Oh, and you'll need vendor assessments - because your auditor will ask about that AWS subprocessor you forgot you were using.
And business continuity plans. And an incident management process.
And then, right at the end, you discover the System Description — this dense narrative document that ties everything together and somehow needs to exist before your Type I audit.
I went through ISO 27001 in 2019 and thought "never again." Then I built a tool to make it survivable and got SOC 2 Type I using it (humadroid.io). Took way longer than I expected, and I already knew the domain.
Not trying to discourage — just a heads up that the iceberg goes deep. Happy to answer questions if you're heading down this path.
This process is hard because there is tension between ticking boxes and being effective. The most well meaning people will get caught in a box ticking exercise if a critical contract depends on it.
It doesn’t have to be this way, but if you want it to be easy, start before clients start asking. Focus on being effective and automated so that you don’t feel pressured to tick boxes.
On the knowledge gap: the gap assessment route works, but it's expensive upfront and still leaves you building the foundation afterward.
What I've been exploring is the step before the audit: getting teams organized enough that when they do engage a consultant or tool, they're not starting from zero, which would result in faster compliance.
I'm building a platform (Lumoar) focused exactly on this pre-audit organization phase, helping early-stage teams get structured before the compliance pressure hits.
Curious: in your experience, what's the biggest mistake teams make when they're under contract pressure to get SOC 2 done quickly?
Compliance can be a business enabler if done correctly or a burden if treated like a side project.