Audit requirements, steps involved and associated timelines are steps that go hand in hand. We often hear claims in the market that it will take you (insert unrealistic expectation) to achieve SOC 2. This article will provide a realistic overview of how the audit process works in practice.
As an illustrative example, we spent 80 hours on our own initial SOC 2 process for our audit management platform, Pillar. That’s not including time spent on related activities that weren’t performed specifically for compliance, e.g., implementing our infrastructure security and employee performance review process. That 80 hours could theoretically be done in a week or two, but there are practical reasons why that’s often not realistic:
We spent 80 hours over 3 months, after some initial planning and “starting” it 3 months earlier. The median timeframe we see for our clients is 3 months, ranging from 3 weeks to 18 months.
Sure you can do it in a week if you don’t sleep, make it the top priority, and forgo the opportunity to get real benefits from it, but we don’t recommend that!
The practical steps to SOC 2 attestation
The below steps were traditionally carried out sequentially during the audit process. In modern compliance, they’re often tackled in parallel.
That’s the purpose of our agile, collaborative audit process, which gives timely feedback, end-to-end guidance, and a clear view of progress for all stakeholders. The key steps involved are:
There's more work required initially to achieve compliance, which then becomes much easier to maintain over time. That is why we advise our clients to invest the necessary time up front - the more work done to ensure the initial audit is successful, the less maintenance work that will be required during subsequent periods. As the saying goes, A good start is half the battle!
The activities required during a SOC 2 attestation process can vary greatly. That’s a good thing; although it can make it harder to understand compliance and what’s required, it means you can do things in a way that makes sense for your company. This is where some companies opt for the generic strategy to compliance - to keep it simple and take out the guesswork. Compliance activities include the following types:
Systematic controls (10-35%)
Systematically configured functions are tested with automation or screenshots. These include:
Policies, procedures and plans (20-35%)
Documented responsibilities, business requirements and the design of processes and plans that support your compliance requirements.
Event-driven activities (15-30%)
When events occur, they are managed in accordance with defined policies, procedures and plans. For example, when new joiners are onboarded, conducting background checks, employment contracts, and security awareness training. This also includes when incidents occur, changes are released, vulnerabilities are identified, and assets are disposed of, to ensure they are managed effectively.
Periodic meetings and reviews (20-30%)
Board and management meetings, risk assessments and vendor governance reviews are conducted periodically (quarterly, annually) to maintain oversight of the organisation. There are also penetration tests, business continuity and disaster recovery exercises, and other periodic tests to check whether compliance activities are effective.
Other ad-hoc items (~10%)
This category is here for completeness. There are a few things that may not fall into the above, like having a documented architecture diagram, customer contracts or terms of service, and cyber insurance.
Interested in discussing the next steps?
A key step to achieving compliance is having the right audit partner. Get in touch with us below to discuss how we can help you on this journey.