Agency|Insights

SOC 2 Trust Service Criteria Explained: The Complete Guide

The Trust Service Criteria (TSC) are the standardized control framework defined by the AICPA that every SOC 2 audit evaluates against.

Agency Team
Agency Team
·14 min read
Explainer card for SOC 2 Trust Service Criteria Explained: The Complete Guide

At Agency, we guide companies through SOC 2 scoping and criteria selection every day. The Trust Service Criteria are where every engagement begins — and getting them right determines whether your SOC 2 report actually satisfies customer requirements or leaves gaps that cost you deals. Here is everything we tell our clients about the TSC framework.

The Trust Service Criteria (TSC) are the standardized control framework defined by the AICPA that every SOC 2 audit evaluates against. The framework includes five criteria categories: Security (also called Common Criteria, and mandatory for every SOC 2 engagement), Availability, Processing Integrity, Confidentiality, and Privacy. Security alone encompasses approximately sixty to seventy percent of all SOC 2 control requirements — covering access controls, change management, risk assessment, monitoring, incident response, and logical and physical security. The remaining four criteria are optional and selected based on customer requirements and the nature of your service. Most organizations include one to three additional criteria beyond Security, with Availability being the most commonly added criterion.

This guide provides a comprehensive overview of all five Trust Service Criteria, explains the structure and numbering system, summarizes what each criterion covers, identifies which organizations need which criteria, and provides guidance for criteria selection. The target audience is compliance professionals, security leaders, and executives who need to understand the TSC framework for scoping their SOC 2 engagement.

For SOC 2 compliance requirements, see the complete guide to SOC 2. For criteria-specific control implementations, see the SOC 2 compliance checklist.

The Trust Service Criteria Framework

Origin and Governance

The Trust Service Criteria are developed and maintained by the AICPA's Assurance Services Executive Committee (ASEC). The criteria were originally introduced as the Trust Services Principles and Criteria (TSPC) and have been updated through multiple revisions. The current version aligns with the 2017 COSO Internal Control Framework, which provides the foundational structure for the Common Criteria (Security).

The AICPA publishes the Trust Service Criteria in the TSP Section 100 document, which defines each criterion, its points of focus, and the relationship between criteria. Licensed CPA firms use these criteria as the evaluation benchmark during SOC 2 attestation engagements.

Framework Structure

LevelDescriptionExample
Criteria categoryOne of five high-level categoriesSecurity, Availability
Common Criteria seriesNumbered series within Security (CC1-CC9)CC6 — Logical and Physical Access Controls
Individual criterionSpecific requirement within a seriesCC6.1 — The entity implements logical access security software, infrastructure, and architectures
Points of focusDetailed guidance for each criterionAuthentication mechanisms, access authorization, encryption

The Five Categories at a Glance

CriterionMandatory?What It CoversWho Needs It
Security (Common Criteria)Yes — requiredAccess controls, change management, risk assessment, monitoring, incident response, logical and physical securityEvery organization undergoing SOC 2
AvailabilityOptionalUptime commitments, capacity management, disaster recovery, backup, redundancyOrganizations whose customers depend on service uptime
Processing IntegrityOptionalData processing accuracy, completeness, validity, timelinessOrganizations processing customer data where accuracy matters (financial, clinical, analytical)
ConfidentialityOptionalData classification, confidential information handling, access restrictions, encryptionOrganizations handling confidential business information
PrivacyOptionalPersonal information lifecycle — notice, consent, collection, use, disclosure, access, qualityOrganizations processing personal information subject to privacy commitments

Security (Common Criteria): CC1 through CC9

Security is the foundation of every SOC 2 engagement. The Common Criteria are organized into nine series that align with the COSO Internal Control Framework:

CC1: Control Environment

What it covers: The organizational foundation for effective controls — governance, oversight, management commitment, and personnel competence.

Key RequirementsEvidence
Board or management oversight of securityGovernance meeting minutes, security committee charter
Organizational structure with defined rolesOrganizational chart, role descriptions
Commitment to competenceJob descriptions, hiring criteria, performance evaluations
Accountability for control responsibilitiesControl ownership documentation, compliance program charter

CC1 establishes that the organization takes security seriously at the leadership level and has the structure to support effective controls.

CC2: Communication and Information

What it covers: How the organization communicates security expectations internally and externally.

Key RequirementsEvidence
Internal communication of policies and expectationsPolicy distribution records, acknowledgment tracking
External communication of commitmentsCustomer agreements, SLA documentation, Trust Center
System description documentationWritten system description covering services, infrastructure, and boundaries
Information quality requirementsData quality procedures, reporting standards

CC3: Risk Assessment

What it covers: How the organization identifies, evaluates, and manages risks.

Key RequirementsEvidence
Formal risk assessmentDocumented risk assessment with identified risks, likelihood, impact, and treatment
Risk registerMaintained register of identified risks with owners and mitigation plans
Change-driven risk evaluationEvidence that significant changes trigger risk reassessment
Fraud risk considerationAssessment of potential fraudulent activities and preventive controls

CC3 is one of the most common areas for first-time findings — in our experience, organizations frequently lack a formal, documented risk assessment.

CC4: Monitoring Activities

What it covers: How the organization monitors the effectiveness of its controls on an ongoing basis.

Key RequirementsEvidence
Ongoing monitoringContinuous control monitoring (typically through GRC platform)
Separate evaluationsPeriodic assessments of control effectiveness
Exception managementProcess for identifying, tracking, and remediating control failures
Reporting to managementRegular compliance status reporting to leadership

CC5: Control Activities

What it covers: The specific actions and policies the organization implements to mitigate identified risks.

Key RequirementsEvidence
Selection and development of control activitiesDocumented controls mapped to identified risks
Technology controlsLogical access controls, authentication mechanisms, data protection measures
Policy implementationWritten policies implemented and enforced
Segregation of dutiesAppropriate separation of responsibilities to prevent unauthorized actions

CC6: Logical and Physical Access Controls

What it covers: How the organization manages access to systems, data, and physical facilities. This is the highest-frequency area for audit findings.

Key RequirementsEvidence
Access provisioningDocumented provisioning process; role-based access control
AuthenticationMulti-factor authentication, password requirements, SSO configuration
Access reviewPeriodic review of user access privileges (typically quarterly)
Access deprovisioningTimely removal of access upon termination or role change
Physical access (if applicable)Facility access controls, visitor management, environmental monitoring
Data protectionEncryption at rest and in transit, key management

CC6 produces the most audit findings of any criteria series. Access deprovisioning, access reviews, and MFA enforcement are the three most common individual findings across all SOC 2 audits.

CC7: System Operations

What it covers: How the organization operates, monitors, and maintains its systems.

Key RequirementsEvidence
Detection and monitoringSecurity event logging, alerting, anomaly detection
Incident managementIncident response plan, incident tracking, post-incident review
Change detectionConfiguration change monitoring, integrity monitoring
Backup and recoveryBackup procedures, recovery testing, data restoration capability

CC8: Change Management

What it covers: How the organization manages changes to systems and infrastructure.

Key RequirementsEvidence
Change authorizationDocumented approval process for changes
Change testingTesting before deployment; staging environment usage
Code reviewPeer review of code changes before production deployment
Deployment controlsControlled deployment procedures with rollback capability
Emergency changesDocumented emergency change procedures with post-implementation review

CC9: Risk Mitigation

What it covers: How the organization addresses broader risk management activities including vendor management and business continuity.

Key RequirementsEvidence
Vendor managementVendor inventory, risk assessments, contractual security requirements
Business continuity planningBCP documentation, testing records
InsuranceAppropriate insurance coverage (cyber liability, E&O)
Risk acceptanceDocumented risk acceptance decisions with management approval

Availability

What It Covers

The Availability criterion evaluates whether the system is available for operation and use as committed or agreed upon. In our experience, for organizations whose customers depend on service uptime — infrastructure providers, SaaS platforms supporting business-critical workflows, healthcare systems — Availability is effectively mandatory even though it is technically optional.

Key Requirements

RequirementEvidence
Performance and capacity commitmentsDocumented SLA with uptime targets
Capacity monitoring and planningResource utilization dashboards, growth projections
Redundancy and failoverArchitecture documentation showing redundancy mechanisms
Backup proceduresBackup configuration, scheduling, and verification
Recovery proceduresDocumented RTO and RPO, disaster recovery plan
Recovery testingDR test results with measured recovery times
Incident communicationCustomer notification procedures for availability events

Who Needs Availability

  • Cloud infrastructure providers (customers depend on infrastructure uptime)
  • Healthcare software companies (clinical systems support active patient care)
  • Financial services platforms (transaction processing requires high availability)
  • Any SaaS platform where enterprise customers have uptime SLA requirements
  • Communication and collaboration platforms
  • E-commerce and payment processing platforms

Processing Integrity

What It Covers

Processing Integrity evaluates whether system processing is complete, valid, accurate, timely, and authorized. This criterion is relevant when your service processes customer data and the accuracy of that processing matters for business decisions, regulatory compliance, or operational outcomes.

Key Requirements

RequirementEvidence
Processing accuracyData validation controls, error handling procedures
Processing completenessReconciliation procedures, completeness checks
Processing timelinessSLA commitments for processing speed, performance monitoring
Input validationControls ensuring data input is valid before processing
Output validationControls verifying processing output accuracy
Error handlingProcedures for identifying, logging, and resolving processing errors

Who Needs Processing Integrity

  • Financial data processing platforms (calculations must be accurate)
  • Healthcare software (clinical data accuracy affects patient safety)
  • Payment processing companies (transaction accuracy is critical)
  • Data analytics platforms (analysis outputs must accurately reflect inputs)
  • Accounting and billing software (financial calculations must be precise)

Confidentiality

What It Covers

Confidentiality evaluates whether information designated as confidential is protected as committed or agreed upon. This applies to any information the organization classifies as confidential — customer business data, proprietary information, trade secrets, or contractual confidential information.

Key Requirements

RequirementEvidence
Data classificationDocumented classification scheme (public, internal, confidential, restricted)
Confidential data identificationProcess for identifying and labeling confidential information
Access restrictionsAccess controls limiting confidential data access to authorized personnel
EncryptionEncryption of confidential data at rest and in transit
Disposal proceduresSecure disposal of confidential data when no longer needed
Confidentiality agreementsNDAs and confidentiality clauses in employment and vendor contracts

Who Needs Confidentiality

  • Organizations handling customer business data in multi-tenant environments
  • Professional services platforms (legal, consulting, financial advisory)
  • Data processing companies handling proprietary business information
  • Any organization with contractual confidentiality obligations

Privacy

What It Covers

Privacy evaluates whether personal information is collected, used, retained, disclosed, and disposed of in conformity with the organization's privacy commitments and applicable regulations. Privacy is the most specialized criterion and is primarily relevant when the organization processes personal information subject to privacy regulations or commitments.

Key Requirements

RequirementEvidence
NoticePrivacy notice explaining data collection and use practices
Choice and consentMechanisms for obtaining consent; opt-out capabilities
CollectionControls limiting data collection to stated purposes
Use, retention, and disposalData lifecycle management aligned with stated retention periods
AccessMechanisms for individuals to access their personal data
DisclosureControls governing third-party data sharing
QualityData accuracy and completeness maintenance
Monitoring and enforcementPrivacy program monitoring and compliance enforcement

Who Needs Privacy

  • Consumer-facing applications processing personal data (particularly in regulated industries)
  • Healthcare platforms processing patient personal information alongside PHI
  • EdTech companies handling student personal information under FERPA and COPPA
  • HR technology platforms processing employee personal data
  • Organizations subject to GDPR, CCPA, or other privacy regulations that want SOC 2 privacy coverage aligned with regulatory requirements

Note that Privacy is the least commonly included criterion — most organizations address privacy through regulatory compliance (GDPR, CCPA) and contractual commitments rather than including it in their SOC 2 scope.

Criteria Selection Decision Framework

Selection by Service Type

Service TypeRecommended Criteria
B2B SaaS (general)Security + Availability
Cloud infrastructureSecurity + Availability + Processing Integrity + Confidentiality
Healthcare softwareSecurity + Availability + Processing Integrity + Confidentiality + Privacy
Financial servicesSecurity + Availability + Processing Integrity
Data analyticsSecurity + Processing Integrity + Confidentiality
EdTechSecurity + Availability + Confidentiality + Privacy
Developer toolsSecurity
Communication platformsSecurity + Availability

Selection Considerations

FactorGuidance
Customer requirementsStart with what your customers explicitly request; add criteria as requirements emerge
First-time vs renewalWe recommend starting with Security only for a first audit; add criteria in subsequent cycles based on customer feedback
Cost impactEach additional criterion increases auditor fees by approximately five to fifteen percent
Control readinessOnly include criteria for which you can demonstrate control effectiveness; including a criterion with significant gaps risks exceptions
Industry expectationsSome industries expect specific criteria regardless of individual customer requests

Key Takeaways

  • We consistently see the Trust Service Criteria as the single most important scoping decision in a SOC 2 engagement. The five categories are Security (mandatory), Availability, Processing Integrity, Confidentiality, and Privacy (all optional).
  • What we emphasize to every client: Security (Common Criteria CC1-CC9) covers sixty to seventy percent of all SOC 2 control requirements and is the foundation of every engagement.
  • We consistently see CC6 (Logical and Physical Access Controls) produce the most audit findings of any criteria series — we recommend making access management your highest-priority control area.
  • What we recommend for most B2B SaaS companies: start with Security plus Availability. Processing Integrity and Confidentiality are the next most commonly added criteria.
  • Based on what we see across engagements, Privacy is the least commonly included criterion — most organizations address privacy through regulatory compliance rather than SOC 2.
  • Each additional criterion increases audit scope and cost by five to fifteen percent, so we advise being intentional about criteria selection.
  • What we tell first-time clients: start with Security only unless customers specifically require additional criteria, then expand in subsequent audit cycles.
  • The criteria align with the COSO Internal Control Framework, providing a standardized evaluation structure recognized across audit and compliance disciplines.

Frequently Asked Questions

Can I add criteria to my SOC 2 report after the first audit?

What we tell clients is: absolutely. Many of the organizations we work with start with Security only and add Availability, Processing Integrity, or other criteria in subsequent audit cycles. Adding criteria requires implementing additional controls and expanding the audit scope, but the existing SOC 2 infrastructure — your GRC platform, policies, and evidence collection processes — carries forward. Based on what we see, most auditors accommodate scope expansion between audit cycles with modest fee increases.

How do I know which criteria my customers need?

What we recommend is asking directly during sales conversations and procurement questionnaire responses. Many enterprise buyers specify which Trust Service Criteria they require in their vendor evaluation criteria. Based on what we see across our client base, if customers do not specify, Security plus Availability covers the needs of most enterprise SaaS buyers. We also advise reviewing customer procurement questionnaires and security assessment requests for specific criteria references.

What is the relationship between Common Criteria and the other four criteria?

What we tell clients is that the Common Criteria (Security) provide the foundational controls that support all five criteria. When you add Availability, Processing Integrity, Confidentiality, or Privacy, you add supplemental criteria that build on the Common Criteria foundation. The Common Criteria controls — access management, change management, monitoring, and so on — remain the same regardless of which additional criteria are included. The supplemental criteria add requirements specific to their focus area.

Is Security alone sufficient for a SOC 2 report?

Based on what we see, for many organizations Security alone provides sufficient coverage for customer requirements. Approximately forty to fifty percent of SOC 2 reports include only Security. However, certain industries and service types require additional criteria — infrastructure providers need Availability, financial data processors need Processing Integrity, and healthcare companies typically need both plus Confidentiality. What we tell first-time clients is: if your customers have not specifically requested additional criteria, starting with Security alone is a valid approach for a first engagement.

How do the Trust Service Criteria relate to other frameworks like ISO 27001?

What we tell clients pursuing multiple frameworks is that the Trust Service Criteria share significant conceptual overlap with ISO 27001 Annex A controls. Both frameworks address access management, change management, risk assessment, monitoring, and incident response. The key difference is structure: SOC 2 uses the TSC as evaluation criteria for an attestation report, while ISO 27001 uses Annex A controls as requirements for an ISMS certification. In our experience, organizations pursuing both frameworks can leverage significant control overlap — implementing a control for one framework often satisfies the corresponding requirement in the other.


Whether you are scoping your first SOC 2 engagement or expanding criteria in a renewal cycle, getting the Trust Service Criteria right is foundational to a report that satisfies your customers. Our team at Agency has guided hundreds of companies through criteria selection, control implementation, and audit readiness. If you want advisory support tailored to your service type and customer base, reach out to us — we are happy to help you build a SOC 2 scope that works.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.