SOC 2 for AI Vendors

Service Organization Control 2 (SOC 2) is a fundamental auditing standard developed by the American Institute of Certified Public Accountants. It evaluates cloud services and technology organizations to ensure they securely handle client data.
SOC 2 dictates five Trust Service Criteria that govern the system's evaluation. It is an established benchmark that business leaders rely on to verify security maturity inside potential AI vendors.
SAS 70 Era
The SAS 70 standard functioned as the primary framework. It focused heavily on financial controls and struggled to adapt to IT and cloud environments.
SOC 2 Introduced
The AICPA introduced SOC 2 to replace SAS 70, orienting specifically around cloud and modern technology service organizations.
Major Revision
Trust Services Criteria aligned with the COSO 2013 control framework, introducing common and supplementary criteria.
Revised Points of Focus
Updates addressed the complexities of supply-chain risks, shifting technologies, and modern cloud deployment.
Description Criteria Updated
Further refinement of reporting standards went into effect in July 2025 to adapt to current audit complexities.
The Trust Service Criteria
Security serves as the only mandatory criterion across every SOC 2 audit. It reviews physical and logical structures protecting against unauthorized access. The remaining criteria are selected based on the specific services the vendor provides.
Availability reviews whether the service remains consistently operational as established by service-level agreements.
Processing Integrity examines whether the platform processes data accurately, entirely, and only via authorized channels.
Confidentiality ensures all information explicitly classified as confidential receives protective compartmentalization.
Privacy dictates that collected personal information conforms to widely accepted privacy principles mirroring modern global data regulations.
Evaluating Reporting Types
When analyzing a vendor's SOC 2 compliance, there are two distinct variations: Type I and Type II.
A SOC 2 Type I report captures a snapshot in time. An independent auditor evaluates the vendor's security controls to confirm they are designed appropriately as of a specific date.
A SOC 2 Type II report assesses those controls across a period of six to twelve months. The auditor verifies the controls operated effectively under real-world conditions over that duration.
When evaluating AI vendors handling sensitive data, a SOC 2 Type II report acts as a mandatory baseline.
Moving Beyond the Core Reporting
Vendors often expand coverage by pursuing SOC 2+. This incorporates compliance requirements outside the standard five criteria. A SOC 2+ report demonstrates compliance with frameworks like HIPAA, GDPR, or NIST CSF simultaneously. Operating inside regulated industries makes SOC 2+ reports highly valuable during the vendor selection cycle.
SOC 2 Limitations Regarding AI
SOC 2 does not offer a complete evaluation of an AI vendor. It predates the modern foundational model architecture.
A vendor can achieve SOC 2 certification while still retaining prompt data indefinitely or utilizing inputs to train subsequent models. The audit validates the security of the infrastructure, but it does not evaluate AI-specific data processing logic.
Furthermore, SOC 2 audits cover the application vendor directly. The underlying AI model providers or cloud hosts maintain their own infrastructure. Organizations must ensure that any sub-processors involved in the data flow carry their own independent SOC 2 certifications.
SOC 2 acts as a required foundation, but assessing AI platforms requires targeted questioning regarding data retention, model training, and sub-processor accountability.
References
- 2017 Trust Services Criteria (2022 Points of Focus)
AICPA Documentation (Registration required for download)
- SOC 2 Standard History
arc42 Quality Model Reference