8 SOC 2 Policies Every Startup Needs (With Examples)
Auditors require written policies for every major control area. Here are the 8 you need, what each one should cover, and the mistakes that cause audit findings.
SOC 2 audits have two dimensions: do your controls work technically, and do you have written policies that describe how they are supposed to work? Most engineering-led startups nail the technical side and completely underestimate the policy side. The result is avoidable audit findings that delay your report.
You need at minimum eight written policies. Each one must be approved by leadership, dated, stored with version history, and — critically — must reflect what you actually do. Here is what each policy should contain, how detailed it needs to be, and the mistakes that cause findings.
1. Access Control Policy
This is the most frequently examined policy in a SOC 2 audit. It defines who gets access to your systems, how access is granted, how it is reviewed, and how it is revoked. It maps to CC6.1, CC6.2, and CC6.3 in the Trust Services Criteria.
Key sections auditors look for
- Role-based access model — define roles (admin, developer, viewer) and what each role can access
- Access provisioning process — how new employees get access (who approves, what is the workflow)
- Access revocation process — how access is removed when employees leave or change roles
- Access review cadence — how often you review who has access (quarterly is the standard)
- Multi-factor authentication requirements — which systems require MFA and for which roles
- Privileged access management — additional controls for admin-level access
Common mistakes
- Stating quarterly access reviews but never actually conducting them — auditors will ask for evidence
- Not defining what happens when an employee changes roles (lateral moves, not just departures)
- Generic policy that says 'least privilege' without defining what that means for your specific systems
Recommended length: 2-4 pages. This policy will be tested directly against your IAM configurations, GitHub team structures, and onboarding/offboarding checklists.
2. Incident Response Policy
Your incident response policy describes how your team detects, responds to, communicates about, and recovers from security incidents. It maps to CC7.3, CC7.4, and CC7.5. Auditors want to know that you have a plan before an incident happens — not that you will figure it out in the moment.
Key sections auditors look for
- Incident classification — how you categorize severity levels (P1/P2/P3 or critical/high/medium/low)
- Detection mechanisms — what monitoring and alerting you have in place
- Response procedures — step-by-step actions for each severity level
- Communication plan — who is notified internally and externally, and at what thresholds
- Post-incident review process — how you conduct postmortems and track remediation items
- Escalation matrix — who has authority to make decisions at each severity level
Common mistakes
- Not including external communication procedures (customer notification, regulatory reporting)
- No defined severity levels — every incident is treated the same way
- Policy says 'conduct postmortem' but there is no template or evidence of past postmortems
Recommended length: 3-5 pages. If you have had any security incidents, the auditor will ask to see the postmortem report to verify your policy was followed.
3. Change Management Policy
This policy describes how changes to your production systems are proposed, reviewed, tested, approved, and deployed. It maps to CC8.1 — one of the most heavily tested criteria in a SOC 2 audit, especially for SaaS companies.
Key sections auditors look for
- Change request process — how changes are proposed and documented (pull requests, tickets, etc.)
- Review and approval requirements — who reviews changes and how many approvals are needed
- Testing requirements — what testing occurs before deployment (CI, staging, manual QA)
- Deployment process — how changes move from approval to production
- Emergency change procedures — how urgent fixes bypass normal process (with retroactive review)
- Rollback procedures — how to revert a change that causes issues
Common mistakes
- Policy requires code review but branch protection is not actually enforced in GitHub
- No documentation of emergency change procedures — auditors will ask 'what if you need a hotfix at 2 AM?'
- Not including infrastructure changes (Terraform, CloudFormation) — only covering application code
Recommended length: 2-3 pages. This policy is directly tested against your GitHub branch protection settings, pull request history, and deployment logs.
4. Data Classification Policy
A data classification policy defines how your organization categorizes data by sensitivity level and applies appropriate protections to each category. It maps to CC6.7 and supports multiple other criteria. Many startups skip this policy entirely — which is a guaranteed audit finding.
Key sections auditors look for
- Classification levels — typically 4 tiers: Public, Internal, Confidential, Restricted
- Classification criteria — what determines which tier data falls into
- Handling requirements per tier — encryption, access restrictions, retention, and disposal rules
- Data owner responsibilities — who is responsible for classifying data in each system
- Examples — specific examples of data in each category relevant to your business
Common mistakes
- Creating classification levels but never actually labeling data in your systems
- Not including customer data handling requirements specifically
- No connection between classification levels and your encryption or access control policies
Recommended length: 2-3 pages. The classification levels defined here should be referenced in your access control and encryption policies for consistency.
5. Business Continuity and Disaster Recovery Policy
This policy describes how your organization maintains service availability during disruptions and recovers from disasters. It maps to A1.2 and A1.3 (Availability criteria). Even if you only scope Security, auditors may ask about your BC/DR posture as part of risk assessment discussions.
Key sections auditors look for
- Recovery Time Objective (RTO) — how quickly you need to restore service
- Recovery Point Objective (RPO) — how much data loss is acceptable
- Backup procedures — what is backed up, how often, where backups are stored
- Failover process — how you switch to backup systems during an outage
- Testing cadence — how often you test your recovery procedures (annually is minimum)
- Communication plan — how you notify customers during extended outages
Common mistakes
- Claiming an RTO of 1 hour but never having tested a full recovery
- No mention of database backup procedures or backup verification
- Policy exists but has never been tested — auditors will ask for evidence of DR testing
Recommended length: 3-4 pages. Include your actual RTO/RPO numbers based on your infrastructure, not aspirational targets.
6. Vendor Management Policy
Your vendor management policy describes how you evaluate, approve, and monitor third-party services that process or store data on your behalf. It maps to CC9.2 and is one of the policies that startups most commonly skip. Every SaaS company depends on vendors (AWS, Google, Stripe, etc.) — auditors expect you to manage that risk formally.
Key sections auditors look for
- Vendor evaluation criteria — what you assess before approving a new vendor (security posture, SOC 2 status, data handling)
- Vendor inventory — a living list of all vendors that process or store customer data
- Risk categorization — how you classify vendors by criticality (critical, standard, low-risk)
- Ongoing monitoring — how you track vendor compliance over time (annual SOC 2 report review, security questionnaires)
- Vendor offboarding — how you ensure data is returned or destroyed when you stop using a vendor
Common mistakes
- No vendor inventory at all — auditors will ask for the list on day one
- Not collecting SOC 2 reports from critical vendors (AWS, Google, and most major SaaS companies publish them)
- Policy says annual vendor reviews but no evidence of any review ever being conducted
Recommended length: 2-3 pages. The vendor inventory itself is a separate document (spreadsheet is fine) that the policy references.
7. Risk Assessment Policy
A risk assessment policy describes how your organization identifies, evaluates, and mitigates risks. It maps to CC3.1, CC3.2, and CC3.4 — the risk assessment criteria are foundational to the entire SOC 2 framework. An auditor cannot assess whether your controls are appropriate without understanding what risks they are designed to address.
Key sections auditors look for
- Risk identification process — how you discover and catalog risks
- Risk scoring methodology — how you evaluate likelihood and impact (quantitative or qualitative)
- Risk tolerance — what level of residual risk is acceptable to your organization
- Mitigation planning — how you decide which risks to mitigate, accept, transfer, or avoid
- Risk owner assignment — who is responsible for monitoring and managing each identified risk
- Review cadence — how often risk assessments are updated (quarterly or semi-annually)
Common mistakes
- Risk register with only 3-4 items — auditors expect 10-20 identified risks for a SaaS company
- No risk scoring — just a list of risks without any evaluation of likelihood or impact
- Risk assessment conducted once and never updated — it must be a recurring process
Recommended length: 2-3 pages for the policy. The risk register itself is a separate document (typically a spreadsheet) with at least 10-15 identified risks, each scored and assigned an owner.
8. Acceptable Use Policy
The acceptable use policy defines the rules for how employees use company systems, devices, and data. It maps to CC1.1 and supports CC6.1. This is one of the simpler policies to write but is still a required component — and every employee should acknowledge it.
Key sections auditors look for
- Scope — what systems, devices, and data the policy covers
- Permitted and prohibited activities — what employees can and cannot do with company resources
- Password requirements — minimum complexity, no password sharing, use of password managers
- Device security — screen lock requirements, encryption, approved software
- Data handling — how employees should handle sensitive data (no personal accounts, no unauthorized sharing)
- Consequences — what happens when the policy is violated
- Acknowledgment — employees must sign or digitally acknowledge the policy
Common mistakes
- Policy exists but employees never acknowledged it — auditors will ask for acknowledgment records
- Overly restrictive policy that nobody actually follows — auditors test policy against practice
- No mention of BYOD (bring your own device) rules in a remote-first company
Recommended length: 1-2 pages. Keep it readable — this is the policy your entire team needs to understand. Collect acknowledgments from every employee during onboarding.
How These Policies Connect
These eight policies are not isolated documents — they reference each other. Your access control policy should reference your data classification policy when defining who can access what. Your incident response policy should reference your change management policy for emergency fixes. Your vendor management policy should reference your risk assessment methodology.
Auditors look for consistency across policies. If your access control policy says MFA is required for all critical systems, but your acceptable use policy does not mention MFA, that is a gap. Review all eight policies together before submitting them to your auditor.
Writing vs. Generating Policies
You have three options for creating these policies: write them from scratch, start with templates and customize, or use AI-powered generation. Writing from scratch ensures the best fit but takes 3-5 days of focused work. Templates are faster but require significant customization to avoid the 'generic template' problem — auditors can tell when a policy does not match actual practice.
Whichever approach you choose, the most important thing is that the final policies match your actual practices. An auditor will test each policy against reality. A perfectly written policy that describes a process you do not follow is worse than a simple policy that accurately describes what you do.