Free Tool

SOC 2 Readiness Checklist

Assess your SOC 2 readiness across all five Trust Services Criteria — Security, Availability, Processing Integrity, Confidentiality, and Privacy. No signup, no install, no data leaves your browser.

This is a free, browser-based readiness checklist. Looking for full audit preparation? Our Pro Assessment Tool adds evidence tracking, gap analysis, ownership mapping, and executive reporting — all in your browser.

Launch Tool View All Resources

Need More?

Free Tool vs. Professional Toolkit

The free tool is a browser-based readiness checklist. The Professional Toolkit is an Excel workbook built for full audit preparation.

Feature Free Tool Professional
All 5 Trust Services Criteria
Progress tracking with visual indicators
Evidence notes per control
Save progress & export to CSV
Detailed control testing procedures
Evidence tracker with control ownership
Gap remediation planning
Type I vs. Type II readiness guidance
Auditor communication templates
Executive dashboard with charts
Upgrade to Pro — $399

Or get all tools: Complete Assessment Suite — $1,299

What's Included

Everything You Need

All 5 Trust Services Criteria

Complete coverage of Security (Common Criteria), Availability, Processing Integrity, Confidentiality, and Privacy.

Progress Tracking

Visual indicators showing completion percentage by criteria and overall readiness status.

Evidence Documentation

Attach notes and evidence references to each control point for audit preparation.

Status Tracking

Mark each control as Not Started, In Progress, Implemented, or Not Applicable.

Save & Export

Save progress as JSON to continue later. Export results to CSV for reporting.

Works Offline

Runs entirely in your browser. No server connection required.

Methodology

Trust Services Criteria Overview

SOC 2 examinations evaluate controls across five Trust Services Criteria defined by the AICPA.

CodeCriteriaDescription
CCSecurity (Common Criteria)Foundation for all SOC 2 reports — required for every examination
AAvailabilitySystems are available for operation and use as committed
PIProcessing IntegritySystem processing is complete, valid, accurate, and timely
CConfidentialityInformation designated as confidential is protected
PPrivacyPersonal information is collected, used, and retained appropriately

Getting Started

How to Use This Tool

  1. Launch the tool

    Click "Launch Tool" above. Everything runs in your browser — no data is sent anywhere.

  2. Select a criteria

    Start with Security (Common Criteria) as it's required for all SOC 2 reports.

  3. Assess each control

    Mark each control point as Not Started, In Progress, Implemented, or N/A.

  4. Add evidence notes

    Document your current controls and evidence for each point.

  5. Review progress

    Check your readiness percentage by criteria and overall.

  6. Save and export

    Save as JSON to continue later, or export to CSV for your audit team.

Free Assessment Tools

More from IRONGATE

NIST CSF 2.0 Assessment Tool CMMC Level 2 Gap Analysis FedRAMP Low Baseline Assessment Risk Register Risk Management Risk Treatment Remediation Tracking Crosswalk Framework Mapping TPRM Vendor Assessment Policy Package 5 Policies + Tracker