SOC 2 Trust Services Criteria

Crosswalk to NIST CSF 2.0 · 36 controls · Updated April 2026.

SOC 2 is an AICPA attestation framework organized around five Trust Services Criteria — Security (Common Criteria), Availability, Processing Integrity, Confidentiality, and Privacy. A SOC 2 Type II report covers the design and operating effectiveness of controls over a 6–12 month period.

About SOC 2

SOC 2 is the most commonly requested third-party attestation from U.S. enterprise buyers. The framework itself is not a control list — it is a set of criteria that the auditor verifies your controls address. Your control set is custom to your environment; the auditor issues a report attesting that the controls operate effectively.

A Type I report attests to control design at a point in time. A Type II report attests to operating effectiveness over a period (usually 6 or 12 months). Type II is what most enterprise buyers request.

SecurityStack crosswalks SOC 2 Trust Services Criteria to NIST CSF 2.0 categories. Organizations pursuing SOC 2 typically also run a NIST CSF assessment internally — the crosswalk below is the bridge between the two.

Primary audience: SaaS vendors, cloud service providers, and any organization whose enterprise customers require third-party attestation of security controls.

Controls by domain

36 controls across 17 groups. Mapping strengths to NIST CSF 2.0 categories are summarized below.

A1/CC6 1 control
Control IDName
SOC2-A1.1Maintains current processing capacity
A1/CC9 2 controls
Control IDName
SOC2-A1.3Recovery infrastructure components
SOC2-CC9.1Identifies and manages business disruption risks
CC1 4 controls
Control IDName
SOC2-CC1.1COSO Principle 1: Commitment to integrity
SOC2-CC1.2Board oversight of cybersecurity risk
SOC2-CC1.3Establishes reporting lines and authorities
SOC2-CC1.4Demonstrates commitment to competence
CC1/CC2 1 control
Control IDName
SOC2-CC2.2Internally communicates about control activities
CC1/CC5 2 controls
Control IDName
SOC2-CC1.5Enforces accountability through policies
SOC2-CC5.2Selects and develops control activities
CC2 - Communication 2 controls
Control IDName
SOC2-CC2.1CC2.1

Obtains/generates relevant quality information (COSO P13)

SOC2-CC2.3CC2.3

Communicates with external parties on internal control matters (COSO P15)

CC3 4 controls
Control IDName
SOC2-CC3.1Specifies risk appetite
SOC2-CC3.2Identifies and analyzes risk
SOC2-CC3.3Evaluates fraud risk
SOC2-CC3.4Assesses likelihood and impact
CC4 3 controls
Control IDName
SOC2-CC4.1Monitors controls through ongoing evaluations
SOC2-CC4.2Evaluates and communicates deficiencies
SOC2-CC5.3Deploys control activities
CC4/CC7 1 control
Control IDName
SOC2-CC7.3Evaluates and implements remediation
CC5 - Control Activities 1 control
Control IDName
SOC2-CC5.1CC5.1

Selects/develops control activities for risk mitigation (COSO P10)

CC6 3 controls
Control IDName
SOC2-CC6.2New internal/external users provisioned with least privilege
SOC2-CC6.3Removes access to protected assets when no longer needed
SOC2-CC6.6Logical access restricted to authorized users
CC6 - Logical/Physical Access 3 controls
Control IDName
SOC2-CC6.4CC6.4

Restricts physical access to facilities/protected assets

SOC2-CC6.5CC6.5

Discontinues protections when no longer needed

SOC2-CC6.8CC6.8

Controls against threats from malicious software

CC6/A1 1 control
Control IDName
SOC2-CC6.7Restricts transmission, movement, removal of information
CC6/CC7 1 control
Control IDName
SOC2-CC6.1Restricts logical access to assets
CC6/CC7/CC8 1 control
Control IDName
SOC2-CC8.1Authorizes, designs, develops changes
CC7 4 controls
Control IDName
SOC2-CC7.1Detects and monitors threats
SOC2-CC7.2Evaluates the significance of threats
SOC2-CC7.4Responds to identified vulnerabilities
SOC2-CC7.5Identifies and develops remediation activities
CC9 2 controls
Control IDName
SOC2-A1.2Environmental protections (for SaaS dependencies)
SOC2-CC9.2Assesses and manages vendor risk

Crosswalk density to NIST CSF 2.0

Top 12 NIST CSF categories by number of SOC 2 controls mapped. The distribution tells you where the framework's emphasis sits against NIST's six functions.

NIST categoryControls mapped
PR.IR5
PR.AA5
PR.DS4
RC.RP4
GV.RM4
GV.RR3
GV.PO3
RC.CO3
ID.RA3
RS.MI3
AN.TE3
DE.CM3

Frequently asked questions

Type I or Type II?

Type II for most enterprise sales. Type I can be useful as an early milestone while you build the operational history needed for Type II, but enterprise buyers generally treat Type I as a signal of intent rather than a meaningful attestation.

Which Trust Services Criteria should we include?

Security (Common Criteria) is always required. Availability is common for SaaS. Confidentiality is common for anything handling customer data. Processing Integrity is specific to transaction-processing services. Privacy is required when you handle personal information and is often subsumed by GDPR/CCPA compliance conversations.

How does SOC 2 compare to ISO 27001?

SOC 2 is U.S.-centric, attestation-based, flexible on control selection. ISO 27001 is international, certification-based, prescriptive about ISMS structure. Many SaaS companies pursue both. If you only have resources for one, SOC 2 is typically easier to sell to U.S. buyers; ISO 27001 is typically easier to sell internationally.

Next

See your stack against SOC 2

Start a free assessment, select SOC 2 as a required framework, and see which controls your current tools already cover — and which gaps need new investment.