Macksofy Technologies
AICPA Trust Services · Type 1 + Type 2

SOC 2 Type 1 + Type 2 Audit

The single artefact every US enterprise customer asks for.

Full SOC 2 Type 1 + Type 2 readiness, internal audit and CPA-coordination. We implement the five Trust Services Criteria (Security, Availability, Confidentiality, Processing Integrity, Privacy) as a system that operates — and produces evidence — for the entire 12-month observation window.

Aligned to
  • AICPA SOC 2 — 2017 Trust Services Criteria (revised)
  • AICPA SOC 1 (financial reporting — separate engagement)
  • ISO 27001 (mapped — 60% control overlap)
  • PCI-DSS (where in scope)
Why this matters

Compliance is leverage, not paperwork.

If your buyers are US enterprises, a SOC 2 Type 2 report is the single most-requested artefact in security questionnaires. Type 1 (point-in-time) gets you in the door; Type 2 (12-month operating effectiveness) closes deals. Macksofy delivers Type 1 in 6–8 weeks and prepares for Type 2 across the observation window — coordinated with a US CPA firm for the final attestation.

Applicability
  • B2B SaaS targeting US + global enterprise
  • BPO / KPO with US customer accounts
  • Cloud-hosted services handling customer data
  • Fintechs serving US institutional clients
  • Healthtech (paired with HIPAA)
Standards & frameworks

Aligned to the regulations that matter.

AICPA SOC 2 — 2017 Trust Services Criteria (revised)
AICPA SOC 1 (financial reporting — separate engagement)
ISO 27001 (mapped — 60% control overlap)
PCI-DSS (where in scope)
Methodology

How we run a SOC 2 engagement.

Interactive walkthrough — every phase clickable, every activity documented, every artefact regulator-ready.

  1. 01
    1 · TSC scoping
    • Security (mandatory) + optional categories
    • System description authoring
    • Sub-service organisation mapping
  2. 02
    2 · Control implementation
    • Common Criteria (CC1–CC9) build-out
    • Availability / Confidentiality / PI / Privacy controls (where in scope)
    • Evidence collection workflow + automation
  3. 03
    3 · Type 1 readiness audit
    • Macksofy internal audit (point-in-time)
    • Findings + remediation
    • Coordination with CPA for Type 1 attestation
  4. 04
    4 · Type 2 observation window
    • 12-month evidence collection (typically 6 + 6)
    • Quarterly check-ins + control sampling
    • Annual control testing
  5. 05
    5 · Type 2 attestation
    • Auditor walkthrough + sample testing
    • Findings closure
    • SOC 2 Type 2 report issuance
Deliverables

Everything you need to satisfy auditors.

  • System description + control matrix
  • Common Criteria + optional category control evidence
  • Type 1 readiness audit report
  • Type 2 evidence dashboard
  • CPA-firm attestation coordination
  • Annual SOC 2 cycle playbook
Recent engagements
B2B SaaS (Series-C, India + US)

First-time SOC 2 Type 1 → Type 2

Outcome: Type 1 in 7 weeks; Type 2 issued at month 13; closed three US enterprise deals tied to attestation

At a glance

The shape of a SOC 2 engagement.

Every number below is grounded in how Macksofy actually runs the engagement — not aspirational marketing copy.

0
Methodology phases
0
Documented activities
0
Auditor-ready deliverables
0 day
Day retest window
Audit pillars

What we actually examine.

Each pillar is a distinct workstream inside the engagement — scoped, evidenced, and signed off independently before the audit pack is assembled.

18CONTROLS MAPPEDacross 6 pillars
Coverage breakdown
  • Trust Service Criteria scoping3 pts
  • Common Criteria controls3 pts
  • Trust Services — availability3 pts
  • Trust Services — confidentiality & privacy3 pts
  • Type 1 vs Type 2 readiness3 pts
  • Auditor handover pack3 pts
Pillar 01
Trust Service Criteria scoping

Pick the right criteria — most SaaS in India over-scope and over-pay.

  • Security (common criteria) — mandatory baseline
  • Availability / Confidentiality / Privacy as relevant
  • System description aligned to your customer commitments
Pillar 02
Common Criteria controls

The 100+ control points every SOC 2 audit hinges on.

  • Control environment + risk-assessment posture
  • Logical & physical access controls
  • System operations + change management
Pillar 03
Trust Services — availability

If you sell uptime SLAs, this is the criteria your customers want evidenced.

  • Capacity-management + monitoring evidence
  • Backup, replication, DR test artefacts
  • Incident-response playbooks linked to SLOs
Pillar 04
Trust Services — confidentiality & privacy

Cross-border data flows + DPDP / GDPR overlap covered in one pass.

  • Encryption-at-rest / in-transit posture
  • Data-retention & disposal policy evidence
  • Sub-processor + DPA management
Pillar 05
Type 1 vs Type 2 readiness

Most Indian SaaS go Type 1 first — we tell you when Type 2 is realistic.

  • Type 1 — point-in-time design assessment
  • Type 2 — 3 to 12-month evidence window
  • Sampling-strategy alignment with your CPA / AICPA-licensee
Pillar 06
Auditor handover pack

Everything your independent CPA needs, in the format they prefer.

  • Walk-through narratives + control matrix
  • Population lists + sampling artefacts
  • Management assertion + remediation log
Engagement timeline

From kick-off to regulator-ready report.

The horizontal flow below shows the typical week-by-week shape of a SOC 2 engagement. Click any station for detail in the methodology section above.

01
Week 1
TSC scoping
02
Week 2
Control implementation
03
Week 3
Type 1 readiness audit
04
Week 4
Type 2 observation window
05
Week 5
Type 2 attestation
What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Things compliance leads ask before signing.

Type 1 is point-in-time; gets you into procurement. Type 2 is 12-month operating effectiveness; required to close enterprise deals. Most clients pursue both consecutively.
Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.