Introduction to SOC 2
Learn the basics of SOC 2 and why it's the most accepted security framework.

Get up to speed on SOC 2
If you’ve been asked for your SOC 2, and you’re not quite sure where to begin, you’ve come to the right place.
SOC 2, or System and Organization Controls 2, is a security framework created by the American Institute of CPAs (AICPA). It’s a widely recognized standard for demonstrating an organization’s ability to keep customer data secure and sought after by growing SaaS companies to build trust with customers, partners, and investors.
Get a basic overview of SOC 2, learn why SOC 2 compliance is important, and build your understanding of the five Trust Services Criteria.
Introduction to SOC 2
Introduction to SOC 2

Introduction to SOC 2
Introduction to SOC 2

Download the checklist
Introduction to SOC 2
Get up to speed on SOC 2
If you’ve been asked for your SOC 2, and you’re not quite sure where to begin, you’ve come to the right place.
SOC 2, or System and Organization Controls 2, is a security framework created by the American Institute of CPAs (AICPA). It’s a widely recognized standard for demonstrating an organization’s ability to keep customer data secure and sought after by growing SaaS companies to build trust with customers, partners, and investors.
Get a basic overview of SOC 2, learn why SOC 2 compliance is important, and build your understanding of the five Trust Services Criteria.




Explore more SOC 2 articles
Introduction to SOC 2
Preparing for a SOC 2 audit
SOC 2 reporting and documentation
Streamlining SOC 2 compliance
SOC differences and similarities
Additional SOC 2 resources
Get started with SOC 2
Start your SOC 2 journey with these related resources.

The SOC 2 Compliance Checklist
Simplify and expedite your company’s SOC 2 audit and report process with Vanta. This checklist walks through the SOC 2 attestation process.

Vanta in Action: Compliance Automation
Demonstrating security compliance with a framework like SOC 2, ISO 27001, HIPAA, etc. is not only essential for scaling your business and raising capital, it also builds an important foundation of trust.