SOC 2: The Basics
What is SOC 2?
Technically, a SOC 2 isn't a "certification." It's an attestation report based on the American Institute of Chartered Public Accountant's (AICPA) Trust Services Criteria (TSC). Basically, a service provider claims they have specific controls for things like security, availability, and privacy.
Then, an independent CPA firm comes in to audit those claims and issue a report saying whether or not they agree.
SOC 1 vs. SOC 2
The distinction is really about the data’s impact.
SOC 1
Is for vendors that handle things affecting a client's financial statements, e.g. payroll or claims processing.
SOC 2
Is about the security of the technology itself—how data is handled and hosted in the cloud or a data center.
Any tech or service organization handling customer data should be looking at SOC 2. It’s a voluntary standard, but most enterprise customers won't sign a contract without seeing a report.
Deployment Models:
Where the Security Actually Sits
The On-Premise Reality Check
Single-Tenant / Dedicated Cloud
Type I vs. Type II
Type I
This is a "snapshot." It proves the controls were designed correctly on the day the auditor showed up.
Type II
This is the one you actually want. It tests the operating effectiveness of those controls over a window (usually 6 to 12 months).
The Bottom Line: A Type I shows they have a plan; a Type II proves they actually follow it when no one is watching. If you're reviewing a vendor, always push for the Type II.

