see specifically what you're doing. The report is good for two years if it's Type 1 and it's good for one year at a time if it's Type 2 (with an updated report generated annually during the observation period). After the audit, there's no ongoing regulatory reporting requirement—you don't have to report the results to anyone. But customers will ask to see it, so the report becomes a sales and retention asset.

Timeline and Cost Implications

A Type 1 audit typically takes three to four months from engagement to report. You scope the audit, collect evidence for a few weeks, the auditor does fieldwork and testing, and within a few weeks you have your report. It's a straightforward, bounded engagement. A Type 2 audit requires a six to twelve month observation period plus the audit phases on top of that, so you're looking at nine to fifteen months total. You can't shortcut the observation period. It's the foundation of what makes Type 2 credible. Your auditor is literally watching your controls work over time, which means you need to have those controls in place and operating before you even engage the auditor.

The financial cost varies based on your organization size and complexity. Auditor fees for Type 1 range from about $15,000 to $50,000. Auditor fees for Type 2 range from about $20,000 to $80,000. Your internal labor cost for evidence collection, interviews, and audit management can be substantial—plan for three to six months of staff time. Some organizations outsource parts of this work (hiring a consultant to manage evidence collection or coordinate the audit) which adds cost but can reduce your internal labor burden. The total first-year cost including auditor fees and internal labor is typically $50,000 to $250,000 depending on your size and complexity.

The Path Forward

The SOC 2 audit moves through distinct phases: planning and scoping where you define what's being evaluated and set expectations, evidence collection where you gather proof that your controls work, fieldwork and testing where the auditor verifies your controls through observation and testing, and finally the report where you get your credential. Some companies have findings that require remediation, which is normal and expected. Understanding what happens in each phase helps you prepare effectively and reduces scrambling. You now know what to expect, what documentation you need to gather, what the auditor will be looking for, and what the timeline actually looks like. That knowledge is worth an enormous amount because it lets you plan intelligently instead of treating the audit as a surprise.


Fully Compliance provides educational content about IT compliance and cybersecurity. This article reflects general information about SOC 2 audit processes as of its publication date. Audit timelines, methodologies, and processes can vary by auditor and organization — consult with your auditor and a qualified compliance professional for guidance specific to your situation.