SOC 2 Type I
12 requirements

SOC 2 Type I Requirements: Point-in-Time Trust Services Criteria Guide

SOC 2 Type I evaluates whether your controls are suitably designed and implemented as of a specific date — a point-in-time snapshot rather than an assessment of sustained operation. The requirements are the same Trust Services Criteria used in SOC 2 Type II, but the auditor assesses design and implementation rather than operating effectiveness over time. This guide covers the key requirements with a focus on what Type I auditors specifically evaluate.

Security (Common Criteria) — Required for All SOC 2

The Security criteria is mandatory for every SOC 2 engagement including Type I. For Type I, the auditor evaluates whether these controls are suitably designed and implemented as of the assessment date.

CC1

Control Environment (COSO Principles 1-5)

Your organization must demonstrate a commitment to integrity and ethical values, exercise board-level oversight, establish organizational structure with clear reporting lines, demonstrate commitment to competence, and enforce accountability. For Type I, the auditor verifies these elements are in place on the assessment date.

CC2

Communication and Information (COSO Principles 13-15)

You must generate and use relevant, quality information to support internal control. Information must be communicated internally and externally. For Type I, the auditor checks that communication policies and procedures exist and information flows are properly designed.

CC3

Risk Assessment (COSO Principles 6-9)

You must specify clear objectives, identify and analyze risks, assess fraud risk, and identify and assess changes that could impact internal controls. For Type I, the auditor verifies that a risk assessment has been conducted and documented as of the assessment date.

CC5

Control Activities and Monitoring (COSO Principles 10-12, 16-17)

You must select and develop control activities that mitigate risks, deploy technology controls, implement through policies and procedures, and monitor controls through ongoing evaluations. For Type I, the auditor confirms controls exist and are designed to achieve their objectives.

CC6

Logical and Physical Access Controls

You must implement logical access security (authentication, authorization), restrict physical access to facilities and assets, manage user provisioning based on authorization and least privilege, and restrict data transmission and movement. For Type I, the auditor verifies these controls are configured and in place.

CC7

System Operations — Monitoring and Response

You must monitor systems for anomalies and security events, evaluate detected events for potential incidents, and respond to identified incidents through a defined process. For Type I, the auditor verifies that monitoring, detection, and incident response mechanisms are designed and implemented.

CC8

Change Management

All changes to infrastructure and software must follow a documented change management process including authorization, testing, approval, and implementation controls. For Type I, the auditor checks that a change management process is defined and implemented.

CC9

Risk Mitigation — Business Continuity and Vendor Management

You must mitigate risks through business continuity planning, disaster recovery procedures, and vendor risk management. For Type I, the auditor verifies that BCP/DR plans exist and vendor management processes are documented as of the assessment date.

Additional Criteria (Optional)

These criteria are optional and selected based on the nature of your services. For a fast Type I, most organizations include only Security. Additional criteria can be added in subsequent reports.

A1

Availability

If included, you must demonstrate that systems are available for operation and use as committed. This covers capacity planning, performance monitoring, backup and recovery, and business continuity. For Type I, the auditor verifies these mechanisms are designed and in place.

C1

Confidentiality

If included, you must identify and protect confidential information through classification, access restrictions, and secure disposal. For Type I, the auditor checks that data classification and confidentiality controls are designed and implemented.

PI1

Processing Integrity

If included, you must ensure that system processing is complete, valid, accurate, timely, and authorized. For Type I, the auditor verifies controls for input validation, processing accuracy, and output completeness are designed.

P1

Privacy

If included, you must address how personal information is collected, used, retained, disclosed, and disposed of. Privacy notices, consent mechanisms, and data subject rights processes must be in place. For Type I, the auditor checks these are designed and documented.

Frequently Asked Questions

Are SOC 2 Type I requirements different from Type II?

The requirements (Trust Services Criteria) are identical. The difference is what the auditor tests. Type I tests whether controls are suitably designed and implemented at a point in time. Type II tests whether controls are designed AND operating effectively over a period (6-12 months). Type I is a snapshot; Type II demonstrates sustained compliance.

How quickly can I achieve SOC 2 Type I?

With controls already implemented, SOC 2 Type I can be achieved in 4-8 weeks. If you need to implement controls from scratch, expect 2-4 months. Using policy generation tools like PoliWriter and compliance platforms like Vanta or Drata significantly accelerates the timeline.

Should I start with Type I or go directly to Type II?

Starting with Type I is recommended for most organizations. It validates your control design, unblocks customer deals requiring SOC 2, and serves as a foundation for Type II. You can go directly to Type II if your controls have been operating for 6+ months and you are confident in their consistent execution.

Which Trust Services Criteria should I include?

Security (Common Criteria) is mandatory. For a fast Type I, most organizations include only Security. Add Availability if you have uptime SLAs, Confidentiality if you handle sensitive data, and Privacy if you process personal information. Select additional criteria based on customer requirements.

How long is a SOC 2 Type I report valid?

There is no official expiration, but industry convention treats reports as current for 12 months. Most organizations transition to Type II within 12 months rather than repeating Type I. Some customers and partners may accept reports up to 15 months old.

What policies do I need for SOC 2 Type I?

At minimum: Information Security Policy, Access Control Policy, Change Management Policy, Incident Response Plan, Risk Assessment Policy, Business Continuity Plan, Vendor Management Policy, Data Classification Policy, and Acceptable Use Policy. PoliWriter generates all of these customized to your organization.

Generate SOC 2 Type I policies automatically

PoliWriter creates all the policies you need to satisfy SOC 2 Type I requirements, customized to your organization. AI-powered, audit-ready, hours not months.

Get Started Free