Agency|Insights

SOC 2 Report Explained: What It Contains and How to Read It

At Agency, we review dozens of SOC 2 reports each year — both helping our clients prepare to receive their own reports and advising procurement teams on how to evaluate vendor reports.

Agency Team
Agency Team
·14 min read
Explainer card for SOC 2 Report Explained: What It Contains and How to Read It

At Agency, we review dozens of SOC 2 reports each year — both helping our clients prepare to receive their own reports and advising procurement teams on how to evaluate vendor reports. The most common question we hear from both sides is: what should I actually be looking at in this document? A SOC 2 report is the deliverable produced by a licensed CPA firm at the conclusion of a SOC 2 attestation engagement. The report contains five major sections: the independent auditor's opinion, management's assertion, the system description, the description of criteria and related controls, and (for Type II reports) the results of testing. Understanding how to read each section is essential for two audiences — security reviewers and procurement teams evaluating vendor SOC 2 reports, and organizations preparing to receive their own report for the first time. The auditor's opinion is the single most important element — it tells you whether the controls met the Trust Service Criteria — but the details in the system description, control descriptions, and test results provide the context needed to make an informed risk decision.

This guide walks through each section of a SOC 2 report, explains what to look for, how to interpret the auditor's opinion, what exceptions and findings mean, and how to evaluate whether a report demonstrates adequate controls for your vendor risk management program.

SOC 2 Report Structure

The Five Sections

Every SOC 2 report follows a standardized structure defined by AICPA attestation standards:

SectionWhat It ContainsWho Writes It
Section 1: Independent Auditor's ReportThe auditor's opinion on whether controls meet the Trust Service CriteriaThe CPA firm (auditor)
Section 2: Management's AssertionManagement's statement that the system description is fairly presented and controls are suitably designed (and operating effectively for Type II)The service organization's management
Section 3: System DescriptionDetailed description of the service, infrastructure, software, people, procedures, and dataThe service organization (reviewed by auditor)
Section 4: Description of Criteria, Controls, Tests, and ResultsTrust Service Criteria mapped to specific controls; for Type II, includes test procedures and resultsControls described by management; tests and results by auditor
Section 5: Other InformationOptional section for additional context provided by managementThe service organization

Type I vs Type II Report Differences

ElementType I ReportType II Report
Opinion scopeControls are suitably designed at a point in timeControls are suitably designed and operating effectively over a period
Test resultsNo testing of operating effectivenessDetailed testing procedures and results for each control
Observation periodSingle date (e.g., December 31, 2025)Date range (e.g., January 1, 2025 through December 31, 2025)
Typical length40-80 pages80-200+ pages
Enterprise buyer acceptanceLimited — many buyers require Type IIBroadly accepted by enterprise procurement

Section 1: Independent Auditor's Report (The Opinion)

What It Contains

The auditor's report is the most critical section — it contains the CPA firm's professional opinion on whether the service organization's controls met the applicable Trust Service Criteria. The opinion letter typically includes:

  • The scope of the engagement (which Trust Service Criteria were evaluated)
  • The period covered (Type II) or date evaluated (Type I)
  • The auditor's responsibilities and the standards used
  • The opinion itself — unqualified, qualified, adverse, or disclaimer

The Four Opinion Types

OpinionWhat It MeansHow to Interpret
Unqualified (clean)Controls are suitably designed and operating effectively; no material exceptionsThe report meets the standard — proceed with vendor evaluation based on the details
QualifiedMaterial exceptions exist in specific areas, but the overall control environment is effectiveReview the specific qualifications carefully; evaluate whether the exceptions affect controls relevant to your data
AdverseSignificant and pervasive control deficiencies; controls do not meet the Trust Service CriteriaThe report indicates fundamental control failures — significant concern for vendor risk
DisclaimerThe auditor was unable to obtain sufficient evidence to form an opinionThe auditor could not complete the assessment — treat as a red flag

An unqualified opinion does not mean the report has zero findings. What we always explain to clients is that it means any exceptions identified were not material enough, individually or collectively, to prevent the auditor from expressing a clean opinion. Minor exceptions are common and expected, even in unqualified reports.

What to Look For

  • Confirm the opinion is unqualified — this is the baseline expectation for enterprise procurement
  • Check the Trust Service Criteria covered — does the report include the criteria relevant to your requirements (Security, Availability, Confidentiality, etc.)?
  • Verify the observation period — for Type II, the period should be recent (ending within the last twelve months) and sufficiently long (six to twelve months preferred)
  • Note the CPA firm — is it a recognized SOC 2 audit firm? Specialized firms (Schellman, A-LIGN, KirkpatrickPrice, BARR Advisory, Coalfire, Linford & Company) and regional CPA firms with SOC 2 practices produce credible reports

Section 2: Management's Assertion

What It Contains

Management's assertion is a formal statement from the service organization's leadership asserting that:

  • The system description is fairly presented
  • Controls are suitably designed to meet the applicable Trust Service Criteria (Type I and Type II)
  • Controls operated effectively throughout the specified period (Type II only)

What to Look For

  • Signed by management — typically the CEO, CTO, or VP of Engineering
  • Consistent with the auditor's opinion — the assertion should align with the scope and period of the auditor's report
  • No disclaimers or limitations — management should assert without significant caveats

Management's assertion is analogous to a company's representation letter in a financial audit — it establishes management's accountability for the accuracy of the information in the report.

Section 3: System Description

What It Contains

The system description is the longest section and provides detailed context about the service organization's environment. Key components include:

ComponentWhat It DescribesWhy It Matters
Services providedThe specific services covered by the SOC 2 reportConfirms the report covers the services you use
System boundariesThe infrastructure, software, people, procedures, and data within scopeDefines what was evaluated and what was excluded
InfrastructureCloud providers, data centers, network architectureConfirms appropriate infrastructure for your data
SoftwareApplications, databases, operating systems used to deliver the serviceIdentifies the technology stack and potential risk areas
PeopleOrganizational structure, roles, and responsibilitiesShows who is responsible for security and compliance
ProceduresKey operational procedures (change management, incident response, backup)Describes how the organization operates day-to-day
DataTypes of data processed, data flows, data storageConfirms whether your data types are in scope
Complementary User Entity Controls (CUECs)Controls the customer must implement for the overall control environment to be effectiveIdentifies your responsibilities as a customer
Complementary Subservice Organization Controls (CSOCs)Controls performed by subservice organizations (cloud providers, data processors)Identifies dependencies on third parties

What to Look For

  • Service coverage — does the system description cover the specific service or product you use? Some organizations have multiple products but only include certain services in their SOC 2 scope
  • Infrastructure alignment — is data stored in regions and on infrastructure appropriate for your requirements?
  • CUECs — what controls are you expected to implement? Common CUECs include MFA configuration, access management for your users, and data encryption settings. If you do not implement the CUECs, there may be gaps in the overall control environment
  • Subservice organizations — who are the critical dependencies? If the organization relies on AWS, GCP, or other subservice organizations, those organizations should have their own SOC 2 reports (carve-out method) or be included in the service organization's scope (inclusive method)
  • Carve-out vs inclusive method — if subservice organizations are carved out, their controls are not tested in this report; you may need to review the subservice organization's own SOC 2 report separately

Section 4: Criteria, Controls, Tests, and Results

What It Contains

This section maps the applicable Trust Service Criteria to the service organization's specific controls and (for Type II) includes the auditor's test procedures and results:

ElementDescription
Trust Service CriteriaThe specific criterion being evaluated (e.g., CC6.1 — logical access security)
Control descriptionHow the organization addresses the criterion (e.g., "MFA is required for all production system access")
Test procedure (Type II only)What the auditor did to test the control (e.g., "Inspected MFA configuration for all in-scope systems")
Test result (Type II only)Whether the control operated effectively or whether exceptions were identified

Understanding Exceptions

Exceptions are findings where a control did not operate as designed during the observation period. Exceptions are documented in the report regardless of their severity.

Exception SeverityWhat It MeansHow to Evaluate
Minor / isolatedA single instance where a control did not operate as designed (e.g., one employee's access was deprovisioned two days late)Low concern — isolated instances are common; check whether the issue was remediated
PatternMultiple instances of the same control failure (e.g., five of twenty-five sampled terminations had deprovisioning delays)Medium concern — indicates a systemic weakness in the control; evaluate whether the pattern affects your data
PervasiveControl failures across a significant portion of the observation period or across multiple control areasHigh concern — may indicate fundamental program weaknesses; evaluate carefully

What to Look For

  • Exception count and severity — how many exceptions were identified? Are they isolated or patterns?
  • Exception areas — which control domains had exceptions? Access management exceptions are more concerning than documentation gaps
  • Remediation — did the organization remediate the exceptions? Some reports note corrective actions taken during the observation period
  • Controls relevant to your data — focus your review on controls that protect the data you entrust to the vendor (access controls, encryption, monitoring, incident response)

Section 5: Other Information

What It Contains

This optional section includes additional context that management wants to provide but is not part of the auditor's evaluation. Common content includes:

  • Remediation plans for identified exceptions
  • Future control improvements planned
  • Additional certifications or compliance efforts (ISO 27001, HIPAA, etc.)
  • Business context about the organization

Important Distinction

The auditor's opinion does not cover Section 5. Information in this section is management's representation only — not independently verified. We always advise clients to treat it as supplementary context, not audited evidence.

How to Evaluate a Vendor's SOC 2 Report

Evaluation Checklist

Evaluation StepWhat to CheckRed Flag
1. Verify the opinionIs the opinion unqualified?Qualified, adverse, or disclaimer opinion
2. Check the periodIs the report current (ending within the last twelve months)?Report period ended more than twelve months ago
3. Verify criteriaDoes the report include the Trust Service Criteria you require?Missing criteria that are relevant to your use case
4. Review system descriptionDoes the report cover the service you use?The specific service or product you use is not in scope
5. Review CUECsWhat controls are you responsible for implementing?Extensive CUECs that shift significant control responsibility to you
6. Review exceptionsAre exceptions minor and isolated, or systemic and concerning?Multiple exceptions in access management or data protection
7. Check subservice organizationsAre critical dependencies (cloud providers) addressed through carve-out or inclusive method?Critical subservice organizations not addressed at all
8. Assess relevanceDo the controls described actually protect your data in the way you need?Controls are generic and do not address your specific data handling requirements

Common Evaluation Mistakes

MistakeWhy It Is a Problem
Only checking the opinion without reading the detailsAn unqualified opinion can coexist with exceptions in areas relevant to your data
Accepting a Type I report when you need Type IIType I only assesses design, not operating effectiveness
Not reviewing CUECsYou may have control responsibilities you are not fulfilling
Ignoring the observation period datesA report from two years ago does not reflect the current control environment
Treating SOC 2 as a binary pass/failSOC 2 is nuanced — the details matter more than the opinion alone
Not checking whether your specific service is in scopeOrganizations with multiple products may only include certain services

Complementary User Entity Controls (CUECs)

CUECs deserve special attention because they define your responsibilities as a customer of the service organization.

Common CUECs

CUECYour Responsibility
Implement MFA for user accountsEnable and enforce MFA for all users accessing the vendor's platform
Manage user access appropriatelyProvision and deprovision user access according to your own access management policies
Protect authentication credentialsEnsure API keys, passwords, and tokens are securely managed
Monitor your usageReview access logs and activity within the vendor's platform
Maintain your own security controlsImplement security controls for systems and data under your control that interact with the vendor
Report security incidentsNotify the vendor of any security incidents that may affect the shared environment

If you do not implement CUECs, there is a gap in the overall control environment — even if the vendor's controls are operating effectively. We always advise our clients that their SOC 2 report review should include an assessment of whether their organization is fulfilling the specified CUECs.

Key Takeaways

  • A SOC 2 report contains five sections: auditor's opinion, management's assertion, system description, criteria/controls/tests/results, and other information
  • The auditor's opinion is the most important element — an unqualified (clean) opinion means controls met the Trust Service Criteria
  • What we consistently emphasize to clients is that an unqualified opinion does not mean zero exceptions — minor exceptions are common and do not prevent a clean opinion
  • The system description defines what is in scope — we always advise verifying that the specific service you use is covered
  • Complementary User Entity Controls (CUECs) define your responsibilities as a customer — failing to implement CUECs creates control gaps
  • For Type II reports, we recommend focusing your review on the test results section for exceptions — especially exceptions in access management, data protection, and areas relevant to your data
  • The report should be current (ending within the last twelve months) and the observation period should be at least six months for Type II
  • Subservice organizations (cloud providers, processors) should be addressed through the carve-out or inclusive method — verify that critical dependencies have their own SOC 2 coverage
  • Section 5 (Other Information) is not covered by the auditor's opinion — treat it as supplementary context, not audited evidence
  • We help our clients understand that SOC 2 reports are not pass/fail — the details in the system description, control descriptions, and test results provide the context needed for informed vendor risk decisions

Frequently Asked Questions

How long is a typical SOC 2 report?

What we tell clients to expect is that SOC 2 Type I reports are typically forty to eighty pages. SOC 2 Type II reports are typically eighty to two hundred or more pages, depending on the number of Trust Service Criteria included and the complexity of the service organization. The additional length in Type II reports comes from the test procedures and results for each control. Reports covering multiple Trust Service Criteria (Security, Availability, Confidentiality, Privacy) are longer than reports covering Security alone.

Can I share a vendor's SOC 2 report with my auditor?

The guidance we give here is straightforward: SOC 2 reports are restricted-use documents, meaning they can be shared with management of the service organization, user entities (customers), and user entities' auditors. You can share a vendor's SOC 2 report with your own auditor as part of your vendor risk assessment and compliance program. You should not post the report publicly or share it with parties outside the intended audience without the vendor's permission.

What if a vendor refuses to share their SOC 2 report?

Based on what we see in our client engagements, if a vendor has a SOC 2 report but will not share it, ask whether they can share it under an NDA. Some vendors share reports only with existing customers or advanced-stage prospects. If the vendor does not have a SOC 2 report at all, request alternative evidence — security questionnaire responses, penetration test summaries, or ISO 27001 certification. The absence of a SOC 2 report is not disqualifying, but it means you will need to evaluate their security through other means.

How often should I request updated SOC 2 reports from vendors?

Our recommendation is to request updated reports annually. SOC 2 Type II reports are typically issued once per year, covering a twelve-month observation period. When a vendor issues a new report, review it for any changes — new exceptions, scope changes, or modifications to the system description. We also advise some of our clients to conduct interim vendor reviews between annual report cycles, particularly for critical vendors.

What is the difference between an exception and a qualified opinion?

What we explain to clients is that an exception is a specific finding where a control did not operate as designed. Exceptions are documented in every report where they occur, regardless of severity. A qualified opinion occurs when exceptions are material enough — individually or collectively — that the auditor cannot issue an unqualified opinion. An organization can receive an unqualified opinion with multiple minor exceptions. Qualifications are reserved for material and pervasive control failures that affect the overall control environment.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.