A GRC practitioner’s guide to the Trust Services Criteria (TSC) — covering the AICPA’s five trust categories, the COSO-based structure of SOC 2 reports, Type I vs Type II audits, industry applicability, and the documentation required to achieve and maintain attestation.
The Trust Services Criteria (TSC), developed by the American Institute of Certified Public Accountants (AICPA), is one of the most widely recognized frameworks for evaluating cybersecurity assurance — especially for technology and service-oriented companies.
The TSC underpins System and Organization Controls (SOC) 2 and SOC 3 reporting. It is not a regulation or security standard in the technical sense, but rather a control framework designed to help organizations evaluate and report on the design and operating effectiveness of controls over data security, confidentiality, privacy, availability and processing integrity.
This page provides a cybersecurity-focused summary of the Trust Services Criteria from a GRC practitioner’s perspective, including the history of the framework, practical compliance strategies and the role of high-quality documentation to be secure, compliant and resilient.
The Trust Services Criteria (TSC), developed by the AICPA, is one of the most widely recognized frameworks for evaluating cybersecurity assurance, especially for technology and service-oriented companies. The TSC underpins SOC 2 and SOC 3 reporting. It is not a regulation or security standard in the technical sense, but rather a control framework designed to help organizations evaluate and report on the design and operating effectiveness of controls over data security, confidentiality, privacy, availability and processing integrity.
The TSC traces its origins to the AICPA’s efforts to standardize assurance reporting on systems and controls in organizations that provide services to other entities. Prior to the introduction of SOC reports, Statement on Auditing Standards (SAS) 70 was often misapplied to IT environments, though it was originally designed for financial reporting audits.
Recognizing the need for a more IT- and cybersecurity-aligned assurance framework, the AICPA introduced Service Organization Control (SOC) reports in 2011 under the Statement on Standards for Attestation Engagements (SSAE) framework. SOC 1 covers controls relevant to financial reporting; SOC 2 covers controls relevant to the Trust Services Criteria; and SOC 3 covers the same criteria as SOC 2 in general-use reports without the confidential detail.
In 2017, the AICPA issued a major update structuring the criteria around five trust service categories, each supported by common and supplementary criteria, aligned to the COSO Internal Control–Integrated Framework and incorporating references to ISO 27001, NIST CSF, COBIT and GDPR.
The core pillar covering logical and physical access controls, system and operations security, risk assessment, incident detection and response, and governance and oversight.
Whether the system is available for operation and use as committed or agreed, including capacity planning, performance monitoring, and disaster recovery and backup processes.
Ensures accurate, timely and authorized processing of data, covering input validation, processing accuracy, and output completeness.
Protection of confidential information shared by customers or partners, including data classification and retention, encryption and secure data disposal, and confidentiality agreements.
Based on the AICPA’s Generally Accepted Privacy Principles (GAPP) and aligned to global privacy standards (e.g., GDPR, CCPA), covering notice and consent mechanisms, personal data access and correction, and privacy governance and accountability.
The TSC and SOC 2 reporting are particularly relevant for service organizations — entities that process, store or manage customer data or operations. The framework is especially useful in sectors where organizations don’t fall under strict statutory cybersecurity requirements but still need to prove due care and control integrity.
Most cloud and software-as-a-service companies undergo SOC 2 examinations as a core part of their customer assurance and go-to-market strategy. Customers increasingly require SOC 2 reports as part of their vendor risk management programs.
While not replacing PCI DSS or GLBA compliance, TSC-based SOC 2 audits give fintech firms a way to demonstrate the strength of their security and availability controls to institutional partners, investors and banking regulators.
Health technology vendors and processors of protected health information leverage the Trust Services Criteria to address security and availability expectations in parallel with HIPAA compliance obligations.
Managed IT service providers, co-location facilities and third-party data processors use SOC 2 reports to contractually demonstrate cybersecurity and operational reliability to enterprise customers.
Identify the system under examination, determine which Trust Services Categories apply based on customer needs and risk exposure, and engage a licensed CPA firm that performs SOC 2 audits in accordance with AICPA attestation standards.
Implement technical security measures (access control, logging, alerting, encryption), establish governance artifacts (risk assessments, policies, procedures) and deploy security awareness training and operational processes.
A Type I report assesses the design of controls at a specific point in time. A Type II report assesses both the design and operating effectiveness of controls over a period (typically 6–12 months). Type II reports carry more weight in enterprise and regulated environments.
Track changes in risk exposure and update controls, conduct periodic reviews and incident simulations, and prepare annually for re-audits and customer/vendor scrutiny.
The TSC is rooted in the COSO Internal Control–Integrated Framework, a globally accepted model for enterprise risk management. Each criterion follows COSO’s five components of internal control: Control Environment, Risk Assessment, Control Activities, Information and Communication, and Monitoring Activities.
Under each component, the TSC defines “common criteria” applying to all five Trust Services Categories, and “supplemental criteria” specific to Availability, Confidentiality, Privacy and Processing Integrity. Each criterion is supported by Points of Focus that serve as implementation considerations — analogous to control objectives or safeguards in other frameworks.
The flexibility of this structure allows organizations to tailor their control implementations to their unique operational model, size and risk profile. For example, Common Criteria 6.1 (Logical Access Controls) maps to sub-controls such as unique user identification, role-based access provisioning, multi-factor authentication and periodic access reviews.
Attests that controls are suitably designed to meet the applicable Trust Services Criteria as of a specific point in time. Useful as a starting point or for organizations early in their compliance journey, but provides limited assurance about operational effectiveness.
Attests that controls are suitably designed and were operating effectively over a defined review period, typically six to twelve months. Type II reports carry significantly more weight with enterprise customers, regulated clients and board-level governance stakeholders.
Documented evidence is the foundation of a successful SOC 2 examination. Unlike checkbox assessments, SOC 2 reports are attestation engagements, meaning that auditors form an opinion based on documented control design, operation and effectiveness. The strength of cybersecurity documentation often determines the success of TSC alignment and SOC 2 attestation.
Well-crafted policies and procedures directly support Common Criteria such as CC1.2 (commitment to integrity and ethical values), CC2.1 (specification of suitable objectives) and CC3.2 (risk identification and assessment). Auditors review these artifacts for completeness, version control and alignment to actual operations.
Operational procedures, playbooks and technical standards demonstrating how controls are consistently implemented, including access management SOPs, change management workflows, incident response plans and simulations, and asset and vulnerability management guidelines.
Accurate and detailed network diagrams, data flow maps and architectural documentation reduce audit friction and clarify scope. The system description section of the SOC 2 report must clearly articulate scope boundaries, types of data handled, infrastructure and technologies used, and third-party dependencies.
Audit logs, alert tickets, system reports and event response records are critical for evaluating the operating effectiveness of controls over the review period. Without this documentation, auditors cannot attest to whether controls were applied over time.
Documentation of findings, root cause analysis and control updates demonstrates a mature security program and supports Monitoring Activities under COSO. These records are reviewed to assess how the organization responds to incidents and control failures.
The SCF is the Common Controls Framework™ (CCF™) — a free, volunteer-driven metaframework with 1,400+ controls across 33 domains and 200+ law, regulation, and framework mappings including the Trust Services Criteria.