Get fresh insights, pro tips, and thought starters–only the best of posts for you.
Trust Services Criteria (TSC) are a standardized set of principles developed by the AICPA to evaluate how organizations safeguard systems and data. They underpin SOC 2 reporting and focus on five areas: security, availability, processing integrity, confidentiality, and privacy, helping auditors assess whether controls are properly designed and effective.
The Trust Services Criteria form the foundation of SOC 2 audits. They translate high-level security expectations into clear, testable controls that auditors can objectively evaluate.
The five criteria include:
While all five are important, only Security is required for every SOC 2 report. The remaining criteria depend on the organization’s services and compliance scope.
To meet the this criteria, organizations must design, document, and enforce controls aligned with each category. Auditors then assess these controls based on the SOC 2 report type.
Evaluation approach:
Common implementation practices include:
| Criteria | Example Control |
| Security | Multi-factor authentication (MFA) |
| Availability | Disaster recovery and uptime monitoring |
| Processing Integrity | Automated validation and error checks |
| Confidentiality | Role-based data access restrictions |
| Privacy | Data consent and retention policies |
Endpoints like laptops, smartphones, and tablets are critical to meeting Trust Services Criteria, especially for Security and Confidentiality. Poorly managed devices increase the risk of unauthorized access and data exposure.
Hexnode UEM can support endpoint security and compliance workflows through documented capabilities such as compliance policies, device management, and patch management features.
These controls can help IT teams enforce documented security and compliance policies across managed devices.
Trust Services Criteria provide IT admins with a structured framework to demonstrate that security and data protection controls are properly designed and operating effectively for SOC 2 compliance.