SERVICE ORGANIZATION CONTROL
SOC 2

SOC 2 is the most recognized standard for demonstrating that your organization protects customer data. Built on the AICPA Trust Services Criteria (TSC), SOC 2 validates both your control design (Type 1) and how those controls operate over time (Type 2). We help you operationalize the right controls, collect evidence, and move through audit with confidence—using the RightSentry Protocol™ (Recon → Strategy → Fortify → Verify → Evolve).

IT Support for Manufacturing Firm

Who Must Comply?

If you store, process, or transmit customer data—especially as a cloud or managed service provider—prospects and enterprise customers will expect SOC 2. Common fits include SaaS platforms, payment and analytics providers, healthcare/FinTech vendors, and any Business Associate or third party with access to sensitive data. A strong SOC 2 program shortens security questionnaires, speeds deals, and builds trust.

5 TSC categories each cover a set of internal controls relevant to important aspects of your information security program:

The level of the CMMC certificate is dependent upon the type and nature of information that flows down from your
prime contractor. There are three levels of CMMC that range from basic cybersecurity hygiene to
advanced/progressive cybersecurity hygiene. Each level has its own set of controls observed in a CMMC audit. The
three levels of CMMC best practices are:

1

Security (Common Criteria)

Protect information and systems from unauthorized access or disclosure. Typical controls include access management, MFA, secure configuration, change management, vulnerability management, logging/monitoring, and incident response.

2

Availability

Ensure systems are available for operation and use as committed—think capacity planning, performance monitoring, DDoS protections, backups, disaster recovery, and business continuity.

3

Confidentiality

Safeguard information designated confidential (contracts, designs, source code, customer lists). Controls include encryption, key management, data retention and disposal, and secure data sharing.

4

Processing Integrity

Confirm systems process data completely, accurately, timely, and with authorization. This often includes SDLC controls, input/processing/ output checks, QA, and change approval practices.

5

Privacy

Protect personally identifiable information (PII) through collection, use, retention, disclosure, and disposal consistent with commitments and criteria. Includes consent and choice, notice, access, and secure disposal.

HERE’S HOW WE WILL HELP YOU PREPARE FOR AN SOC 2 REPORT:

Level 1 - Answer

Clarify scope (systems, boundaries, vendors), customer commitments, and Type 1 vs. Type 2 timelines. Translate auditor language into plain English.

Level 2 - Analzye

Run a readiness assessment against the TSC; identify control and documentation gaps; prioritize by risk and audit impact.

Level 3 - Roadmap

Deliver a practical plan—policies, procedures, security tooling improvements, and evidence collection—with owners and milestones.

Level 4 - Operationalize

Implement controls, run security awareness, tune logs/alerts, and capture evidence continuously. We coordinate with your auditor to streamline the exam.

We Can Help!

Right Hand Technology Group is CompTIA Security Trustmark+™ certified and recognized among top MSPs. Our cybersecurity-first approach embeds protection and verification into daily operations—not just audit week. The best first step is the RightSentry Snapshot™—a concise, executive assessment that identifies SOC 2 gaps, risk priorities, and next steps ($975, credited to your first month if you proceed with Comply™, Vanguard™, or Coach™).

What’s the difference between SOC 2 Type 1 and Type 2?

Type 1 tests the design of controls at a point in time. Type 2 tests operating effectiveness over a period (commonly 6–12 months). Enterprise customers usually prefer Type 2.

How long does SOC 2 take?

Type 1 can be achieved in 8–12 weeks once gaps are closed. Type 2 typically needs 6–12 months of evidence, depending on your chosen reporting period and maturity.

Do we need all five Trust Services Criteria (TSC)?

Most organizations start with Security and add Availability and Confidentiality. Processing Integrity and Privacy are added when services/data flows require them.

Are you the auditor?

No. We prepare you and operate the program; an independent CPA firm performs the audit. We coordinate with your auditor to streamline requests and fieldwork.

What evidence do auditors expect?

Policies/procedures, access reviews, MFA and SSO configs, change logs, vulnerability scans, backup/DR tests, security awareness records, incident drills, vendor reviews, and tickets showing controls in action.