Back to Blog

SOC 2 Type I: What It Certifies, What It Doesn't, and Why the Distinction Matters

SOC 2 Type I: What It Certifies, What It Doesn't, and Why the Distinction Matters

SOC 2 Type I tells you that a vendor's security controls were designed correctly at a specific point in time. It does not tell you whether those controls operated correctly for any sustained period—that is Type II's job.

This distinction is not semantic. It determines what you can actually conclude about a vendor's security posture before signing a contract.


What SOC 2 Is

SOC 2 is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA). It evaluates service organizations—primarily SaaS vendors and cloud infrastructure providers—against a set of Trust Services Criteria (TSC) that define acceptable security, availability, processing integrity, confidentiality, and privacy controls.

A SOC 2 report is not a certification in the traditional sense. It is an auditor's attestation that a vendor's controls meet the criteria at the time of evaluation. The report itself carries the auditor's opinion, not a pass/fail stamp.

There are two variants: Type I and Type II.


What Type I Audits

A SOC 2 Type I report attests to design adequacy at a point in time. An auditor examines the vendor's control environment as it exists on a specific date and renders an opinion on whether the controls are suitably designed to meet the relevant Trust Services Criteria.

What this means in practice:

  • Controls were documented and mapped to the relevant criteria
  • Evidence of design (policies, configurations, procedures) was reviewed
  • The auditor concluded the control architecture is appropriate for its stated purpose

What this does not address:

  • Whether controls were consistently applied over weeks or months
  • Whether exceptions occurred and how they were handled
  • Whether the control environment degraded between the audit date and today

Type I is a snapshot, not a longitudinal record.


The Trust Services Criteria

SOC 2 audits are structured around five Trust Services Criteria. Security—formally called the Common Criteria—is mandatory. The remaining four are optional and included based on the vendor's service commitments and customer requirements.

Security (Common Criteria)
Governs logical and physical access controls, system operations, change management, and risk mitigation. This is the baseline and appears in every SOC 2 report.

Availability
Addresses system uptime, performance monitoring, and incident response relative to stated SLAs.

Processing Integrity
Ensures that system processing is complete, valid, accurate, timely, and authorized. Most relevant for financial processing or data transformation pipelines.

Confidentiality
Covers how the vendor identifies, handles, and destroys information designated as confidential.

Privacy
Addresses the collection, use, retention, disclosure, and disposal of personal information. Aligned with but not equivalent to GDPR or CCPA compliance.

Vendors select which criteria to include. A Type I report covering only Security tells you significantly less than one that includes Confidentiality and Availability—particularly if your use case involves sensitive data flows or uptime dependencies.


Type I vs. Type II: The Correct Mental Model

The difference is observation period, not rigor of audit.

Type IType II
What is evaluatedControl designControl operation
Time horizonA single dateTypically 6–12 months
Evidence reviewedPolicies, configurationsLogs, tickets, exception reports
What it tells youControls were designed correctlyControls operated consistently
When it's appropriateEarly-stage or pre-operationalEstablished, operating environments

A Type I report is a legitimate starting point for vendors that are newly operational or implementing controls for the first time. It demonstrates intent and architectural soundness. It does not demonstrate sustained discipline.

A vendor offering only a Type I report for a multi-year product should be asked directly: why has Type II not been completed, and what audit period would reveal.


What the Audit Process Involves

A Type I engagement typically follows this sequence:

  1. Scoping — The vendor and auditor agree on which systems, services, and Trust Services Criteria are in scope. Scope boundaries matter. A narrow scope can exclude high-risk components.
  2. Control mapping — The vendor documents its control environment, mapping each control to the relevant TSC criteria. This produces the System Description included in the final report.
  3. Evidence collection — The auditor reviews policies, configurations, org charts, vendor agreements, and access control matrices as of the audit date.
  4. Testing — For a Type I, auditor testing confirms that controls exist and are designed as described. There is no operating effectiveness testing—that is reserved for Type II.
  5. Report issuance — The auditor issues an opinion: unqualified (controls are suitably designed), qualified (with exceptions), or adverse. Most published reports are unqualified; exceptions are disclosed in the report body.

Why SaaS Vendors Pursue Type I First

Type I reports serve a specific purpose in a vendor's compliance trajectory: they demonstrate architectural intent before the vendor has enough operational history to support a Type II.

A startup that built its infrastructure with SOC 2 controls in mind but has only been operating for three months cannot produce a meaningful Type II report. A Type I report documents that the design is sound—that the right controls were put in place from the start.

This matters for enterprise sales cycles. Many procurement teams require some form of SOC 2 attestation before approving a vendor. A Type I allows an early-stage vendor to meet that threshold while working toward Type II.

The limitation is that it cannot be substituted for Type II indefinitely. A vendor that has been operating for two or more years and still offers only Type I is presenting a gap, not a milestone.


What Customers Should Actually Evaluate

Receiving a SOC 2 Type I report from a vendor does not end the evaluation. It begins it.

Read the scope section. The System Description defines what is and is not covered. A report that excludes third-party subprocessors, data storage infrastructure, or specific product lines tells you less than the summary implies.

Examine any exceptions. Qualified opinions are not automatically disqualifying, but the nature of the exception matters. A control gap in access provisioning is more significant than a documentation gap in a low-risk process.

Note the audit date. A Type I report dated 18 months ago describes the control environment as it existed then. You are evaluating a vendor as it operates today.

Ask when Type II is expected. If a vendor cannot give a concrete answer, that is a signal worth weighing.

Review the auditor. SOC 2 audits are conducted by licensed CPA firms, but audit quality varies. Firms that specialize in technology sector attestation engagements produce more rigorous reports than generalist accountants working from templates.


Compliance as Byproduct, Not Goal

SOC 2 Type I, handled correctly, documents that a vendor made deliberate architectural decisions about how controls are designed. That is valuable. It is the beginning of a record of trustworthiness, not the record itself.

The vendors worth trusting are the ones who pursued SOC 2 because it forced explicit design decisions—not because a prospect asked for it. The report reflects the posture. The posture is what you are actually evaluating.


This article is part of Stellarbridge's series on vendor security evaluation and security-by-design architecture.