Agency|Insights
Trust BuildingCompliance Operations

SOC 2 Gap Analysis Playbook: Identify and Close Compliance Gaps

A SOC 2 gap analysis is a structured assessment of your organization's current security controls, policies, and processes measured against the Trust Service Criteria defined by the AICPA.

Agency Team
Agency Team
·16 min read
Playbook card for SOC 2 Gap Analysis Playbook: Identify and Close Compliance Gaps

At Agency, the gap analysis is where we start every SOC 2 engagement. Before we talk about platforms, auditors, or timelines, we need to understand exactly where an organization stands today. In our experience, this single step prevents more audit surprises than any other activity in the compliance process.

A SOC 2 gap analysis is a structured assessment of your organization's current security controls, policies, and processes measured against the Trust Service Criteria defined by the AICPA. The purpose is to identify every area where your existing environment does not meet SOC 2 requirements — before your auditor finds them during fieldwork. A well-executed gap analysis typically takes one to three weeks and produces a prioritized remediation roadmap that becomes the foundation of your entire SOC 2 preparation effort. In our experience, companies that skip or rush this step consistently encounter audit delays, evidence gaps, and exceptions that could have been identified and resolved months earlier.

This playbook provides a step-by-step process for conducting a thorough SOC 2 gap analysis, including assessment frameworks, stakeholder interview techniques, technical evaluation checklists, gap categorization, and the creation of a prioritized remediation plan with realistic effort estimates. The target audience is compliance leads, security engineers, and CTOs who need a repeatable methodology for identifying and closing compliance gaps.

For a complete SOC 2 preparation framework, see the SOC 2 readiness playbook. For evidence collection requirements, see the evidence collection guide.

Gap Analysis Overview

What a Gap Analysis Produces

OutputDescription
Current state assessmentDocumented inventory of existing controls, policies, processes, and tools mapped to Trust Service Criteria
Gap inventoryComplete list of areas where current practices do not meet SOC 2 requirements
Severity classificationEach gap categorized by audit risk (critical, high, medium, low)
Remediation roadmapPrioritized action plan with owners, effort estimates, and target completion dates
Resource requirementsEstimated hours, budget, and tooling needed to close all identified gaps

When to Conduct a Gap Analysis

  • Before selecting a GRC platform: Understanding your current gaps helps you evaluate which platform features matter most for your environment
  • Before engaging an auditor: Arriving at the audit with unresolved gaps leads to exceptions, delays, and increased auditor fees
  • After significant infrastructure changes: Major migrations, acquisitions, or product launches may introduce new gaps
  • Annually before Type II renewal: Even organizations with established SOC 2 programs should reassess gaps before each audit cycle

Step 1: Define Scope and Criteria

Before assessing gaps, we recommend establishing the boundaries of your assessment.

Scope Definition

Scope ElementWhat to Define
Systems in scopeWhich products, platforms, and internal systems are included in the SOC 2 engagement
Trust Service CriteriaWhich criteria you are including — Security (mandatory), plus any of Availability, Processing Integrity, Confidentiality, Privacy
Organizational boundariesWhich teams, departments, and business units are in scope
Third-party dependenciesWhich vendors and subservice organizations are included in the scope
Data typesWhat categories of customer data are processed, stored, or transmitted by in-scope systems

Criteria Selection Implications

Each Trust Service Criterion you include creates additional control requirements that must be assessed during the gap analysis:

  • Security (Common Criteria): Required for all SOC 2 engagements. Covers access controls, change management, risk management, monitoring, logical and physical security, and system operations. This criterion alone encompasses approximately sixty to seventy percent of the total SOC 2 control requirements.
  • Availability: Adds controls for uptime commitments, capacity management, disaster recovery, backup procedures, and incident response for availability events.
  • Processing Integrity: Adds controls for data processing accuracy, completeness, validity, and timeliness.
  • Confidentiality: Adds controls for data classification, encryption, access restrictions, and confidential information handling.
  • Privacy: Adds controls aligned with privacy principles — notice, choice, collection, use, access, disclosure, security, quality, and monitoring.

Step 2: Inventory Existing Controls

Before identifying gaps, we recommend documenting what controls already exist. Most organizations have more security controls in place than they realize — they simply are not documented or mapped to a compliance framework.

Control Inventory Approach

Control DomainWhat to InventoryWhere to Find Evidence
Access managementSSO configuration, MFA enforcement, user provisioning/deprovisioning, role-based access, admin account managementIdentity provider dashboard, access logs, HR onboarding/offboarding records
Change managementCode review requirements, branch protection, deployment processes, change approval workflowsGit repository settings, CI/CD pipeline configuration, pull request history
Monitoring and loggingCentralized logging, alerting configuration, log retention, security event detectionSIEM or logging platform, alert rules, dashboards
Endpoint securityMDM deployment, disk encryption, OS patching, antivirus/EDR, screen lockMDM console, endpoint agent reports, device inventory
Data protectionEncryption at rest and in transit, key management, data classification, backup configurationCloud provider settings, TLS certificates, backup logs
Network securityFirewall rules, network segmentation, VPN configuration, security groupsCloud provider console, network diagrams, firewall configurations
Incident responseIncident response plan, communication templates, escalation procedures, post-incident review processPolicy documents, incident tracking system, post-mortem reports
Vendor managementVendor inventory, risk assessments, contractual security requirements, review cadenceVendor tracking spreadsheet or GRC platform, contracts, assessment records
HR securityBackground checks, security training, acceptable use policy, termination proceduresHR system records, training platform completions, policy acknowledgments
Risk managementRisk assessment documentation, risk register, risk treatment plans, risk review cadenceRisk assessment documents, governance meeting notes

Stakeholder Interviews

We recommend interviewing key stakeholders across the organization to understand current practices that may not be documented:

StakeholderInterview Focus
CTO / VP EngineeringArchitecture overview, change management practices, deployment processes, infrastructure decisions
Engineering leadsCode review practices, testing procedures, incident response, on-call rotation
IT / DevOpsCloud configuration, monitoring setup, access provisioning, endpoint management
HROnboarding process, background check procedures, termination workflow, training programs
Security (if exists)Vulnerability management, penetration testing, incident response, security tool stack
CEO / FounderRisk tolerance, compliance budget, business context, customer requirements

Interview Technique

For each stakeholder, use this structure:

  1. Process walkthrough: "Walk me through how [process] works from start to finish." This reveals what actually happens versus what the policy says.
  2. Evidence probe: "If an auditor asked to see evidence of this, what would we show them?" This reveals documentation gaps.
  3. Exception handling: "What happens when the normal process doesn't work? What's the workaround?" This reveals informal practices that may create control gaps.
  4. Frequency and consistency: "How often does this happen? Is it the same every time?" This reveals whether processes are repeatable and consistent.

Step 3: Map Controls to Trust Service Criteria

With your control inventory complete, map each existing control to the specific Trust Service Criteria points it satisfies.

Common Criteria Mapping

TSC CategoryKey Control RequirementsTypical Gaps
CC1 (Control Environment)Governance structure, management oversight, organizational structure, commitment to competenceMissing board or management oversight documentation, no formal organizational chart, undefined compliance roles
CC2 (Communication and Information)Internal and external communication procedures, system descriptions, policy distributionPolicies not distributed to all employees, no system description document, missing external communication procedures
CC3 (Risk Assessment)Formal risk assessment, risk register, risk monitoringNo documented risk assessment, no risk register, risk assessment not updated annually
CC4 (Monitoring Activities)Ongoing control monitoring, exception tracking, remediation processesNo continuous monitoring, no exception tracking process, manual monitoring without documentation
CC5 (Control Activities)Logical access controls, authentication mechanisms, data protection measuresIncomplete MFA enforcement, no access review process, missing encryption on some data stores
CC6 (Logical and Physical Access)User provisioning, authentication, physical access controls, data transmission securityShared accounts, no deprovisioning process, missing physical access logs
CC7 (System Operations)Monitoring and detection, incident management, change management, backup and recoveryNo centralized logging, undocumented incident response, missing backup testing records
CC8 (Change Management)Change authorization, testing, deployment controlsNo code review requirement, missing staging environment, no rollback procedures
CC9 (Risk Mitigation)Vendor management, business continuity, insuranceNo vendor risk assessments, no business continuity plan, no DR testing records

If you are using a GRC platform, the platform's control framework provides this mapping automatically. If you are conducting the gap analysis manually, use the AICPA Trust Service Criteria documentation as your reference.

Step 4: Identify and Categorize Gaps

Gap Identification Process

For each Trust Service Criteria point, evaluate whether your existing controls fully satisfy the requirement:

Assessment StatusDefinition
SatisfiedAn existing control fully meets the requirement with documented evidence available
Partially satisfiedA control exists but is incomplete — the practice occurs but is not documented, or the control does not cover the full scope
Not satisfiedNo control exists that addresses this requirement
Not applicableThe requirement does not apply to your environment (must be justified and documented)

Gap Severity Classification

SeverityDefinitionAudit RiskExamples
CriticalNo control exists for a core requirement; would result in a significant exceptionHigh — auditor will issue an exceptionNo MFA enforcement, no logging enabled, no access review process
HighControl exists but has a significant weakness; auditor likely to flagModerate-high — may result in an exception or observationMFA enabled but not enforced for all users, logs exist but no alerting, access reviews done informally
MediumControl exists with minor gaps; auditor may note as an observationModerate — unlikely to be an exception but may be flaggedPolicies not formally approved, training completion below 100%, backup testing not documented
LowControl exists with documentation gaps only; easily remediatedLow — addressable before auditMissing version dates on policies, incomplete vendor inventory, missing organizational chart

Common Gaps by Category

CategoryMost Frequent Gaps
Access managementNo formal access review process, shared admin accounts, deprovisioning delays, incomplete MFA enforcement
Change managementNo branch protection on production repositories, no staging environment, undocumented deployment process
MonitoringNo centralized logging, no security alerting, insufficient log retention period
Risk managementNo formal risk assessment document, no risk register, risk assessment not reviewed annually
Vendor managementNo vendor inventory, no risk assessments for critical vendors, no contractual security requirements
HR securityIncomplete background checks, security training not completed by all employees, no formal termination checklist
Incident responseNo documented incident response plan, no post-incident review process, no incident communication templates
Business continuityNo business continuity plan, no disaster recovery testing, no documented RTO/RPO
Data protectionUnencrypted data stores, no data classification policy, missing encryption in transit for internal services
Policy and documentationPolicies not approved by management, policies not distributed, no policy acknowledgment tracking

Step 5: Build the Remediation Roadmap

Prioritization Framework

We recommend prioritizing gaps using a matrix of severity and effort:

Low Effort (under 4 hours)Medium Effort (4-20 hours)High Effort (20+ hours)
CriticalDo immediatelyDo this weekStart immediately; plan for phased completion
HighDo this weekComplete within two weeksPlan and begin within one week
MediumComplete within two weeksComplete within four weeksSchedule for weeks three through six
LowComplete within four weeksComplete within six weeksSchedule based on available capacity

Remediation Plan Template

For each gap, we recommend documenting the following:

FieldDescription
Gap IDUnique identifier for tracking
TSC referenceWhich Trust Service Criteria point this gap relates to
Gap descriptionClear statement of what is missing or insufficient
SeverityCritical, high, medium, or low
Current stateWhat exists today
Target stateWhat must be in place to satisfy the requirement
Remediation actionsSpecific steps to close the gap
OwnerPerson responsible for remediation
Effort estimateHours required to complete remediation
DependenciesAny prerequisites or dependencies on other teams or tools
Target completion dateDeadline for remediation
Evidence requiredWhat evidence the auditor will need to verify the gap is closed

Common Remediations and Effort Estimates

GapRemediationEffort Estimate
MFA not enforced for all usersConfigure MFA requirement in identity provider; verify enforcement2-4 hours
No formal access review processDefine quarterly access review procedure; conduct first review; document results8-16 hours
Branch protection not enabledEnable branch protection rules on production repositories; require code review approval1-2 hours
No centralized loggingDeploy logging solution or configure cloud-native logging; set retention period4-12 hours
No documented risk assessmentConduct formal risk assessment workshop; document risks, likelihood, impact, and treatment plans8-20 hours
No vendor risk assessmentsBuild vendor inventory; send assessment questionnaires to critical vendors; document results10-30 hours
Policies not approvedRoute policies to management for formal approval; document approval with dates and signatures4-8 hours
No incident response planDraft incident response plan; define roles, escalation procedures, communication templates8-16 hours
No business continuity planDraft BCP; define critical systems, recovery priorities, communication procedures12-24 hours
Security training not completedAssign training to all employees; set deadline; track completion to 100%4-8 hours (plus waiting for completion)
No penetration testingEngage penetration testing firm; schedule and complete test; review and remediate findings20-40 hours (plus vendor timeline)
Backup testing not documentedPerform backup restoration test; document results including time to restore and data integrity verification4-8 hours

Step 6: Execute and Track Remediation

Execution Best Practices

  1. Assign clear ownership: Every gap must have a single named owner — not a team, not a department, but an individual person accountable for closure
  2. Set weekly check-ins: Hold a weekly fifteen-to-thirty-minute remediation standup to review progress, identify blockers, and adjust timelines
  3. Close quick wins first: Completing low-effort, high-severity items immediately builds momentum and reduces audit risk
  4. Document as you go: Capture evidence of remediation at the time it occurs — do not plan to "go back and document later"
  5. Test controls after implementation: Verify that remediated controls work as intended before marking them complete

Tracking Progress

Track remediation progress using your GRC platform's task management features or a dedicated tracking system. Key metrics to monitor:

MetricTarget
Critical gaps remainingZero before audit engagement
High gaps remainingZero before audit engagement
Medium gaps remainingLess than five before audit engagement
Total gaps closed100% of critical and high; 90%+ of all gaps
Average days to closeUnder fourteen days for critical; under thirty days for high

When to Engage Your Auditor

We recommend engaging your auditor after all critical and high-severity gaps are closed and at least eighty percent of medium-severity gaps are resolved. Engaging too early — while significant gaps remain — risks audit delays and higher fees as the auditor encounters evidence gaps during fieldwork.

For a fixed-deadline preparation plan, see the 90-day SOC 2 Type I preparation plan.

Using GRC Platforms for Gap Analysis

GRC platforms like Vanta, Drata, Secureframe, and Sprinto automate significant portions of the gap analysis process by connecting to your infrastructure and automatically assessing control status.

What Platforms Automate

Assessment AreaPlatform Automation
Cloud configurationScans AWS, Azure, GCP for encryption, access policies, logging, network security
Identity and accessChecks MFA enforcement, user roster, inactive accounts, admin access
Endpoint complianceVerifies disk encryption, OS updates, antivirus, screen lock via agent
Code repository securityChecks branch protection, code review requirements, secret scanning
Policy managementTracks policy creation, approval, distribution, and acknowledgment

What Still Requires Manual Assessment

Assessment AreaWhy Manual Review Is Needed
Risk assessment qualityPlatforms track completion but cannot evaluate whether the risk assessment is thorough
Vendor risk assessmentsPlatforms track vendor inventory but assessment quality depends on questionnaire depth
Incident response capabilityPlatforms cannot test whether your team can actually execute the incident response plan
Business continuity planningPlatforms track documentation but cannot evaluate DR testing adequacy
Policy accuracyPlatforms distribute policies but cannot verify that policy content reflects actual practices
Organizational cultureNo platform can assess whether security practices are consistently followed in daily operations

Key Takeaways

  • We consistently see that the gap analysis is the single highest-value activity in SOC 2 preparation — it takes one to three weeks and should be completed before engaging an auditor or selecting a GRC platform
  • What we recommend first: define scope (systems, criteria, organizational boundaries) before assessing any controls
  • Inventory existing controls through documentation review and stakeholder interviews — in our experience, most organizations have more controls in place than they realize
  • Map existing controls to Trust Service Criteria to identify where coverage is complete, partial, or missing
  • We recommend classifying gaps by severity (critical, high, medium, low) and prioritizing remediation using a severity-effort matrix
  • Critical and high-severity gaps must be fully resolved before audit engagement; we advise that medium gaps should be at least eighty percent resolved
  • The most common gaps we see are in access reviews, risk assessment documentation, vendor management, and business continuity planning
  • GRC platforms automate technical gap assessment but manual review is still required for process quality, policy accuracy, and organizational readiness
  • What we recommend for tracking: monitor remediation progress weekly with clear ownership, effort estimates, and target dates for each gap

Frequently Asked Questions

How long does a SOC 2 gap analysis take?

Based on what we see across our engagements, a thorough gap analysis typically takes one to three weeks depending on organizational complexity. For a startup with a simple cloud environment and fewer than fifty employees, one week is usually sufficient. For a growth-stage company with multiple products, complex infrastructure, and one hundred or more employees, we typically plan for two to three weeks. The timeline includes stakeholder interviews, technical assessment, documentation review, gap categorization, and remediation planning.

Can I do a gap analysis without a GRC platform?

What we tell clients is yes, but the process requires more manual effort. Without a platform, you assess cloud configurations, access management, and endpoint compliance through direct review of each system's settings and logs. A spreadsheet or project management tool can track gaps and remediation. In our experience, the manual approach takes approximately forty to sixty percent longer than a platform-assisted assessment because the platform automates the technical scanning that otherwise requires manual configuration review.

What are the most common critical gaps for first-time organizations?

Based on what we see in our first-time engagements, the most frequently identified critical gaps are: (1) MFA not enforced for all users, (2) no formal access review process, (3) no documented risk assessment, (4) no centralized logging or security monitoring, and (5) no incident response plan. These five gaps appear in the majority of first-time gap assessments we conduct and represent the highest-priority remediation items. Most can be resolved within two to four weeks with focused effort.

Should I hire a consultant for the gap analysis?

What we tell clients is that a consultant adds the most value for first-time organizations that lack SOC 2 experience. An experienced advisor identifies gaps that internal teams may overlook — particularly in areas like risk assessment methodology, evidence quality requirements, and auditor expectations. For organizations with an experienced compliance lead who has completed SOC 2 engagements before, a self-directed gap analysis using a GRC platform is typically sufficient.

How does a gap analysis differ from a readiness assessment?

What we tell clients is that the terms are often used interchangeably, but a readiness assessment is broader in scope. A gap analysis specifically identifies where controls do not meet SOC 2 requirements. A readiness assessment includes the gap analysis plus evaluation of evidence quality, policy completeness, organizational preparedness, and audit timeline feasibility. Think of the gap analysis as the diagnostic component of the readiness assessment.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.