Compliance Deep Dive

SOC 2 Vendor Assessment Guide

SOC 2 (System and Organization Controls 2) is the most widely requested vendor assurance report in the technology industry. Developed by the AICPA, SOC 2 evaluates a service organization's controls across five Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Understanding how to properly evaluate a vendor's SOC 2 report — and when a SOC 2 alone is insufficient — is essential for any TPRM program.

SOC 2 Type I vs. Type II

SOC 2 Type I evaluates whether controls are suitably designed at a specific point in time. It answers: "Does the vendor have appropriate controls in place?"

SOC 2 Type II evaluates whether controls operated effectively over a period of time, typically 6-12 months. It answers: "Did the controls actually work consistently?"

Type II is significantly more valuable for vendor assessment because it demonstrates sustained operational effectiveness, not just the existence of controls. When evaluating vendors, always request Type II. A vendor offering only Type I may be early in their compliance journey or may have operational gaps they haven't resolved.

Trust Service Criteria explained

Security (Common Criteria) — Required for all SOC 2 reports. Covers access controls, system monitoring, incident response, risk management, and change management. This is the baseline.

Availability — Addresses system uptime, disaster recovery, and business continuity. Critical for infrastructure and SaaS vendors where downtime impacts your operations.

Processing Integrity — Ensures data is processed completely, accurately, and in a timely manner. Important for payment processors, data pipelines, and analytics vendors.

Confidentiality — Protects confidential information through encryption, access restrictions, and data classification. Essential for vendors handling trade secrets, financial data, or strategic information.

Privacy — Governs collection, use, retention, and disposal of personal information per the entity's privacy notice. Critical for vendors processing customer PII.

How to review a SOC 2 report

When reviewing a vendor's SOC 2 report, focus on these areas:

Report date and period — Is the report current? A SOC 2 older than 12 months has limited value. Check the period covered and whether there is a gap between the report period end and today.

Scope and boundaries — Which systems and services are covered? Vendors may scope their SOC 2 narrowly to exclude the specific service you use.

Trust criteria included — Does the report cover criteria relevant to your use case? Security-only reports may be insufficient if you need availability or privacy assurance.

Exceptions and qualifications — Read the auditor's opinion. Any qualified opinion or noted exceptions require investigation. Ask the vendor how they remediated exceptions.

Complementary user entity controls (CUECs) — These are controls that the vendor expects you to implement. Failure to implement CUECs weakens the overall control environment.

Subservice organizations — Does the vendor rely on subprocessors? If so, are those subprocessors included in the SOC 2 scope or carved out?

When SOC 2 is not enough

A SOC 2 report has important limitations. It does not cover: sanctions risk, adverse media, financial stability, business legitimacy verification, domain security posture, network exposure, or subprocessor supply chain risk. A vendor with a clean SOC 2 can still be on sanctions lists, have open critical vulnerabilities, be involved in active litigation, or rely on subprocessors with poor security.

Comprehensive vendor assessment requires SOC 2 as one input among many. Independent investigation across sanctions databases, cyber risk indicators, regulatory filings, and public records provides the full picture that a SOC 2 alone cannot. For example, ThirdProof's investigation of Stripe covers SOC 2 certificate verification alongside sanctions screening, cyber risk scoring, and additional intelligence sources — all in a single automated assessment. The same applies to marketing platforms like HubSpot — where HubSpot SOC 2 compliance status should be verified alongside cyber risk and adverse media checks — and productivity suites like Google Workspace, where Google Workspace SOC 2 status matters for organizations processing sensitive data. For vendors in regulated industries, you should also consider FedRAMP authorization status and sanctions screening requirements.

Real investigation walkthrough: Stripe under CC9.2

To illustrate how autonomous investigation supports CC9.2 evidence, here is what ThirdProof found when investigating Stripe.

ThirdProof queried 22 intelligence sources in parallel and returned a Tier 4 — Low Risk rating at 98% confidence in under under 2 minutes. Key findings: sanctions screening cleared 5 potential matches against OFAC, EU, and UN lists — none confirmed. Domain reputation was clean across 93 security engines. SSL/TLS configuration scored A+. HTTP security headers scored A+ (105/100). Infrastructure exposure showed only 2 open ports with zero known CVEs. Three compliance certifications — SOC 2, SOC 1, and GDPR — were identified on Stripe's trust page and classified as vendor-attested (not independently verifiable through a public registry).

The recommended actions mapped directly to CC9.2 evidence requirements: obtain Stripe's PCI-DSS Level 1 Attestation of Compliance for the TPSP file, request the SOC 2 Type II report to convert the vendor-attested claim to independently verified, and execute a Data Processing Agreement under GDPR Article 28. Each action includes a specific timeline and compliance citation — exactly what your auditor needs to see in the vendor assessment file.

What your auditor actually reviews in CC9.2

During SOC 2 fieldwork, your auditor will request evidence for CC9.2 (Risk Assessment of Third Parties). Here is what they expect to find in your evidence binder, and what they will test.

Risk register entry. Every vendor with data access should appear in your risk register with a risk tier, data classification, last assessment date, and next reassessment date. The auditor will sample 5-15 vendors and ask for the assessment file for each.

Assessment methodology documentation. A written policy describing how you evaluate vendors — what sources you check, how you assign risk tiers, and what thresholds trigger escalation. Deterministic, rule-based scoring is easier to defend than subjective analyst judgment.

Individual vendor assessment file. For each sampled vendor: the investigation report (PDF with source citations and SHA-256 hash), a list of findings with severity ratings, and documented recommended actions. ThirdProof's reports include all of these elements in a single audit-ready PDF.

Reviewer sign-off. Evidence that a human reviewed each assessment and documented their risk acceptance decision. ThirdProof's Review Certification page captures the reviewer's name, date, and decision — approve, approve with conditions, or reject.

Reassessment cadence. Documentation showing vendors are reassessed on a schedule proportional to their risk tier. Critical vendors annually, standard vendors every 18-24 months. The auditor will check whether reassessments actually happened on schedule.

Complementary User Entity Controls (CUECs)

CUECs are controls that a vendor's SOC 2 report explicitly expects your organization to implement. They appear in Section IV of the SOC 2 report and are easy to overlook — but your auditor will not overlook them. If you rely on a vendor's SOC 2 and fail to implement the CUECs, the control environment has a gap.

Common CUECs for widely-used vendors include: MFA enforcementOkta and other identity providers expect you to enforce multi-factor authentication for all users accessing their platform. If your Okta tenant allows password-only login, the CUEC is unmet. Access deprovisioningSlack expects you to deactivate user accounts promptly when employees leave. If terminated employees retain Slack access for weeks, you have a CUEC gap. API key rotationStripe expects you to rotate API keys periodically and restrict key permissions to minimum necessary scope.

For each vendor in your CC9.2 evidence file, document which CUECs apply and how your organization satisfies them. ThirdProof's recommended actions flag areas where CUECs are likely required based on the vendor's service type and data access level.

Subservice organizations: carve-out vs. inclusive

When your vendor relies on subprocessors (fourth parties), their SOC 2 report handles this in one of two ways.

Inclusive method. The vendor's SOC 2 scope includes the subservice organization's controls. The auditor tested both the vendor and its critical subprocessors. This gives you the most assurance but is uncommon — most vendors do not include their cloud provider's controls in their own SOC 2.

Carve-out method. The vendor's SOC 2 explicitly excludes subservice organization controls. The report states which services are carved out (typically AWS, GCP, or Azure) and notes that you should obtain separate assurance for those subprocessors. This is the standard approach for SaaS vendors.

When reviewing a vendor's SOC 2 with a carve-out, your CC9.2 evidence should document: which subprocessors are carved out, whether you have obtained separate SOC 2 reports for those subprocessors, and any compensating controls you rely on. ThirdProof's subprocessor discovery identifies published subprocessor lists and flags vendors with no visible subprocessor documentation — a common gap that auditors increasingly scrutinize.

See this in action

ThirdProof automates vendor risk assessment across 21 intelligence sources. Investigate any vendor in under 2 minutes — no questionnaires, no vendor cooperation required.

Try ThirdProof Free →

No credit card required

Frequently asked questions

What is a SOC 2 report?+
A SOC 2 report is an independent audit of a service organization's controls, conducted by a CPA firm under the AICPA's Trust Service Criteria framework. It evaluates controls across Security, Availability, Processing Integrity, Confidentiality, and Privacy. SOC 2 Type II, which tests control effectiveness over 6-12 months, is the standard that most enterprises require from technology vendors.
Should I require SOC 2 from all vendors?+
Not necessarily. SOC 2 is most relevant for technology vendors that store, process, or transmit your data. For vendors providing physical goods, professional services without data access, or low-risk commodity services, SOC 2 may be disproportionate. Base the requirement on the vendor's data access level, business criticality, and your regulatory obligations. Alternative certifications like ISO 27001 may be equally appropriate.
How do I verify a vendor's SOC 2 claim?+
SOC 2 reports are not publicly listed in a central registry, which makes independent verification challenging. Request a copy of the full report (not just the opinion letter). Verify the auditor is a licensed CPA firm. Check the report date, scope, and opinion type. Some vendors publish their SOC 2 status on trust pages — tools like ThirdProof can scan these pages and cross-reference claims against available evidence to classify them as independently verified or vendor-attested.
What is the difference between SOC 1 and SOC 2?+
SOC 1 (formerly SAS 70) evaluates controls relevant to financial reporting — it is designed for service organizations that impact their clients' financial statements, such as payroll processors or hosting providers for financial applications. SOC 2 evaluates broader information security controls. For vendor risk management purposes, SOC 2 is almost always the appropriate report to request. SOC 1 is only relevant if the vendor directly impacts your financial reporting.
What evidence does a SOC 2 auditor need for CC9.2?+
For CC9.2 (Risk Assessment of Third Parties), auditors expect: a vendor risk management policy, a complete vendor inventory with risk tiers, individual assessment files for sampled vendors (typically 5-15), documented reviewer sign-off on each assessment, evidence of periodic reassessment on schedule, and documentation of how findings and CUECs are addressed. Each assessment file should include findings with severity ratings, source attribution, and recommended actions with timelines.
What are CUECs and why do they matter?+
Complementary User Entity Controls (CUECs) are controls that a vendor's SOC 2 report expects your organization to implement. They appear in Section IV of the report. Common examples include enforcing MFA on identity provider accounts, promptly deprovisioning terminated employee access, and rotating API keys. If you rely on a vendor's SOC 2 for assurance but fail to implement the specified CUECs, the overall control environment has a gap that your auditor will flag.

Put this into practice

Investigate any vendor across 24 intelligence sources in under 2 minutes. Your first investigation is free.

Start Free Investigation →

No credit card required