NIS2 and SaaS: EU Compliance Guide for IT Leaders
NIS2 is the biggest EU cybersecurity regulation since GDPR — with major implications for SaaS. Learn what IT leaders need to know about compliance.
SOC 2 is the gold standard for SaaS security. Learn the five trust criteria, how to evaluate vendor SOC 2 reports, and maintain compliance.
If you evaluate SaaS vendors, you've seen the question: "Do you have a SOC 2 report?" SOC 2 (System and Organization Controls 2) has become the de facto security standard for cloud service providers. It's the most commonly requested compliance certification in SaaS procurement, and increasingly, it's a baseline requirement — not a differentiator.
But SOC 2 is widely misunderstood. It's not a pass/fail certification. It's not a guarantee of security. And having a SOC 2 report doesn't mean all your compliance obligations are covered. Understanding what SOC 2 actually tells you — and what it doesn't — is essential for managing SaaS security effectively.
SOC 2 is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA). It evaluates a service organization's controls related to five Trust Service Criteria:
The foundation of every SOC 2 report. Security controls protect systems against unauthorized access, both physical and logical:
Controls that ensure systems operate and are accessible as committed:
Controls that ensure system processing is complete, accurate, and authorized:
Controls that protect confidential information:
Controls that protect personal information per the organization's privacy commitments:
Most SaaS vendors pursue SOC 2 with Security as the only criteria. Some add Availability and Confidentiality. Privacy is less common (GDPR requirements often address this separately).
| Type I | Type II | |
|---|---|---|
| Scope | Design of controls at a point in time | Design AND operating effectiveness over a period |
| Duration | Single date | Typically 6-12 months |
| Assurance level | Lower — controls are designed but not proven to work | Higher — controls are tested and verified over time |
| Value | Baseline evidence that controls exist | Strong evidence that controls work consistently |
| Typical use | First-time SOC 2 | Ongoing annual reports |
Always request Type II. A Type I report tells you controls are designed; a Type II report tells you they actually work. For vendor risk assessments, Type II is the standard expectation.
SOC 2 reports can be dense. Here's what to focus on:
Understand what the report covers:
The core of the report. For each criterion, the auditor lists:
Focus on: Controls related to access management, data encryption, incident response, change management, and monitoring.
This is the most important section. Look for:
A clean SOC 2 Type II report means: The independent auditor tested the vendor's controls over 6-12 months and found them operating effectively, with no material exceptions.
If your organization is itself SOC 2 compliant (or pursuing compliance), your SaaS vendors are part of your control environment:
This means you need to:
SOC 2 has blind spots that other frameworks address:
| Gap | What's Missing | Complementary Framework |
|---|---|---|
| Data privacy (EU) | GDPR-specific requirements | GDPR compliance |
| EU cybersecurity regulation | Supply chain, incident reporting | NIS2 |
| Specific security controls | Prescriptive security requirements | ISO 27001 |
| Data residency | Where data is stored geographically | GDPR, national regulations |
| SaaS configuration | Your configuration of the vendor's product | SSPM |
SOC 2 tells you the vendor's controls are effective. It doesn't tell you your configuration of the vendor's product is secure. A vendor can have a perfect SOC 2 report while your instance has MFA disabled and sharing set to public.
Discover every SaaS vendor and classify by data sensitivity:
For Tier 1 and 2 vendors:
For each SOC 2 report:
For vendors without SOC 2:
SOC 2 is an annual report. Between reports:
For organizations maintaining their own SOC 2 compliance in a SaaS-heavy environment:
SOC 2 is necessary but not sufficient for SaaS security. It tells you that a vendor's controls were working during the audit period. It doesn't tell you whether the vendor covers the services you use, whether your configuration is secure, or whether the vendor meets European regulatory requirements.
Use SOC 2 as a foundation — not a finish line. Collect reports from critical vendors, review them for exceptions and scope gaps, implement the user-entity controls they specify, and layer on continuous monitoring for the periods between audits. Combine with GDPR and NIS2 assessments for complete compliance coverage.
Want to see which SaaS vendors in your environment have SOC 2 reports — and which don't? Book a demo and get a complete vendor compliance map in 15 minutes.
NIS2 is the biggest EU cybersecurity regulation since GDPR — with major implications for SaaS. Learn what IT leaders need to know about compliance.
Learn proven SaaS data protection strategies, from classification to DLP, that keep your cloud data secure and compliant with regulations.
Unsanctioned SaaS apps create security blind spots traditional tools miss. Learn the top SaaS security risks and practical strategies for closing them.