Trust Services Criteria Cost

Confidentiality TSC Cost in SOC 2: $5K-$15K Add-On

Confidentiality is the second most common optional Trust Services Criterion to add to a SOC 2 audit, after Availability. The criterion overlaps significantly with Security but layers on explicit data classification and confidentiality-specific control coverage. This page walks through the realistic add-on cost, explains the data-classification scheme requirement, and notes when scoping Confidentiality in is editorially defensible.

Audit Fee Add-On

$5K-$15K

Total First-Year Add-On

$12K-$35K

Difficulty

Easy add-on

What Confidentiality actually requires

The AICPA Trust Services Criteria for Confidentiality define the controls that demonstrate confidential information designated as such is protected as committed or agreed. The criterion is published as part of the AICPA TSP Section 100 framework available at aicpa.org and covers four domain areas: data classification (identifying which information is classified as confidential), encryption requirements both at rest and in transit, access controls restricting confidential data to authorised users, and secure data deletion procedures with verification. The control set is layered on top of the Security Common Criteria; a Confidentiality scope means the auditor tests the Common Criteria plus the Confidentiality-specific criteria during the same engagement.

The reason Confidentiality is the second-easiest of the four optional criteria to add (after Availability) is that 60 to 80 percent of the controls are already covered by the Security Common Criteria. Encryption at rest, encryption in transit, access controls, and secure data handling are all part of the baseline Security work. The marginal audit work for Confidentiality is the explicit data classification scheme (which most SaaS does not have formally documented even when it operates implicit classification through engineering practice) and the confidentiality-specific evidence that demonstrates the classification scheme is being applied consistently.

Realistic add-on cost across vendors

The audit fee add-on for Confidentiality is consistent across audit firm tiers, similar to Availability but typically $1,000 to $3,000 higher because of the data-classification-scheme review work. Boutique firms (Linford & Co, Johanson Group, Prescient Assurance) typically add $5,000 to $9,000 to the SOC 2 Type 2 with Security only fee. Mid-tier firms (Schellman, A-LIGN, Coalfire, BDO) typically add $9,000 to $15,000. Big 4 firms add proportionally more. Beyond the audit fee, expect $4,000 to $12,000 in additional readiness work to develop and document the data classification scheme (this is where the marginal effort sits) and $3,000 to $10,000 in additional internal staff time during the audit fieldwork phase.

Total Confidentiality scope-in cost is typically $12,000 to $35,000 across the first year. Year-2 and beyond drops to $7,000 to $18,000 as the data classification scheme and the evidence flow are operational. The total cost is comparable to Availability but with more upfront readiness work because the data classification scheme is typically a new artifact that the SaaS must develop and document explicitly.

When to scope Confidentiality in

The clearest scoping decision is whether the customer Master Services Agreements include data confidentiality classifications. If the SaaS receives customer data that the MSA designates as confidential (which is typical for B2B SaaS handling enterprise customer data), Confidentiality scope is typically the right call because the customer's procurement team will see the Confidentiality TSC in the SOC 2 report as objective evidence that the SaaS has tested controls protecting the data classified as confidential. Without Confidentiality scope, the customer has the contractual confidentiality commitment but no third-party-attested operational verification.

The secondary scoping driver is the customer base composition. SaaS selling primarily into late-stage enterprise procurement (where data confidentiality classifications are deeply tracked through vendor risk reviews) benefits more from Confidentiality scope than SaaS selling into smaller customers. The third driver is the SaaS's existing data handling practices. Companies that already operate explicit data classification through engineering practice (e.g. data lifecycle management with explicit policies for customer data, source code, financial data, and employee data) find Confidentiality scope nearly free in marginal effort terms; companies that operate implicit classification need to formalise the scheme before the audit.

When to skip Confidentiality and stay with Security only

Consumer SaaS, internal-tool SaaS, and pure aggregated-analytics SaaS without confidentiality classifications can typically skip Confidentiality and stay with Security only. The criterion does not provide additional procurement signal for buyers who do not handle data with explicit confidentiality classifications. SaaS at very early stage where the data handling practices are still maturing can defer Confidentiality scope to a later year when the operational practices are formalised.

The other case for skipping is when the SaaS handles customer data but the customer base does not specifically require confidentiality controls in vendor risk reviews. This is increasingly rare in B2B enterprise procurement but still common in SMB-focused SaaS where vendor risk reviews are less formal. Adding Confidentiality scope without the customer-facing demand for it is over-spend.

Specific controls to implement or formalise

The control set that satisfies Confidentiality TSC requirements is consistent across audit firms. Document the following: data classification scheme with classification levels (typically Public, Internal, Confidential, Restricted) and handling procedures for each level; encryption at rest for confidential data using AES-256 or equivalent (most managed cloud database services provide this by default); encryption in transit using TLS 1.2 or higher (TLS 1.3 preferred); access controls restricting confidential data to authorised users with documented authorisation procedures and periodic access reviews (typically quarterly or semi-annual); documented secure data deletion procedures with verification (cryptographic deletion of encryption keys for confidential data is the simplest implementation); confidentiality agreements signed by all employees and contractors with access to confidential data, plus vendor confidentiality agreements where applicable; documented data retention schedule with explicit confidential-data retention rules; key management procedures for encryption keys including rotation schedule. Most B2B SaaS at Series A and beyond already has these; the SOC 2 work is documenting the data classification scheme and the confidentiality-specific access controls.

How Confidentiality fits with the other optional criteria

For most B2B SaaS handling enterprise customer data, the typical scoping order is Availability plus Confidentiality together, both layered onto Security Common Criteria. The combined two-criterion add-on costs $10,000 to $30,000 on the audit fee side (plus readiness and staff time) and provides the broadest procurement-team coverage for typical B2B SaaS vendor risk review questions. Processing Integrity is rarely scoped except for SaaS where data processing accuracy is core to the value proposition. Privacy is the highest-cost add-on and is typically scoped only for GDPR / CCPA-regulated SaaS, healthcare, AdTech, or edutech where the privacy-control overlay is editorially required.

The other practical consideration is that adding Confidentiality scope requires the data classification scheme to be in place before the audit observation period begins (3 to 12 months before the report date). If the SaaS does not have a documented data classification scheme today, plan to develop and implement it during the readiness phase before the audit observation period begins, not during fieldwork.

Frequently Asked Questions

How much does the Confidentiality TSC add to a SOC 2 audit?
Adding Confidentiality to a SOC 2 audit typically adds $5,000 to $15,000 to the audit fee. Boutique firms add $5,000 to $9,000; mid-tier firms add $9,000 to $15,000. Beyond the audit fee, expect $4,000 to $12,000 in additional readiness work and $3,000 to $10,000 in additional internal staff time. Total Confidentiality scope-in cost is typically $12,000 to $35,000 across the first year.
What does the Confidentiality TSC require?
Confidentiality requires controls that demonstrate confidential information designated as such is protected as committed or agreed. AICPA TSC for Confidentiality covers data classification (identifying what data is confidential), encryption requirements (at rest and in transit), access controls specific to confidential data, secure data deletion procedures, and confidentiality agreements with employees and vendors. Most B2B SaaS already implements the underlying controls; the audit work is documenting the data-classification scheme and confidentiality-specific control coverage.
Who needs the Confidentiality TSC?
Most B2B SaaS handling customer data classified as confidential under MSAs should add Confidentiality. The criterion gives the customer's procurement team objective evidence that the SaaS has tested controls protecting the customer data classified as confidential, which is what enterprise procurement typically asks about in vendor risk reviews. Consumer SaaS, internal-tool SaaS, and pure aggregated-analytics SaaS without confidentiality classifications can typically skip Confidentiality and stay with Security only.
How does Confidentiality overlap with Security?
Significantly. The Security Common Criteria already cover access controls, encryption, and secure data handling at a general level. Confidentiality layers on top by requiring explicit data classification (what is confidential vs not) and confidentiality-specific control coverage (encryption is required at rest and in transit, access is restricted to authorised users, deletion is verifiable). For most SaaS, 60 to 80 percent of the Confidentiality controls are already covered by Security; the marginal audit work is the data classification scheme and the confidentiality-specific evidence.
Does Confidentiality require a formal data classification scheme?
Yes, in some form. The auditor will expect documented criteria for what makes data confidential (e.g. customer data subject to MSAs, source code, internal financial information, employee personal data) and documented procedures for handling confidential data through its lifecycle. The classification scheme can be simple (typically three or four classification levels: Public, Internal, Confidential, Restricted) and the implementation can be lightweight, but it must exist and be documented.
What controls should I implement for Confidentiality?
Typical controls include: documented data classification scheme with classification levels and handling procedures; encryption at rest for confidential data (AES-256 standard); encryption in transit (TLS 1.2 or higher); access controls restricting confidential data to authorised users with documented authorisation procedures; documented secure data deletion procedures with verification; confidentiality agreements signed by employees and vendors; documented data retention schedule; key management procedures for encryption keys. Most B2B SaaS at scale already has these; SOC 2 work is documenting the data classification scheme.

Updated 2026-05-11