How to Use This Rubric
This rubric contains 11 signals across three pillars to evaluate SOC 2 report quality. Use the sidebar to jump to any pillar or signal, or scroll through the full rubric below.
Structure (3 signals)
Professional standards compliance
Substance (4 signals)
Audit work rigor and logic
Source (4 signals)
Auditor credibility factors
Structure
Does the report include required components and maintain professional consistency? Structure failures indicate the report may not meet professional standards.
Required Auditor's Report Section Structure
Why It Matters
AICPA standards mandate specific paragraphs in the Auditor's Report: Scope, Opinion, and for Type 2, Description of Tests of Controls. Missing or incorrect paragraphs indicate the auditor is unaware of basic standard requirements or took shortcuts.
What To Look For
- Scan the Auditor's Report section (Section 1 or 2) for labeled paragraphs: Scope, Opinion, and Description of Tests
- For Type 2, verify there's a paragraph referencing tests in Section 4
- Check that the Opinion clearly states whether controls were suitably designed and operating effectively
- A qualified opinion will typically have an explanatory paragraph, then say "Except for the matters above…" — indicating the opinion has been qualified
- Ensure the opinions reflect the most recent format published by the AICPA
Management's Assertion Completeness
Why It Matters
Management must formally assert their system description is accurate, controls are suitably designed, and (for Type 2) operating effectively. Missing or incomplete assertions mean management hasn't taken responsibility for their control environment per AICPA standards.
What To Look For
- Find Management's Assertion in Section 1 or as a separate section
- Verify it includes all required elements and is signed by company leadership
- If missing, incomplete, or unsigned, the report doesn't meet basic standards — request a complete version before proceeding with your assessment
Inconsistent Language Across Report Sections
Why It Matters
Inconsistencies across report sections indicate copy-paste reuse, weak editorial control, or lack of holistic auditor review. These discrepancies tell us the audit firm either did not understand and evaluate the actual environment, or did not prioritize the report user's clarity of understanding when drafting the report.
What To Look For
- Compare systems described across Sections 1, 3, and 4 for alignment
- Watch for control frequencies that change between sections (e.g., "quarterly" in Section 3 but "annual" testing in Section 4)
- Look for different system names used to describe the same environment
- Check for services or activities that are kept out of scope but suddenly appear in other sections (e.g., org chart doesn't have a CISO but CISO is mentioned elsewhere)
Substance
Do the controls, testing, and conclusions logically align and support each other? Substance failures mean the documented work doesn't support the conclusions.
System Description Specificity
Why It Matters
Section 3 should name actual products, technology stack components, infrastructure providers, and organizational structure. Generic buzzwords that could describe any company suggest the auditor didn't engage with the real environment.
What To Look For
- Look for specific details: AWS/Azure/GCP, named SaaS tools, data center locations, organizational charts, architecture diagrams, subservice organizations involved in providing services, and policies and procedures
- If it reads like marketing copy you could paste to any company, the auditor likely didn't test to the precision you'd expect
- Cross-reference against what you know about the vendor's actual tech stack (website details, questionnaire, subprocessor list, etc.) and other SOC 2 reports by the same auditor
- Ensure the System Description is consistent with the products or services described on the vendor's website or marketing materials
- Scrutinize descriptions with a very specific boundary that seems to exclude key pieces of the environment — e.g., a healthtech SaaS tool that excludes any details about third parties that process PHI
Control-to-Criteria Mapping Logic
Why It Matters
Each control maps to Trust Services Criteria (like CC6.1 for logical access). Illogical mappings — like "annual meetings" mapped to technical access controls — suggest the auditor didn't think critically about what controls actually accomplish.
What To Look For
- Spot-check 10 control mappings and ask: does this control logically address this criterion?
- Flag cases where technical controls are mapped to wrong categories or soft controls are used for hard technical requirements
- Document questionable mappings and probe whether those areas are well-designed — poor mapping can mask control gaps and fail to ensure the audit properly tested an important control
Vague or Conflicting Control Descriptions
Why It Matters
Vague controls like "Management maintains security" don't tell you what's actually happening. Clear controls specify what happens, who does it, how often, and what makes it effective. Controls that contradict each other indicate at least one is ineffective or inaccurately described.
What To Look For
- A well-designed control should answer five questions: What is done? How is it done? Who does it? When is it done? Where is it done?
- Look for controls requiring approvals that other controls explicitly bypass
- Watch for overlapping controls with different populations (e.g., "all users" vs "excluding service accounts" vs "no contractors")
- Check for contradictions — e.g., one section says developers have no production data access, another mentions limited production data access
- Review controls side by side in Section 3 and trace testing to Section 4
Good example: "Security team reviews production access quarterly, validates business justification with managers, removes unjustified access within 24 hours."
Bad example: "Access is reviewed periodically."
Test Procedure Detail and Specificity
Why It Matters
Vague test descriptions like "reviewed evidence" or "inspected evidence" are unhelpful. Look for testing descriptions that indicate the test itself was reperformed or observed. Also ensure sample sizes are large enough to provide meaningful confidence. An unqualified report despite extensive exceptions can indicate conflict avoidance or pressure to preserve the client relationship.
What To Look For
- Pick 5–7 controls critical to your use case and read their test procedures line by line
- Look for: what evidence was examined, how many samples, from what time periods, what specifically was verified
- If procedures are interchangeable boilerplate that could apply at any company, flag these controls and request direct evidence from the vendor
- Samples should be selected from multiple dates during the monitoring period to ensure continuous assurance
- For technical controls (MFA, encryption), look for testing of configuration and system-generated evidence
- For periodic controls (quarterly reviews), verify all instances were tested
- Count exceptions across Section 4 and assess whether exceptions are pervasive and/or impact core security objectives — challenge whether the opinion appropriately reflects the severity
- Scrutinize non-occurring controls — ensure the audit firm disclosed meaningful validation to justify the non-occurrence
Source
What credentials, independence factors, and track record may affect report credibility? Source failures suggest factors that undermine independence or credibility.
CPA Firm Registration, Peer Review Enrollment & Results
Why It Matters
The audit firm must be registered as a CPA firm with its respective State Board. The firm must be enrolled in the AICPA Peer Review Program and pass peer review every three years. Failures here indicate the audit may not be subject to proper oversight, and the final report may not meet AICPA quality standards.
What To Look For
- Find the firm name, firm signature, and home state at the bottom of Section 1 or Section 2
- Verify registration at NASBA's CPAVerify tool (https://ald.nasba.org/search/cpa) — the official nationwide firm lookup service
- If you can't confirm the firm is licensed, reject the report and communicate to the vendor that you cannot accept a SOC 2 from an unlicensed CPA firm
- Search the AICPA Peer Review public file (https://peerreview.aicpa.org) to validate enrollment — if the firm doesn't appear, they are not enrolled; reject the report
- If enrolled, ensure the Report Rating is "Pass" and the acceptance date is not older than three years
- New CPA firms have 18 months after their first attestation report to complete their first peer review — if outside that window, follow up for assurance on timing
CPA-to-SOC Reports Issued Ratio
Why It Matters
Auditing standards require a licensed CPA to sign off on every SOC report. A high ratio of reports per CPA suggests the firm may be operating as a "signature mill" without prioritizing quality.
What To Look For
- Look up the CPA firm on LinkedIn and confirm how many licensed CPAs work there
- Research the firm to estimate the number of SOC reports they issue per year
- If the ratio of licensed CPAs to SOC reports issued per year is greater than 50:1, this is a signal that quality may not be prioritized
- Factor this into your assessment and ask for supplemental evidence
CPA Firm Leadership & Report Signer Experience
Why It Matters
CPA leadership determines whether a firm operates as an independent guardian of security or a high-volume audit mill. Their oversight dictates whether staff apply rigorous professional skepticism or simply follow automated checklists. Report quality rests on leadership's willingness to prioritize their professional license and technical accuracy over easy revenue.
What To Look For
- Research the firm's founders, managing partner, and report-signing CPAs on LinkedIn for sufficient SOC 2 audit experience
- Check for AICPA membership and recognition
- Look for certified professionals: CFE (Certified Fraud Examiner), CISSP (Certified Information Systems Security Professional), CISA (Certified Information Systems Auditor)
- Evaluate industry experience relevant to your vendor's sector (healthcare, financial services, SaaS, etc.)
- Assess process transparency — does the firm share clear timelines, document requests, and readiness assessments before fieldwork begins?
Use of a GRC Tool
Why It Matters
Some GRC tools market "instant" SOC 2 compliance, promising audits in hours or days and guaranteeing a "pass." Such marketing often signals a commodity audit that prioritizes speed over substance.
What To Look For
- Check the vendor's Trust Center — in many instances, the vendor is using the GRC tool's Trust Center product, revealing which tool they use
- If the vendor doesn't have a Trust Center, inquire directly about which GRC tool they used
- Research the tool's website for marketing claims: "SOC 2 in days, hours, or weeks" signals rushed risk assessments
- Look for "Audit-Ready Guarantee" or "100% Success Rate" — this signals a check-the-box culture where the auditor acts as a rubber stamp
- Check if the tool has a list of "preferred auditors" — if the vendor's auditor is on that list, their independence may be weakened by a high-volume, automated business model
- Factor findings into your assessment and ask for supplemental evidence