For lean, 1–30 person AWS-Native teams getting their first SOC 2. Everything you need to know & more about getting ready for SOC 2 compliance.
SOC 2 Type I is a point-in-time snapshot. An auditor shows up, looks at your controls, and says "yes, these are designed correctly." You're not proving they've worked for months. Just that they exist and make sense right now. With the right prep: $8–15K at a startup-friendly firm, 6–10 weeks elapsed. Most teams pay double and take twice as long because they walk in unprepared. This checklist is the prep.
These decisions determine how much work the next few months are. Get them wrong and you'll overbuild. Most teams skip this and regret it.
SOC 2 isn't just about having policies. Your infrastructure has to actually match what your policies say. For AWS teams, this is both the biggest risk and the most automatable part of the process.
What's automatable here: The controls in this section map directly to AWS APIs — IAM, CloudTrail, S3, VPC, GuardDuty, SecurityHub, Config, and more. The open-source Evidence Tracer runs these automatically, maps findings to controls, and gives you a gap report in about 5 minutes. The table below shows what each check actually is if you want to do it manually.
| What's being checked | What the auditor looks at | Evidence source |
|---|---|---|
| Who can access what (CC6.1) | MFA on all IAM users, no root access keys, password policy, least-privilege roles | API scannable |
| How access gets granted (CC6.2) | Onboarding/offboarding process, SSO config, access key age per your policy | API scannable |
| Network perimeter (CC6.6) | VPC config, security groups (no 0.0.0.0/0 on sensitive ports), WAF if applicable | API scannable |
| Data in transit (CC6.7) | TLS enforcement, transmission controls, secure data movement policies | Partial |
| Encryption at rest (CC6.1/CC6.6) | S3 encryption, KMS key rotation, RDS encryption, no public S3 buckets | API scannable |
| Config tracking (CC7.1) | AWS Config enabled, delivery channels active, config rules running | API scannable |
| Audit logging (CC7.2) | CloudTrail on in all regions, log file validation on, management events logged | API scannable |
| Threat detection (CC7.3) | GuardDuty enabled, CloudWatch alarms for critical events, SNS configured | API scannable |
| Incident handling (CC7.4) | SecurityHub enabled, findings reviewed, incident response plan exists | Partial |
| Change tracking (CC8.1) | CloudTrail logging API calls, Config tracking changes, Lambda inventory | API scannable |
| Vendor risk (CC9.2) | Critical vendor list, confirmation vendors are SOC 2 compliant, review process | Manual |
| Backups and recovery (A1.2) | RDS automated backups with retention policy, S3 versioning on critical buckets | API scannable |
| Governance, HR, training (CC1–CC4) | Org structure, risk assessments, security training records, background checks | Manual |
SOC 2 requires written policies for basically everything. They don't need to be long. They need to be real — meaning your team follows them and your infrastructure actually matches them.
The part most people miss: Use AI to draft every policy in a day. The auditor doesn't care if Claude wrote the first draft. They care that (a) you reviewed and approved it, (b) your team knows it exists, and (c) your actual practices match what it says. A policy that claims 90-day key rotation when you haven't rotated keys in 2 years isn't compliance. It's a paper trail for negligence.
For Type I, you need point-in-time evidence proving your controls are real as of the audit date. This step takes the most calendar time. Budget 40–60 hours if you're doing it manually.
Open-source AWS evidence scanner. Runs the API calls above, maps findings to the criteria in this checklist, timestamps and SHA-256 hashes every response. Read the code before running it in your account.
Only licensed CPA firms accredited by the AICPA can issue SOC 2 reports. Who you pick affects timeline and cost significantly.
Most compliance guides skip this. Type I is not a comprehensive security certification. Knowing what it doesn't prove is as important as knowing what it does.
What your Type I report tells a customer: "As of [date], this company had security controls that were appropriately designed." It doesn't say they worked, worked consistently, or that there haven't been incidents since. Enterprise security teams know this, which is why they eventually ask for Type II.