SOC 2 Compliance Checklist for Startups (2026)
The definitive phase-by-phase checklist for getting SOC 2 ready. Organized by priority, timeline, and effort — built for engineering teams, not compliance consultants.
Most SOC 2 checklists online are either too vague ('implement access controls') or too exhaustive (200-item spreadsheets designed for enterprises). Neither is useful for a 10-person startup that needs to get audit-ready without hiring a compliance team.
This checklist is organized into four phases, prioritized by impact and sequenced so that each phase builds on the previous one. Follow it in order. By the end of Phase 4, you will be ready to engage an auditor with confidence — and the audit itself will go faster because your evidence is already organized.
Phase 1: Quick Wins (Week 1-2)
These are configuration changes that take minutes to hours but eliminate the most common audit findings. Do all of them before moving to Phase 2. Each one directly maps to a SOC 2 Trust Services Criterion.
Identity and access
- Enable MFA on your AWS root account (CC6.1 — 3 minutes)
- Enforce MFA for all IAM users with console access (CC6.1 — 15 minutes)
- Enforce MFA for your entire GitHub organization (CC6.1 — 5 minutes)
- Enforce MFA on Google Workspace for all users (CC6.1 — 5 minutes)
- Remove any shared credentials or shared accounts from all systems (CC6.1)
- Delete or deactivate IAM users and access keys that are no longer needed (CC6.2)
Code and change management
- Enable branch protection on all production branches in GitHub (CC8.1 — 20 minutes)
- Require at least one pull request review before merging (CC8.1)
- Enable status checks (CI must pass before merge) on protected branches (CC8.1)
- Disable admin bypass on branch protection rules (CC8.1)
- Enable secret scanning and push protection on all repositories (CC6.1 — 10 minutes)
Infrastructure
- Enable CloudTrail in all AWS regions with log file validation (CC7.1 — 10 minutes)
- Enable default encryption on all S3 buckets (CC6.7 — 5 minutes per bucket)
- Enable account-level S3 Block Public Access (CC6.1 — 2 minutes)
- Set IAM password policy to require 14+ characters, complexity, and 90-day rotation (CC6.1 — 5 minutes)
- Delete root account access keys if they exist (CC6.1 — 2 minutes)
Phase 2: Policies and Documentation (Week 3-4)
Auditors do not just look at your technical configuration — they look at whether you have documented policies that describe your security practices. A control without a policy is a finding, even if the control is technically working. You need written, dated, approved policies for each major control area.
Required policies
- Access Control Policy — who gets access to what, how access is granted and revoked, review cadence
- Incident Response Policy — how you detect, respond to, and recover from security incidents, including communication plan
- Change Management Policy — how code changes are reviewed, approved, tested, and deployed
- Data Classification Policy — how you categorize data by sensitivity (public, internal, confidential, restricted)
- Business Continuity and Disaster Recovery Policy — RTOs, RPOs, backup procedures, failover process
- Vendor Management Policy — how you evaluate, approve, and monitor third-party services
- Risk Assessment Policy — how you identify, evaluate, and mitigate risks, including cadence
- Acceptable Use Policy — rules for employees using company systems, devices, and data
Policy formatting requirements
- Each policy should be 2-5 pages — long enough to be meaningful, short enough to be read
- Include version number, effective date, approval signature (CEO or CTO), and next review date
- Store policies in a system with version history (Google Docs, Notion, or Confluence all work)
- Policies must reflect what you actually do — auditors will test policies against practice
- Schedule annual policy reviews and document the review even if no changes are made
Writing policies from scratch takes most teams 3-5 days of focused work. It is the most commonly underestimated task in SOC 2 preparation. Start with templates and customize them to match your actual practices — do not copy generic templates verbatim, as auditors will notice and ask probing questions.
Phase 3: Evidence Collection and Advanced Controls (Month 2)
With your quick wins implemented and policies written, Phase 3 focuses on building the evidence archive your auditor will review and closing any remaining control gaps.
Evidence collection
- Export IAM Credential Report showing all users, MFA status, and access key ages
- Screenshot GitHub branch protection settings for each production repository
- Screenshot GitHub organization MFA enforcement setting
- Screenshot S3 bucket encryption and public access block settings for each bucket
- Export CloudTrail configuration details
- Screenshot IAM password policy configuration
- Save copies of all approved policies with version history visible
- Document your onboarding and offboarding checklists
- Conduct and document your first formal access review (list all users and their access levels across all systems)
Vendor management
- Create a vendor inventory listing all third-party services that process or store customer data
- For each critical vendor: record what data they access, their SOC 2 status, and your assessment of risk
- Collect SOC 2 reports from your critical vendors (AWS, Google, Supabase, etc. all publish them)
- Document your vendor evaluation criteria for future purchases
Risk assessment
- Conduct a formal risk assessment — identify at least 10-15 risks relevant to your business
- Score each risk by likelihood and impact (use a simple 1-5 scale)
- Document mitigation strategies for each risk rated medium or higher
- Identify risk owners (the person responsible for monitoring each risk)
- Schedule quarterly risk assessment reviews
This phase typically takes 2-3 weeks. The vendor management and risk assessment tasks are the ones most startups have never done before, so allocate extra time. They are not technically complex — they are organizational discipline exercises.
Phase 4: Auditor Selection and Formal Prep (Month 3)
By this point, your controls are implemented, your policies are written, and your evidence is organized. Now you are ready to engage an auditor — and because you did the preparation work first, the engagement will be faster and cheaper.
Choosing an auditor
- Get quotes from at least 3 CPA firms — pricing varies by 2x or more for the same scope
- Prioritize firms that specialize in SaaS and technology companies
- Ask each firm about their Type 1 + Type 2 combined engagement process
- Ask for references from companies at your stage and size
- Confirm the firm can start the Type 2 observation period concurrently with Type 1 work
- Negotiate — auditor fees have room to move, especially for early-stage companies
Pre-audit preparation
- Organize all evidence into a structured folder (by control area or by TSC category)
- Prepare a control matrix mapping each control to the relevant Trust Services Criterion
- Brief your team on what to expect during auditor inquiries (auditors will interview employees)
- Verify that all policies are dated, signed, and stored with version history
- Run a final gap analysis to confirm all previously failing controls now pass
- Share your gap analysis results and evidence package with prospective auditors as part of your RFP
Timeline Summary
Here is the realistic timeline from start to Type 1 report for a well-prepared startup:
- Week 1-2: Quick wins — MFA, branch protection, encryption, logging (Phase 1)
- Week 3-4: Policy writing — 8 core policies drafted, reviewed, and approved (Phase 2)
- Month 2: Evidence collection, vendor management, risk assessment (Phase 3)
- Month 3: Auditor selection, pre-audit prep, engagement kickoff (Phase 4)
- Month 4-5: Auditor fieldwork for Type 1
- Month 5-6: Type 1 report issued — use this to unblock enterprise deals
- Month 6-12: Type 2 observation period (starts concurrently with Type 1 if planned correctly)
Total time from starting this checklist to receiving your Type 1 report: approximately 5-6 months. Total time to Type 2: approximately 12 months. The preparation phases (1-4) are entirely within your control — the audit phases depend on auditor availability and scheduling.
Common Mistakes to Avoid
- Skipping the gap analysis and going straight to an auditor — this always costs more
- Writing policies that do not match your actual practices — auditors test for consistency
- Waiting to enable CloudTrail until right before the audit — you need log history for the observation period
- Ignoring vendor management — auditors ask about it in every SOC 2 engagement
- Not documenting access reviews — having access controls is not enough, you need evidence of regular review
- Treating SOC 2 as a one-time project — it is an ongoing program that requires annual maintenance