Agency|Insights

SOC 2 and GDPR: Managing Both for Global SaaS Companies

At Agency, we work with SaaS companies selling internationally who face a dual compliance challenge that often feels like managing two separate programs: US.

Agency Team
Agency Team
·14 min read
Typographic card for SOC 2 and GDPR: Managing Both for Global SaaS Companies in Multi-Framework & Cross-Compliance

At Agency, we work with SaaS companies selling internationally who face a dual compliance challenge that often feels like managing two separate programs: US enterprise buyers require SOC 2 reports as a standard procurement condition, while European customers and data protection authorities expect compliance with the General Data Protection Regulation (GDPR). These frameworks originate from different legal traditions — SOC 2 is a voluntary attestation framework developed by the AICPA for evaluating service organization controls, while GDPR is a comprehensive data protection regulation enforced by EU/EEA supervisory authorities with penalties up to four percent of global annual revenue or twenty million euros. Despite their different origins, what we consistently see is that SOC 2 and GDPR share substantial control overlap, and organizations that build their compliance program strategically can satisfy both frameworks with a single, unified control environment rather than maintaining parallel programs.

This guide helps SaaS companies operating globally understand where SOC 2 and GDPR overlap, where they diverge, how to build a unified compliance program, and how to use the SOC 2 report as evidence of GDPR technical and organizational measures. The target audience is compliance officers, data protection officers (DPOs), and security leads at SaaS companies with both US and European customers.

Fundamental Differences

Framework Comparison

DimensionSOC 2GDPR
TypeVoluntary attestation frameworkEU regulation (legally binding)
Governing bodyAICPAEuropean Commission; enforced by EU/EEA data protection authorities
Geographic scopePrimarily US; growing international recognitionEU/EEA; applies globally to any organization processing EU personal data
Who it applies toService organizations that choose to undergo the attestationAny organization processing personal data of EU/EEA residents
EnforcementMarket-driven — customers require reportsRegulatory — fines up to €20M or 4% of global annual revenue
Assessment methodCPA firm attestation engagementSelf-assessment, data protection impact assessments, supervisory authority audits
OutputSOC 2 report with auditor opinionNo standard report; compliance demonstrated through documentation, DPIAs, records of processing
FocusSecurity controls for service organizationsData protection rights of individuals
Control frameworkTrust Service Criteria (CC1-CC9 + optional criteria)Articles 5, 6, 12-22, 24-39 (principles, rights, obligations)

The Key Philosophical Difference

SOC 2 evaluates whether an organization's controls are suitably designed and operating effectively to protect data and systems. GDPR evaluates whether an organization processes personal data lawfully, fairly, and transparently — with specific rights granted to data subjects. What we always explain to clients is that SOC 2 is controls-focused while GDPR is rights-focused. A SOC 2 program without GDPR alignment may have excellent security controls but lack the data subject rights mechanisms, lawful basis documentation, and data processing transparency that GDPR requires.

Where SOC 2 and GDPR Overlap

Control Overlap Map

Control DomainSOC 2 RequirementGDPR RequirementOverlap Level
Access managementCC6 — logical access controls, authentication, authorization, deprovisioningArticle 32 — security of processing; appropriate technical measuresHigh
EncryptionCC6 — data protection at rest and in transitArticle 32 — pseudonymization and encryption of personal dataHigh
Risk assessmentCC3 — formal risk assessment and managementArticle 35 — data protection impact assessment (DPIA); Article 32 — risk-appropriate securityHigh
Incident responseCC7 — incident detection, response, communicationArticles 33-34 — breach notification to supervisory authority (72 hours) and data subjectsHigh
Monitoring and loggingCC7 — security event logging and monitoringArticle 32 — ability to detect, respond to, and recover from incidentsMedium-High
Change managementCC8 — change authorization, testing, deploymentArticle 32 — process for regularly testing effectiveness of technical measuresMedium
Vendor managementCC9 — vendor risk assessment and contractual requirementsArticles 28-29 — data processor agreements; sub-processor requirementsHigh
Employee trainingCC1 — security awareness and trainingArticle 39(1)(b) — DPO responsibilities include awareness-raising and trainingMedium
Data classificationCC6, C1 — data handling and confidentialityArticle 5(1)(c) — data minimization; processing only what is necessaryMedium
Business continuityCC9, A1 — business continuity and disaster recoveryArticle 32(1)(c) — ability to restore availability and access to personal data in a timely mannerMedium

In our experience, an organization with a mature SOC 2 program addresses approximately fifty to sixty percent of GDPR's technical and organizational measures requirements. The remaining GDPR requirements are specific to data subject rights, lawful basis for processing, and data protection governance — areas that SOC 2 does not directly address.

SOC 2 Privacy Criterion and GDPR

Including the SOC 2 Privacy criterion significantly increases overlap with GDPR:

Privacy Criterion AreaGDPR Alignment
NoticeArticle 13-14 — information provided to data subjects about processing
Choice and consentArticle 6 — lawful basis for processing; Article 7 — conditions for consent
Collection limitationArticle 5(1)(b) — purpose limitation; Article 5(1)(c) — data minimization
Use, retention, and disposalArticle 5(1)(e) — storage limitation; Article 17 — right to erasure
AccessArticle 15 — right of access by the data subject
Disclosure to third partiesArticles 28-29 — data processor agreements; Article 44-49 — international transfers
QualityArticle 5(1)(d) — accuracy of personal data
Monitoring and enforcementArticle 24 — responsibility of the controller; Article 32 — security of processing

What we see across our client base is that organizations that include the Privacy criterion in their SOC 2 scope cover approximately seventy to seventy-five percent of GDPR requirements, compared to fifty to sixty percent with Security alone.

Where GDPR Goes Beyond SOC 2

GDPR-Specific Requirements

GDPR RequirementDescriptionNot Covered by SOC 2
Lawful basis for processingArticle 6 — every processing activity requires a documented lawful basis (consent, contract, legitimate interest, etc.)SOC 2 does not require documenting lawful basis for data processing
Data subject rightsArticles 15-22 — right to access, rectification, erasure, restriction, portability, objection, automated decision-makingSOC 2 Privacy criterion covers some rights but not the full GDPR scope
Data Protection OfficerArticles 37-39 — mandatory DPO appointment in certain circumstancesSOC 2 does not require a DPO
Data Protection Impact AssessmentArticle 35 — DPIA required for high-risk processing activitiesSOC 2 requires risk assessment but not processing-specific DPIAs
Records of processing activitiesArticle 30 — documented records of all processing activitiesSOC 2 does not require processing activity records
International data transfersArticles 44-49 — legal mechanisms for transferring personal data outside the EU (SCCs, adequacy decisions, BCRs)SOC 2 does not address cross-border data transfer mechanisms
Data protection by design and defaultArticle 25 — privacy built into system design; default settings protect privacySOC 2 does not explicitly require privacy by design
Consent managementArticle 7 — specific conditions for valid consentSOC 2 Privacy criterion references consent but does not prescribe GDPR-specific consent requirements
Breach notification to supervisory authorityArticle 33 — notification within 72 hours to the supervisory authoritySOC 2 requires incident response but not specific regulatory notification timelines

Building a Unified Compliance Program

Implementation Strategy

The most efficient approach — and the one we recommend to all our global SaaS clients — is to build a single control environment that satisfies both frameworks, with supplemental GDPR-specific activities layered on top of the SOC 2 foundation:

| Layer | What It Contains | Purpose | |-------|-----------------|---------|
| Foundation (SOC 2) | Security controls, access management, change management, monitoring, incident response, risk assessment, vendor management, policies | Addresses SOC 2 Trust Service Criteria and the technical/organizational measures of GDPR Article 32 | | Extended controls (SOC 2 Privacy) | Notice, consent, data collection limitation, data lifecycle management, data subject access mechanisms | Addresses SOC 2 Privacy criterion and extends coverage into GDPR data protection principles | | GDPR-specific layer | Lawful basis documentation, DPIA process, records of processing, data transfer mechanisms, DPO appointment, consent management | Addresses GDPR requirements not covered by SOC 2 |

Implementation Priority

PriorityActivitySOC 2 BenefitGDPR Benefit
1Implement access management controlsCC6 complianceArticle 32 security measures
2Enable encryption at rest and in transitCC6 complianceArticle 32 pseudonymization and encryption
3Conduct risk assessmentCC3 complianceArticle 32 risk-appropriate measures; foundation for DPIAs
4Implement incident response with 72-hour capabilityCC7 complianceArticles 33-34 breach notification
5Build vendor management program with DPA templatesCC9 complianceArticles 28-29 processor agreements
6Document data processing activitiesSOC 2 system descriptionArticle 30 records of processing
7Implement data subject rights mechanismsSOC 2 Privacy criterionArticles 15-22 data subject rights
8Establish data transfer mechanismsSOC 2 scope documentationArticles 44-49 international transfers
9Appoint DPO (if required)Not directly requiredArticles 37-39 DPO appointment
10Conduct DPIAs for high-risk processingSOC 2 risk assessment supportsArticle 35 DPIA requirement

Data Processing Agreements and SOC 2

For SaaS companies processing EU personal data on behalf of customers, Data Processing Agreements (DPAs) are required under GDPR Article 28. Your SOC 2 report can serve as evidence within the DPA relationship:

DPA RequirementHow SOC 2 Supports It
Technical and organizational measures (Article 32)SOC 2 report provides independent verification of security controls
Sub-processor managementSOC 2 vendor management controls (CC9) demonstrate sub-processor oversight
Audit rightsSOC 2 report satisfies many customers' audit requirements under the DPA
Breach notificationSOC 2 incident response controls (CC7) demonstrate notification capability
Data deletion upon contract endSOC 2 controls can include data retention and deletion procedures

Using SOC 2 as GDPR Evidence

Article 32: Security of Processing

GDPR Article 32 requires organizations to implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk. A SOC 2 Type II report with an unqualified opinion provides strong evidence of Article 32 compliance for the security controls within its scope.

Article 32 RequirementSOC 2 Evidence
Pseudonymization and encryptionCC6 controls demonstrating encryption at rest and in transit
Confidentiality, integrity, availabilityTrust Service Criteria coverage across Security, Availability, and Confidentiality
Ability to restore availabilityBusiness continuity and DR controls (CC9, A1)
Regular testing of security measuresSOC 2 Type II demonstrates ongoing control effectiveness over the observation period

How European Customers Use SOC 2 Reports

European customers increasingly accept SOC 2 reports as evidence of technical measures, but with specific expectations:

European Buyer ExpectationHow to Address
SOC 2 should include Privacy or Confidentiality criterionInclude at least one data protection-relevant criterion beyond Security
Report should reference GDPR-relevant controlsSystem description should mention EU data handling where applicable
Data transfer mechanisms should be documentedInclude data residency and transfer mechanism documentation alongside the SOC 2 report
DPA should reference the SOC 2 reportInclude the SOC 2 report as an exhibit or reference in your Data Processing Agreement

International Data Transfers

Data Transfer Mechanisms

For SaaS companies transferring EU personal data to the US or other non-adequate countries:

MechanismWhen to UseSOC 2 Relevance
Standard Contractual Clauses (SCCs)Most common mechanism for EU-US data transfersSOC 2 provides evidence of the supplemental measures required alongside SCCs
EU-US Data Privacy FrameworkAvailable for certified US companiesCertification is separate from SOC 2; both demonstrate data protection commitment
Binding Corporate Rules (BCRs)Intra-group transfers within multinational companiesPrimarily enterprise mechanism; SOC 2 supports the security measures component
Adequacy decisionsTransfers to countries with EU-recognized adequate protectionNo additional mechanism needed for adequate countries

SOC 2 as Supplementary Measures for SCCs

Following the Schrems II decision, organizations using SCCs for EU-US data transfers must implement supplementary measures to ensure an adequate level of data protection. What we advise our clients is that a SOC 2 report with appropriate criteria (Security + Confidentiality or Privacy) serves as strong evidence of supplementary technical measures:

Supplementary Measure CategorySOC 2 Evidence
Encryption of data in transit and at restCC6 encryption controls
Access controls limiting who can access personal dataCC6 access management controls
Monitoring and logging of data accessCC7 monitoring controls
Incident detection and responseCC7 incident response controls

Trust Service Criteria Selection for Global Companies

Recommended Criteria for GDPR Alignment

CriterionGDPR Alignment ValueRecommendation
SecurityAddresses Article 32 technical measuresRequired (mandatory for all SOC 2)
ConfidentialityAddresses data protection and access restrictionsStrongly recommended — demonstrates data confidentiality commitment
PrivacyAddresses data lifecycle management aligned with GDPR principlesStrongly recommended — maximizes GDPR overlap
AvailabilityAddresses Article 32 availability and resilience requirementsRecommended
Processing IntegrityAddresses data accuracy (Article 5(1)(d))Situational

We recommend including Security, Confidentiality, and Privacy for the strongest SOC 2 foundation for GDPR compliance. This combination addresses the technical measures, data protection, and data lifecycle management requirements that overlap between the two frameworks.

Key Takeaways

  • In our experience, SOC 2 and GDPR share approximately fifty to sixty percent control overlap on security measures; including the SOC 2 Privacy criterion increases overlap to seventy to seventy-five percent
  • We consistently advise clients that a unified compliance program is significantly more efficient than maintaining parallel SOC 2 and GDPR programs
  • SOC 2 provides strong evidence for GDPR Article 32 (security of processing) — a Type II report demonstrates ongoing effectiveness of technical and organizational measures
  • GDPR goes beyond SOC 2 in data subject rights, lawful basis documentation, DPIAs, records of processing, data transfer mechanisms, and DPO requirements
  • We recommend including Security, Confidentiality, and Privacy criteria for the strongest GDPR alignment in your SOC 2 report
  • SOC 2 reports can serve as evidence of supplementary measures for Standard Contractual Clauses following Schrems II
  • We advise referencing the SOC 2 report in your Data Processing Agreements to demonstrate compliance with Article 28 technical measures
  • European customers increasingly accept SOC 2 as evidence of security measures but expect GDPR-specific documentation (DPA, transfer mechanisms, records of processing) alongside the SOC 2 report
  • Our recommendation is to build the SOC 2 foundation first, then layer GDPR-specific requirements on top — this approach leverages the control overlap efficiently
  • GDPR penalties (up to four percent of global revenue) make compliance a legal imperative, not just a procurement requirement

Frequently Asked Questions

Does SOC 2 compliance mean we are GDPR compliant?

What we tell every client clearly is: no. SOC 2 addresses security controls that overlap with GDPR's technical and organizational measures (Article 32), but GDPR includes extensive requirements beyond security — data subject rights, lawful basis for processing, Data Protection Impact Assessments, records of processing activities, international data transfer mechanisms, and potentially DPO appointment. A comprehensive SOC 2 program (especially with the Privacy criterion) provides a strong foundation for GDPR compliance, but supplemental GDPR-specific activities are required.

Should we include the Privacy criterion for GDPR alignment?

Our strong recommendation for SaaS companies with European customers is yes. The Privacy criterion covers the personal information lifecycle (notice, consent, collection, use, access, disclosure, disposal) that aligns with GDPR data protection principles. Including Privacy increases your SOC 2 and GDPR overlap from approximately fifty to sixty percent to seventy to seventy-five percent. European customers and DPAs increasingly reference SOC 2 Privacy criterion inclusion as evidence of data protection commitment.

Can we use the SOC 2 report to satisfy GDPR audit rights?

Based on what we see in practice: in many cases, yes. GDPR Article 28(3)(h) grants data controllers the right to audit data processors. Many DPAs include a provision allowing the SOC 2 report to satisfy this audit right — the independent CPA attestation provides equivalent assurance to a customer audit. However, some controllers (particularly in highly regulated industries) may insist on their own audit regardless. We advise including a clause in your DPA that references the SOC 2 report as satisfying audit requirements, with a provision for additional audits at the controller's expense if they require more.

How do we handle data residency requirements in our SOC 2 program?

The guidance we give clients is to document where personal data is stored and processed in your SOC 2 system description. If European customers require EU data residency, document which data center regions are available and how data residency is enforced. Your SOC 2 report itself does not mandate data residency, but the system description should accurately reflect where data is stored. Pair this with your DPA and transfer mechanism documentation (SCCs or EU-US Data Privacy Framework certification) to provide complete data residency and transfer transparency.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.