Product Guide

You Don't Need SOC 2 Yet. Start Anyway.

Generative Labs

A prospect asks "are you SOC 2 compliant?" and you freeze. You're not. You just got your MVP launched. But you just realized the enterprise market you're building toward will ask this question every time.

Here's the good news: you don't need SOC 2 today. Here's the better news: you can start building toward it right now, and it's not what you think.

What SOC 2 actually is

Most founders hear "SOC 2" and picture expensive security tools, consultants in suits, and months of painful remediation. That picture is wrong.

SOC 2 is an audit of your operations against five trust service criteria: security, availability, processing integrity, confidentiality, and privacy. An auditor reviews your policies, your evidence that you follow them, and your controls. The key word is operations. Most of the work is operational, not technical.

This reframe matters. You don't need to buy a suite of enterprise security products. You need to make thoughtful decisions about how you operate, and write them down. That's work you can start today, at any stage, at nearly zero cost.

Start with policies, not products

You can write an acceptable use policy, an incident response plan, and a data handling policy before you have a single customer. These documents aren't bureaucracy. They're decisions about how you operate, written down.

The act of writing them forces the same kind of thinking that a product brief does: what do we actually do? Who's responsible? What happens when things go wrong? You think you know the answers until you try to write them in a sentence. Then you discover you haven't decided yet.

Three documents to start with:

  • Acceptable use policy. How your team uses company systems, devices, and data. What's allowed, what isn't, who to contact if something's off.
  • Incident response plan. What happens when something goes wrong. Who gets notified, what gets documented, how you communicate to affected parties. This doesn't need to be a 40-page playbook. One page with a clear chain of action is enough at five people.
  • Data handling policy. What data you collect, where it lives, who can access it, how long you keep it, and how you dispose of it. This one forces the most useful early thinking.

Writing these now costs you an afternoon. Retroactively documenting them during an audit scramble costs weeks.

Pick the controls that matter most

Forget the full SOC 2 control catalog for now. At ground zero, three controls carry most of the weight, and none of them are technical. They're policies and procedures. Get these right and you've built the spine the rest of the work hangs on.

Documented policies. The foundation. A small set of written policies, each a page or less at ground zero, signed off by leadership and reviewed annually. The auditor isn't grading the prose. They're checking that the policy exists, was approved, and gets followed.

This is also the skeleton of everything else. Once the policies exist, you have an inventory of the work ahead: every policy is a procedure to operationalize and a stream of evidence to collect. The base set most ground-zero startups need:

  • Information Security Policy. The umbrella. States your overall security commitment and references the rest.
  • Acceptable Use Policy. What employees can and can't do with company systems and data.
  • Access Control Policy. How access gets provisioned, reviewed, and revoked. Least privilege from day one.
  • Password and Authentication Policy. Length, complexity, MFA required everywhere.
  • Data Classification and Handling Policy. What data is sensitive, how each class gets handled, and who can touch it.
  • Data Retention and Disposal Policy. How long you keep data, how you delete it.
  • Encryption Policy. What's encrypted, how, and where.
  • Change Management Policy. How code and infrastructure changes get reviewed before production.
  • Vendor Management Policy. How you vet, monitor, and offboard third parties.
  • Incident Response Policy. Who calls who, what gets contained when, who communicates externally.
  • Business Continuity and Disaster Recovery Policy. What happens if something major breaks.
  • Risk Management Policy. How you identify, assess, and mitigate risks. Tied to an annual review.
  • HR Security Policy. Background checks, confidentiality agreements, security responsibilities at termination.
  • Security Awareness Training Policy. What training, how often, who's required.
  • Code of Conduct. Ethics, reporting violations, what counts as a disciplinary issue.

Don't write all 15 in week one. Start with the policies that govern day-one decisions: information security, acceptable use, access control, password/authentication, and data classification. Add the rest as the operational pieces come into focus. By the time the audit window opens, the full set should exist, signed, and dated.

A useful pattern: each policy points at a procedure (the "how we actually do this") and an evidence stream (where the audit proof comes from). Writing the policy surfaces the procedure that needs to exist. Writing the procedure surfaces the evidence you need to be capturing. The list above is the spine of the next six months of work.

Onboarding and offboarding. Same procedure, every time, for everyone who gets access. That includes contractors, freelancers, and short-term help, not just full-time hires. The audit will pull both kinds and ask to see the same evidence.

This is the single most-tested control in any SOC 2 engagement: show me your last three onboardings and your last three offboardings. If the procedure isn't written and the evidence trail isn't there, you fail it even if the technical access management is perfect.

What the procedure has to cover:

  • Before day one. Background check where appropriate and sized to the role. Signed offer or contract. Signed NDA. Acknowledgment of the security policies they need to read. Asset assignment recorded (laptop, hardware tokens, badges).
  • Day one. Accounts created from a checklist, not a Slack ping. Least-privilege access from the start (don't default to admin because it's faster). MFA enrolled before any account is used. A security orientation, even if it's a one-page doc with a sign-off.
  • First weeks. Manager confirms access matches role. New hire confirms they have what they need without sharing credentials with anyone.

Contractors specifically:

  • Time-bounded access with an explicit end date.
  • Scope-limited access. Only what the engagement requires.
  • Separate from FTE workflows where possible (different group memberships, different SSO groups).
  • Same NDA standards, often a separate contractor agreement.
  • Re-onboard if they come back. Don't reactivate dormant accounts.

Offboarding:

  • Same-day access revocation, all systems. Including the SaaS tools the auditor doesn't think about: the Figma seat, the read-only analytics login, the shared password manager vault.
  • Asset return: laptop, hardware tokens, badges.
  • SSO disabled, OAuth grants revoked, MFA backup contacts removed.
  • Email forwarding only if necessary, with a clear end date.
  • Document the offboarding: date, who did it, what was revoked, what was returned.
  • For contractors: same process when the engagement ends, not when the calendar says.

Edge cases worth thinking through:

  • Involuntary termination. Access cut before the conversation, not after.
  • Reduction in force. Coordinated cutoff across affected accounts.
  • Reactivations. If someone comes back, they re-onboard from zero.
  • Shared accounts. Ideally you have none. If you do, rotate every credential they touched.

Most teams treat onboarding as a project management item and offboarding as an HR thing. From a SOC 2 lens, they're the same control in two directions: a written procedure, a checklist, and a place where the completed checklist lives. That's it.

Access reviews. The companion control to onboarding and offboarding. Quarterly, two hours: pull the access list for every system that handles customer or business-critical data, walk through it, revoke what shouldn't be there.

This is what catches the long tail. The engineer who got prod access for one debugging session and still has it eight months later. The contractor whose end-date slid quietly. The role change where new permissions got added but the old ones never got removed.

What to actually review, per system:

  • Every account on the system, not just the ones you remember.
  • Whether the account holder still needs that access for their current role.
  • Whether the access level is least-privilege or accumulated drift.
  • Whether MFA is enforced on the account.
  • Whether the account is dormant (no login in 90+ days).
  • Whether shared accounts exist. Try to eliminate them.

Privileged accounts get a closer look:

  • Admin, prod, root, billing, anything that touches customer data.
  • Are admin accounts separate from daily-use accounts?
  • Are service accounts and API keys still needed? When were they last rotated?
  • Are there standing OAuth grants that should be revoked?

The systems to include are broader than people expect:

  • The obvious ones: cloud provider, code repository, prod databases, payment processor.
  • The less-obvious: email, calendar, Slack, password manager, error monitoring, support tools, marketing tools, analytics.
  • Customer-facing: support portals, admin consoles, escalation tools.
  • Internal: HR systems, finance, legal repositories.

The control runs on top of a layer of access controls that have to actually be enforced:

  • MFA on every account. No exceptions for admins or "I'll set it up later."
  • SSO wherever possible. A single front door is easier to review than a dozen scattered logins.
  • Strong password policy where SSO isn't available.
  • Hardware tokens (or OTP) for the highest-risk accounts.
  • Session timeouts on sensitive systems.
  • Logged audit trail of who accessed what.

The evidence the auditor wants is the trail of the review itself: the list before, the list after, who reviewed it, what changed, and the cadence (quarterly, not annually). The point isn't perfection on day one. It's a defensible record that the review is a real recurring habit. Two hours, four times a year, documented.

Operate as if you're being audited

This is the real shift, and it's behavioral, not technical.

Stop sharing credentials. Stop using personal email for business systems. Stop granting admin access to everyone because it's easier. Handle customer data deliberately, not casually. When you create a new service account, ask "who should have access to this?" before you hand out the keys.

The best time to build these habits is before you've built the bad ones. Retrofitting culture is harder than retrofitting code. A team of five that operates with security hygiene from day one carries those habits to 50. A team of five that operates casually spends months unlearning it later.

The same principle applies to engineering fundamentals. The habits you build early compound. The ones you skip come due later, with interest.

Document as you go

The killer in SOC 2 prep is retroactive documentation. Teams that wait until they're pursuing certification spend months reconstructing evidence of things they were already doing but never wrote down.

If you document your processes from the start, the audit evidence accumulates naturally. An auditor doesn't want to see that you started doing things right last month. They want to see a consistent pattern over time.

This doesn't mean building a compliance wiki. It means: when you decide how something should work, write it down. A lightweight "how we do X" doc for each critical process is enough. Onboarding a new team member? Write down the access provisioning steps. Deploying to production? Write down the process. Handling a customer data request? Write it down.

Future you, staring down an audit timeline, will be grateful.

Train your team

Even at three people, make security awareness part of onboarding. It doesn't need to be a course. A one-page doc: here's how we handle credentials, here's how we handle customer data, here's what to do if something seems wrong.

When the auditor asks "how do you ensure personnel understand their security responsibilities," you have an answer. More importantly, your team actually understands their security responsibilities. The document isn't performative. It's practical.

As you grow, this evolves into a more formal training program. But the seed is a single page written early, when the team is small enough that everyone actually reads it.

Choose infrastructure that grows with you

This is an architecture decision disguised as a compliance decision.

Pick cloud providers and tooling that already have compliance features built in: centralized logging, role-based access controls, encryption defaults, their own SOC 2 reports you can reference. Don't build on infrastructure you'll have to rip out later.

A startup that chose a managed database with automatic encryption, a cloud provider with built-in audit logging, and a secrets manager from day one has 60% of the technical controls covered before they've thought about compliance. A startup that built on bare VMs with manual deployments and credentials in environment variables has a migration project ahead of them.

The tools don't need to be expensive. They need to be the right tools.

Know when to formalize

SOC 2 has two stages:

Type 1 is a point-in-time snapshot. Your controls exist and are designed correctly. Think of it as "we have the policies and systems in place." This is achievable relatively quickly if you've been building the habits.

Type 2 is evidence over a period, usually six to 12 months. Your controls exist and you actually follow them consistently. Think of it as "we've been operating this way for a sustained period, and here's the proof."

The path: build habits from ground zero. When enterprise prospects start asking for SOC 2 (and they will), pursue Type 1. The habits you've already built become the foundation. Then operate under those controls for six to 12 months and pursue Type 2. If you started early, this isn't a transformation. It's a formality.

The compounding effect

Compliance isn't a gate you crash through when a deal requires it. It's a posture you build over time. Every policy you write today, every habit you build now, every process you document is one fewer fire drill later.

The founders who start at ground zero don't necessarily spend less total time on compliance. They spend less painful time. The work is spread across months of small decisions instead of compressed into a frantic sprint before a deadline.

Different journey. Stronger company.

And the company is better for it, not just the product. The same habits that satisfy an auditor (access control, logging, data handling, incident response) are the same habits that make software reliable and teams accountable. Product quality and company maturity move together.

Follow the thinking.

We write when we learn something worth sharing. No schedule, no spam.