What are the differences between a SOC for Cybersecurity examination and a SOC 2 examination?

The following list highlights some of the key differences between a SOC for Cybersecurity report and a SOC 2 report.


SOC for Cybersecurity:
 To provide intended users with useful information about an entity’s cybersecurity risk
management program, so that users may make informed decisions.

SOC 2:
To provide a broad range of system users with information about controls at the service organization relevant to
security, availability, processing integrity, confidentiality and/or privacy to support users’ evaluations of their own systems
of internal control.


SOC for Cybersecurity:
Management, directors, analysts, investors, and others whose decisions might be affected by
the effectiveness of the entity’s cybersecurity risk management program.

SOC 2:
Management of the service organization and other specified parties with sufficient knowledge and understanding
of the service organization and its system.


SOC for Cybersecurity:
Appropriate for general use; however, the practitioner can restrict the report to specified parties,
if necessary.

SOC 2:
Restricted to user entity personnel and specified parties.


SOC for Cybersecurity:
The 2017 Trust Services Criteria are considered suitable criteria; however, other information
security control frameworks such as NIST’s Cybersecurity Framework, ISO 27001, and HITRUST may also be considered
suitable control criteria.

SOC 2:
The 2017 Trust Services Criteria for security, availability, processing integrity, confidentiality and privacy are the
only control criteria that can be used although additional criteria/frameworks may be included.


The SOC for Cybersecurity report and the SOC 2 report includes the same sections with the exception of the description
of the service auditor’s tests of controls and results of the tests. The SOC for Cybersecurity report does not contain this

About Schneider Downs
SOC Services 

Schneider Downs employs a unique approach to SOC reports, integrating the expertise of information technology, internal audit and external audit professionals. By combining cross-disciplinary knowledge and project management expertise, we are able to effectively deliver on our clients' expectations. If you are interested in learning how we can assist your organization, please contact us to get started or view more SOC FAQ's at www.schneiderdowns.com/soc-report-faq


You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2021 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on
What Are The Most Common Passwords of 2021?
IRS Joins Forces to Combat Fraud Against Charitable Organizations
Buyer Beware: 2021 Holiday Shopping Scams
How Much Does a Data Breach Cost in 2021?
Cybersecurity Awareness Month is Ending... Now What?
What to Expect When You’re Expecting a Single Audit
Register to receive our weekly newsletter with our most recent columns and insights.
Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us
contact us

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.