Definitive Guide

SOC 2 Vendor Assessment Questionnaire Guide

SOC 2 is the gold standard for vendor trust. Whether you are pursuing your own SOC 2 or responding to SOC 2-based vendor assessments, here's what assessors look for and how to prepare.

FK

Farhad Mirza Khawar

Founder of HIPAA Agent and Cyber Defense Agent. Compliance infrastructure for SMBs. Sacramento, CA.

2026-05-01

What SOC 2 assessors look for in vendor questionnaires

Service Organization Control 2 (SOC 2), developed by the American Institute of Certified Public Accountants (AICPA), is the predominant trust framework for technology and SaaS vendors. When an enterprise client sends you a SOC 2-based vendor assessment questionnaire, they are evaluating your organization against the Trust Services Criteria (TSC) — a set of principles governing how you handle their data. SOC 2 assessors evaluate five Trust Services Categories: Security (formerly the Common Criteria, and the only mandatory category), Availability, Processing Integrity, Confidentiality, and Privacy. Security is always in scope and covers your foundational controls — logical and physical access, system operations, change management, and risk mitigation. The other four categories are included based on the nature of your service and the data you handle. For vendor assessment questionnaires (as opposed to a formal SOC 2 audit), assessors are looking for evidence that you have controls in place that align with TSC, even if you do not yet have a formal SOC 2 Type II report. They want to see written policies, implemented technical controls, monitoring and logging capabilities, and evidence of regular review. A SOC 2 Type II report from a CPA firm is the gold standard because it provides third-party assurance that your controls were operating effectively over a defined period (typically 6-12 months). If you do not have one, your questionnaire responses and supporting evidence need to compensate by demonstrating control maturity through alternative means. Cyber Defense Agent's compliance mapping engine aligns your scan results to SOC 2 Trust Services Criteria, showing assessors which CC (Common Criteria) controls your external posture supports. This gives you a head start on demonstrating Security category compliance with verifiable data.

Preparing evidence for each Trust Services Category

Each Trust Services Category requires specific evidence that demonstrates your controls are designed, implemented, and operating effectively. Security (CC1-CC9 Common Criteria): This is the foundation. Prepare evidence for logical access controls (MFA enforcement, role-based access, privileged access management), network security (firewall rules, network segmentation, intrusion detection), change management (change approval process, testing requirements, rollback procedures), system monitoring (logging, SIEM, alerting), vulnerability management (scanning cadence, remediation SLAs, patch management), and incident response (written IRP, tabletop exercise documentation, breach notification procedures). CDA scan data directly supports several CC controls by demonstrating your external security configuration, vulnerability exposure, and email authentication posture. Availability (A1): If included in scope, demonstrate your uptime commitments (SLAs), redundancy and failover architecture, backup procedures and testing, disaster recovery plan and RTO/RPO targets, and capacity monitoring. Provide historical uptime data and DR test results. Processing Integrity (PI1): Demonstrate input validation, processing accuracy checks, output reconciliation, quality assurance procedures, and error handling mechanisms. This is most relevant for vendors processing financial or operational data. Confidentiality (C1): Show how you protect confidential information through data classification policies, encryption at rest and in transit, access restrictions, data retention and disposal procedures, and NDA requirements. Provide your data classification matrix and encryption specifications. Privacy (P1-P8): If handling personal information, demonstrate your privacy notice, consent mechanisms, data subject access request procedures, data minimization practices, and cross-border data transfer safeguards. Reference your privacy policy and any applicable compliance (GDPR, CCPA). For SMBs without a formal SOC 2 report, the key is organizing this evidence into a clear, accessible package. Create a shared evidence folder with current policy documents, CDA reports, configuration screenshots, and test results that you can reference in questionnaire responses.

Common SOC 2 gaps for SMBs and pre-assessment readiness

Small and mid-sized businesses consistently struggle with the same SOC 2 gaps. Identifying and addressing these before you receive a vendor assessment questionnaire dramatically improves your results. Gap 1: No formal risk assessment. SOC 2 requires a documented risk assessment process (CC3.1-CC3.4). Many SMBs operate on informal risk awareness without a written risk register or formal assessment methodology. Fix: conduct an annual risk assessment using the NIST CSF framework. Document identified risks, likelihood, impact, and mitigation measures. Cyber Defense Agent's scan results identify external-facing risks that should be included. Gap 2: Incomplete access management. Assessors consistently find that SMBs lack formal user provisioning and deprovisioning procedures, quarterly access reviews, and privileged access management controls. Fix: implement a documented onboarding/offboarding checklist, schedule quarterly access reviews with manager attestation, and enforce separate admin accounts for privileged access. Gap 3: Missing or untested incident response plan. Having an IRP is not sufficient — assessors look for evidence of annual testing through tabletop exercises, documented lessons learned, and plan updates. Fix: conduct an annual tabletop exercise, document results, and update your IRP based on findings. Gap 4: No change management process. Even small teams need a documented process for approving, testing, and deploying system changes. Fix: implement a lightweight change management process with approval requirements, testing verification, and rollback procedures. Document changes in a change log. Gap 5: Insufficient logging and monitoring. Assessors expect centralized logging, defined retention periods, and evidence of log review. Fix: enable audit logging on all critical systems, centralize logs (cloud SIEM or log management), define a 90-day minimum retention period, and establish a regular log review process. Cyber Defense Agent's pre-assessment readiness workflow walks you through each of these gaps, maps your current scan data to TSC controls, and generates a readiness report showing your SOC 2 alignment percentage. This lets you prioritize remediation efforts before the formal assessment begins.

Key Takeaways

TL;DR

SOC 2 evaluates five Trust Services Categories — Security is always mandatory; Availability, Processing Integrity, Confidentiality, and Privacy are included based on your service scope.

A formal SOC 2 Type II report from a CPA firm is the gold standard, but well-evidenced questionnaire responses can demonstrate control maturity for vendor assessments.

The top SMB gaps are: no formal risk assessment, incomplete access management, untested incident response, missing change management, and insufficient logging.

Organize your evidence proactively — policy documents, CDA scan reports, configuration screenshots, and test results — in a readily shareable format.

CDA's compliance mapping aligns your scan results to SOC 2 Common Criteria, giving assessors verifiable data instead of self-attestation alone.

FAQ

Frequently asked questions

Do I need a formal SOC 2 report to pass vendor assessments?

Not necessarily. Many enterprises accept detailed questionnaire responses with supporting evidence as an alternative to a formal SOC 2 report, especially for lower-risk vendor relationships. However, having a SOC 2 Type II report significantly accelerates the assessment process and is increasingly expected for vendors handling sensitive data or providing critical services. If you are frequently asked for SOC 2 evidence, investing in a formal audit (typically $20,000-$50,000 for SMBs) may be worthwhile to streamline future assessments.

What is the difference between SOC 2 Type I and Type II?

SOC 2 Type I evaluates whether your controls are designed appropriately at a specific point in time. SOC 2 Type II evaluates whether those controls operated effectively over a defined period, typically 6 to 12 months. Type II is significantly more valuable to assessors because it provides assurance of ongoing control effectiveness, not just design. Most enterprises requesting SOC 2 evidence want a Type II report. If you are pursuing formal certification, start with Type I to validate your control design, then progress to Type II.

How can CDA help with SOC 2 readiness if we are a small business?

Cyber Defense Agent helps with SOC 2 readiness in three ways. First, the compliance mapping engine aligns your scan results to SOC 2 Common Criteria (CC) controls, showing which controls your current posture supports and where gaps exist. Second, the continuous scanning provides an ongoing evidence trail of your security posture over time, which supports the "operating effectiveness" requirement of Type II. Third, the pre-assessment readiness report identifies the most common SMB gaps and provides prioritized remediation guidance so you can focus your limited resources on the controls that matter most.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card. Real evidence.