SOC 2 will not save you in diligence

Founders treat the SOC 2 report as a finish line. Buy-side diligence teams treat it as the floor of a much longer conversation.

A SOC 2 Type II report is one of those documents that founders feel relieved to produce. The audit took six months. The auditor’s findings were addressed. The customer-facing question of “do you have SOC 2?” can finally be answered yes. Most founders then put the report into the data room as if it were the answer to a question rather than the start of one. Buy-side diligence teams treat it the other way around, and that mismatch is the most common surface area for valuation pressure I see.

What buy-side diligence does with a SOC 2 report is not “check the box.” It is to read the report carefully, look at the exceptions, look at the scope, look at the period covered, and look at what was excluded. The findings that come out of that reading tend to fall into three predictable buckets.

The first is scope. SOC 2 reports are scoped to the systems and processes the company chose to include. If the report covers the production environment but not the corporate IT environment that has access to production, the report does not actually answer the diligence question. If the report covers the security trust services criterion but not availability, confidentiality, or processing integrity, a buyer focused on availability has to do their own work. The scope decision was a reasonable cost-saving choice during the audit. It is also a defensible diligence finding when the buyer asks why the rest is missing.

The second is exceptions. Every SOC 2 report has some. The exceptions are usually mundane: a missed quarterly access review, a deviation from the password policy, a security incident that was contained. Founders read these as inconsequential because the auditor signed the report. Diligence teams read each exception as a question about how the company handles its own controls when no one is watching. The pattern of exceptions, more than any individual exception, is what the buyer is reading.

The third is what is not in the report at all. SOC 2 does not address most of what makes acquired technology companies risky in the deal context: open source license compliance, the cleanliness of IP assignments from prior contractors, the data classifications used to support enterprise customer commitments, the handling of customer data in vendor offboarding, the way the engineering team makes architecture changes that touch security. These are diligence topics that auditors do not look at, and that buyers absolutely do.

The practical takeaway for founders heading into a deal cycle is to treat the SOC 2 as the resume, not the interview. Read your own report critically before a buyer does. Address the obvious gaps. Have ready answers for the obvious follow-ups, particularly on scope, exceptions, and the topics SOC 2 does not cover. The buyers who reach valuation cuts in diligence are the ones who came in expecting the SOC 2 to do more work than it can do.