SOC 2 Scope Definition: How to Pick What Gets Audited
Scope definition is the highest-leverage decision in SOC 2. Learn how to draw a defensible system boundary that keeps costs low and the audit clean.
- Scope defines which systems, services, and environments are covered by the SOC 2 audit — everything in scope must have controls and evidence.
- The narrowest defensible scope for most SaaS companies is: production application, cloud hosting account, identity provider, and source code management.
- Development and staging environments can typically be excluded with written justification — but only if they have no access to production customer data.
- Every system added to scope multiplies the evidence requirements multiplicatively — scope decisions have exponential, not linear, cost consequences.
- The system description in the SOC 2 report (Section III) must accurately and completely describe what is in scope.
In this guide
What SOC 2 Scope Actually Means
SOC 2 scope — formally called the "system" in SSAE 18 terminology — is the bounded set of infrastructure, software, people, processes, and data that are subject to the Trust Service Criteria evaluation. Everything inside the boundary must be addressed by controls; everything outside the boundary is not evaluated by the auditor.
Scope is defined by the system description: Section III of your SOC 2 report written by your management (not the auditor). It describes the service commitments and system requirements, the system components (infrastructure, software, people, processes, data), and the system boundaries — what is included and what is explicitly excluded and why.
Your auditor validates that the system description is fairly presented — meaning it accurately represents what you've described and doesn't omit systems that should be included. An auditor who discovers systems outside your stated boundary that process customer data will either require you to expand scope or note the limitation in the report.
Systems Typically In Scope
For a typical B2B SaaS product, in-scope systems include: (1) The production application servers and containers hosting your product. (2) The cloud hosting environment — typically the specific AWS accounts, GCP projects, or Azure subscriptions containing production workloads. (3) The production databases containing customer data. (4) The identity provider managing production system access (Okta, Google Workspace). (5) The source code management system (GitHub, GitLab, Bitbucket) because it controls what code reaches production. (6) The CI/CD pipeline that deploys to production.
Supporting systems that interact with in-scope systems also typically come in scope: your secrets management system (AWS Secrets Manager, HashiCorp Vault), your logging and monitoring platform (Datadog, CloudWatch) if it processes customer data, and your customer support system if support agents access customer data to resolve tickets.
People in scope include all personnel with access to in-scope systems — typically your engineering team, DevOps/SRE team, security team, and any support staff with production access. Contract employees and offshore development teams with production access are also in scope, which can significantly expand HR documentation requirements.
What Can Legitimately Be Excluded
Development and staging environments can be excluded if they are strictly isolated from production customer data. "Strictly isolated" means no production database credentials are used in staging, staging environments cannot access production APIs, and no real customer data is used in testing (synthetic or anonymized data only). If your staging environment connects to a production database for "realistic testing," it is in scope.
Internal tools that don't process customer data can typically be excluded: your Slack instance, your HR platform, your marketing automation, your internal wiki. The test is whether a compromise of that system would expose customer data or impair your ability to deliver the service. If yes, it belongs in scope.
Corporate IT systems (employee laptops, internal network) can sometimes be excluded through a network segmentation argument — if employee devices can't reach production systems directly and access is mediated through the in-scope identity provider (which enforces device compliance), the laptops themselves may be out of scope. This exclusion requires strong evidence of network segmentation and device management controls.
Carve-Out vs Inclusive Method for Vendors
When your in-scope systems rely on a third-party vendor (like AWS), you have two options for handling their portion of the controls. The carve-out method excludes the vendor's controls from your report entirely — your report says "the controls at AWS are not covered in this report; users should review AWS's own SOC 2 report." The inclusive method includes the vendor's controls in your report, requiring you to test and vouch for those controls.
Almost all SOC 2 reports use the carve-out method for IaaS providers like AWS, Google Cloud, and Azure. The inclusive method is used when you have direct visibility into and contractual control over the subservice organization's controls — typically in outsourcing relationships where you manage a vendor's environment.
Under the carve-out method, you list the subservice organization in your system description, describe what services they provide, and note that complementary subservice organization controls (CSOCs) are expected to be in place. Your enterprise customers can then review your report alongside AWS's SOC 2 report to get the complete picture.
Writing the System Description
The system description (Section III of the SOC 2 report) is written by management — not the auditor. Most CPA firms provide a template or guidance, but you are responsible for the content. The auditor's role is to evaluate whether the description is "fairly presented" — accurately describing the system without material omissions or misrepresentations.
The description typically includes: an overview of the service and its purpose, the infrastructure components (cloud environment, servers, databases, networks), the software components (application code, third-party libraries, operating systems), the people involved (roles, team structure, hiring and training practices), the processes (change management, access management, incident response), and the data (types of customer data processed, data flows, retention).
Write the description for an informed reader who is not familiar with your company. Enterprise security teams send your SOC 2 report to their auditors and legal teams — these readers need enough detail to understand what systems and data are covered. Vague descriptions ("our secure cloud-based platform") are insufficient and will trigger auditor comments.
Scope Creep: The Hidden Cost Driver
Scope creep — the gradual expansion of audit scope beyond the initial boundary — is one of the most common causes of SOC 2 cost overruns. It happens in two ways: intentional additions (adding systems to scope mid-engagement because a customer asks about them) and auditor-driven additions (the auditor discovers systems that should have been in scope and requires their inclusion).
Protect against scope creep by documenting your scope boundary explicitly before engaging the auditor. Define what is in scope, what is out of scope, and your written justification for each exclusion. Review this document with the auditor at engagement kickoff and get written agreement on the scope. If a customer asks about a system that is out of scope, respond that the SOC 2 covers the defined production environment and that the requested system is managed under a separate security assessment.
Adding systems to scope after the observation period has started requires extending the period for those systems or noting that they were added mid-period. Either outcome adds complexity and cost. Lock scope before the observation period begins and maintain it for the full year.
Frequently Asked Questions
Can we have different scopes for different customers?
Does the scope need to include all AWS accounts?
What if our scope changes between audits?
Does our mobile app need to be in scope?
How does multi-tenancy affect scope?
Automate your compliance today
AuditPath runs 86+ automated checks across AWS, GitHub, Okta, and 14 more integrations. SOC 2 and DPDP Act. Free plan available.
Start for free