Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is SOC 2 compliance?

SOC 2 defines criteria for managing customer data based on five “trust service principles”—security, availability, processing integrity, confidentiality and privacy. SOC 2 compliance was developed by the American Institute of CPAs (AICPA).


SOC 2 compliance reports are unique to each organization. In line with specific business practices, each designs its own controls to comply with one or more of the trust principles. These internal reports provide you (along with regulators, business partners, suppliers, etc.) with important information about how your service provider manages data.


There are two types of SOC compliance reports:


  • Type I describes a vendor’s systems and whether their design is suitable to meet relevant trust principles as of a specified date
  • Type II details the operational effectiveness of those systems throughout a specified period.


You may want to pursue a SOC 2 report if you handle customer data and/or you work with larger enterprises who will want to ensure that you are a secure vendor.

{{cta_withimage1="/cta-modules"}}

Additional resources you might like:

Comparisons and reviews
Blog
Top 4 Secureframe alternatives

Explore features, limitations, and scalable compliance solutions.

Vendor Risk Management
Blog
GDPR, NIS 2, and DORA converge on one problem: Third-party risk

Discover how EU regulations, GDPR, NIS 2, and DORA, make third-party risk a direct, continuous business liability. Find out why most teams still lack visibility.

Compliance
Events
Auditor basics: A 30 minute guide for startups

In this exclusive live event, we'll cover what audits are, and why continuous compliance separates smooth audits from painful ones.

Additional resources you might like:

Comparisons and reviews
Blog
Top 4 Secureframe alternatives

Explore features, limitations, and scalable compliance solutions.

Vendor Risk Management
Blog
GDPR, NIS 2, and DORA converge on one problem: Third-party risk

Discover how EU regulations, GDPR, NIS 2, and DORA, make third-party risk a direct, continuous business liability. Find out why most teams still lack visibility.

Compliance
Events
Auditor basics: A 30 minute guide for startups

In this exclusive live event, we'll cover what audits are, and why continuous compliance separates smooth audits from painful ones.

Product updates
Events
Vanta Delivers: Live from New York

Join us to see new product capabilities and live demos, and learn how Vanta is delivering a unified risk experience for GRC teams.

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

In this webinar, we'll show you exactly where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.

Compliance
Events
Learn how to automate compliance for SOC 2, ISO 27001, and more

Watch on demand to learn how Vanta’s Agentic Trust Platform helps fast-moving startups and security teams get audit-ready fast and stay continuously compliant.

Compliance
Blog
How do you perform quarterly access reviews?

Without periodic access reviews, former employees may retain access to sensitive data after termination. Learn how to perform effective quarterly access reviews.

Product updates
Events
Turn Every Promise into Predictable Trust: Customer Commitments in Action

Watch on demand for a demo of Customer Commitments and learn how Vanta turns contracts into structured, actionable intelligence.

Comparisons and reviews
Blog
The 4 best Trust Center products for 2026

Compare top platforms, key features, and buying criteria to find the right fit for compliance and sales teams.