United StatesInformation securityAICPA standard
SOC 2

System and Organization Controls 2

Security, Availability, Processing Integrity, Confidentiality, Privacy — the gating attestation for vendor procurement.

Depth of coverage

What we know in this framework.

The specific clauses, articles, appendices and supervisory expectations we work against — anchored to primary source and maintained as the regime evolves.

01Trust Services Criteria
02Control design and operating effectiveness
03Subservice carve-outs
04Evidence cadence
How we cover it

How the firm carries SOC 2 into client work.

SOC 2 is read against the services below. Each one draws on the same compliance intelligence layer — indexed to primary source, versioned alongside the regulator, and carried into the engagement.

This framework is carried through our cross-framework control mapping. Speak with a partner for a scoped plan against your portfolio.

Related playbooks

Playbooks that ship against SOC 2.

Each playbook walks from discovery through artifact — phases, controls, evidence. Agents assist the mechanical steps; specialists own the sign-off.

No standalone playbook is published for this framework yet. Our cross-framework control mapping still covers it — speak with a partner for a scoped plan.

Map your posture against SOC 2.

Bring us your current documentation, controls and inventory. We will map them clause by clause against SOC 2 — and against every other regime your portfolio touches — and produce the evidence artifact your supervisor will read.