SOC 2

-

Overview

SOC 2 Trust Services Criteria

SOC 2 TSC helps define and assess your controls for security, availability, integrity, and privacy.

SOC 2 Trust Services Criteria

When pursuing SOC 2 compliance, understanding the Trust Services Criteria (TSC) is key to shaping your SOC 2 audit scope and selecting the right SOC 2 controls.

The Trust Services Criteria define the principles that your organization must address to build trust with customers and demonstrate a strong security posture. While Security is required for every SOC 2 report, the other criteria—Availability, Processing Integrity, Confidentiality, and Privacy—are selected based on your services and customer expectations.

In this guide, we’ll walk through each of the SOC 2 Trust Services Criteria, what they cover, and how to choose the right ones for your SOC 2 audits.

1. Security

Security is the only Trust Services Principle required in every SOC 2 report. It focuses on whether your systems are protected against unauthorized access, both physical and logical.

Key focus areas include:

  • Access controls (authentication, authorization)

  • Network security (firewalls, segmentation)

  • Endpoint protection

  • Security monitoring and incident response

Meeting the Security criterion demonstrates that you have a strong foundation of data protection, threat defense, and risk management in place, essential to maintaining SOC 2 compliant status.

2. Availability

The Availability criterion ensures that your systems are operational and accessible as expected by your customers. It verifies that you have controls in place to support:

  • System monitoring

  • Performance tuning

  • Disaster recovery

  • Incident response

  • Capacity planning

Availability is particularly important for cloud services and APIs where uptime and system reliability are business-critical. Aligning your SOC 2 audit scope with this criterion helps demonstrate a mature security posture and strong risk mitigation capabilities.

3. Processing Integrity

Processing Integrity addresses whether your systems process data completelyaccuratelyand in a timely manner as intended.

This criterion is essential for services involving:

  • Transactions

  • Financial reports

  • Data pipelines

  • Customer reporting

Controls under this criterion typically cover:

  • Input validation

  • Processing accuracy

  • Output verification

  • Error handling

Demonstrating Processing Integrity helps customers trust that the data they rely on from your service is consistent and reliable.

4. Confidentiality

The Confidentiality criterion ensures that sensitive information is protected from unauthorized disclosure.

Confidential data may include:

  • Customer contracts

  • Intellectual property

  • Personally identifiable information (PII)

  • Proprietary datasets

Common SOC 2 controls for Confidentiality include:

  • Data classification policies

  • Encryption (at rest and in transit)

  • Secure data disposal

  • Enforced access controls

This criterion is particularly important for organizations handling regulated data, including GDPR and HIPAA-protected data.

5. Privacy

The Privacy criterion focuses on how your organization collects, uses, retains, discloses, and disposes of personal information.

Privacy controls help ensure compliance with:

  • Regulatory requirements (e.g., GDPR, CCPA)

  • Published privacy policies

  • Customer expectations

Typical Privacy controls include:

  • Data subject rights management

  • Consent tracking

  • Privacy notices and disclosures

  • Personal data retention policies

If your service involves processing personal data—including AI-driven applications—aligning with this criterion builds trust and legal defensibility.

Choosing the Right Criteria for Your SOC 2 Scope

When planning your SOC 2 audits, remember:

  • Security is always required.

  • Availability, Processing Integrity, Confidentiality, and Privacy are optional. You select the ones most relevant to your services, customer commitments, and risk assessment.

Selecting the right combination ensures your SOC 2 compliance program aligns with both operational effectiveness and evolving customer expectations.

Building Trust Through the Trust Services Criteria

Mastering the Trust Services Principles is key to building a robust SOC 2 compliance program.

By selecting the right criteria, strengthening your control environment, and maintaining a proactive risk management approach, your organization can build trust with customers, reduce the risk of data breaches, and stand out in competitive markets.

As you prepare for your SOC 2 audits, consider how each Trust Services Criterion maps to your services, customer needs, and long-term compliance goals.


Read more about SOC 2 compliance with DSALTA

Ready to automate your SOC 2 journey?

Start your compliance process with DSALTA's trusted solutions.

Ready to automate your SOC 2 journey?

Start your compliance process with DSALTA's trusted solutions.

Ready to automate your SOC 2 journey?

Start your compliance process with DSALTA's trusted solutions.

Ready to automate your SOC 2 journey?

Start your compliance process with DSALTA's trusted solutions.

Compliance made simple with DSALTA. Powered by AI, our platform eliminates manual tasks, boosts security, and delivers support you can count on.

Copyright © DSALTA 2025. All rights reserved.

Compliance made simple with DSALTA. Powered by AI, our platform eliminates manual tasks, boosts security, and delivers support you can count on.

Copyright © DSALTA 2025. All rights reserved.

Compliance made simple with DSALTA. Powered by AI, our platform eliminates manual tasks, boosts security, and delivers support you can count on.

Copyright © DSALTA 2025. All rights reserved.

Compliance made simple with DSALTA. Powered by AI, our platform eliminates manual tasks, boosts security, and delivers support you can count on.

Copyright © DSALTA 2025. All rights reserved.