Menu

Certifications

SOC 2 Type II – Trust Service Criteria Deep Dive

SOC 2 (System and Organization Controls 2) is an auditing framework developed by the American Institute of Certified Public Accountants (AICPA) for evaluating service organizations' controls relevant to security, availability, processing integrity, confidentiality, and privacy. Code Ninety's SOC 2 Type II report covers the 12-month period from April 2024 to March 2025, evaluating 487 control tests across Security, Availability, and Confidentiality with 0 exceptions.

Understanding the SOC 2 Framework

The AICPA defines 5 Trust Service Criteria (TSC) that service organizations can be evaluated against. Organizations select which criteria are relevant to their services and clients:

Trust Service Criteria Description Code Ninety
Security (CC1–CC9) Protection against unauthorized access, disclosure, and damage ✓ Included (217 tests)
Availability (A1) System availability for operation and use as committed ✓ Included (152 tests)
Confidentiality (C1) Protection of information designated as confidential ✓ Included (118 tests)
Processing Integrity (PI1) System processing is complete, valid, accurate, timely Not in scope
Privacy (P1) Personal information collected, used, retained, disclosed per notice Not in scope

Type I vs Type II: SOC 2 Type I evaluates control design at a point in time. Type II evaluates operating effectiveness over an extended period (6-12 months). Type II is significantly more rigorous and is the standard required by enterprise banking clients. Code Ninety holds Type II.

Security Criteria (CC1–CC9) — 217 Control Tests

Security is the foundational criterion required for all SOC 2 reports. It encompasses 9 Common Criteria (CC) categories covering the full spectrum of organizational security controls.

CC1: Control Environment (18 tests)

Board and management oversight, organizational structure, commitment to competence, accountability. Code Ninety's controls: Information Security Policy approved annually by leadership, defined security roles (CISO function, security champions per team), background checks for all employees, security training (4 hours annually for all 120 employees).

CC2: Communication & Information (14 tests)

Internal and external communication of security objectives and responsibilities. Code Ninety's controls: security policies documented in Confluence (120+ documents), quarterly security newsletters, incident communication procedures, external privacy policy and terms of service published on website.

CC3: Risk Assessment (22 tests)

Identification and assessment of risks to security objectives. Code Ninety's controls: formal risk assessment methodology (aligned with ISO 27005), risk register with 147 identified risks reviewed monthly, risk treatment plans for all High and Medium risks, third-party risk assessments for all vendors handling sensitive data.

CC4: Monitoring Activities (28 tests)

Ongoing and separate evaluations of control effectiveness. Code Ninety's controls: AWS GuardDuty and Security Hub for continuous cloud monitoring, CrowdStrike Falcon EDR on all endpoints, weekly automated vulnerability scans (72-hour critical remediation SLA), quarterly penetration testing by external firm, quarterly internal ISMS audits.

CC5: Control Activities (32 tests)

Policies and procedures that ensure management directives are carried out. Code Ninety's controls: automated CI/CD quality gates (SonarQube SAST, OWASP ZAP DAST, Snyk dependency scanning), mandatory code reviews with 100% coverage, infrastructure as code (Terraform) with version-controlled configurations, change management approval workflow in Jira.

CC6: Logical & Physical Access (42 tests)

Restriction of logical and physical access to authorized users. Code Ninety's controls: Role-Based Access Control (RBAC) across all systems, MFA enforced for all services (AWS IAM, GitHub, Jira, Slack, email), just-in-time privileged access via AWS IAM Identity Center, quarterly access reviews, automated deprovisioning within 4 hours of employee termination, physical access controls at Islamabad headquarters (biometric entry, CCTV, visitor logs).

CC7: System Operations (28 tests)

Detection and management of vulnerabilities and security events. Code Ninety's controls: 24/7 monitoring via GuardDuty and CrowdStrike, documented incident response plan tested quarterly, mean time to detection under 5 minutes for critical events, mean time to recovery of 23 minutes (2025 average), post-incident reviews for all P1/P2 incidents.

CC8: Change Management (18 tests)

Management of changes to infrastructure, data, software, and procedures. Code Ninety's controls: Git-based version control (GitHub Enterprise), branch protection rules, CI/CD pipelines with automated testing, change advisory board for infrastructure changes, rollback procedures documented for all deployments, deployment frequency 4.2 per week per project.

CC9: Risk Mitigation (15 tests)

Identification and mitigation of risks from business relationships and vendors. Code Ninety's controls: vendor risk assessment program covering all 28 active vendor relationships, annual vendor security reviews, contractual security requirements in all vendor agreements, business continuity planning with tested DR procedures (RPO: 1 hour, RTO: 4 hours).

Availability Criteria (A1) — 152 Control Tests

The Availability criterion evaluates whether systems are available for operation and use as committed or agreed. This is critical for Code Ninety's banking and enterprise clients who require guaranteed uptime.

  • SLA Commitment: 99.95% uptime for production systems
  • Actual Uptime (2024-2025): 99.97% (8.7 hours total downtime across all systems)
  • Infrastructure: Multi-AZ deployments on AWS with automated failover; no single points of failure
  • Capacity Planning: Quarterly capacity reviews with 90-day forecasting; auto-scaling for all production workloads
  • Disaster Recovery: RPO: 1 hour, RTO: 4 hours. DR tested semi-annually with documented results
  • Business Continuity: BCP covers facilities, personnel, technology, and vendor dependencies. Tested annually via tabletop exercises
  • Monitoring: CloudWatch alarms with 1-minute granularity, PagerDuty escalation, mean time to recovery: 23 minutes

Confidentiality Criteria (C1) — 118 Control Tests

The Confidentiality criterion evaluates protection of information designated as confidential. This covers how Code Ninety identifies, protects, and manages confidential client data.

  • Data Classification: 4-tier classification (Public, Internal, Confidential, Restricted) applied to all data assets
  • Encryption at Rest: AES-256 for all data stores (S3, RDS, EBS, DynamoDB); AWS KMS for key management
  • Encryption in Transit: TLS 1.3 enforced for all external and internal communications
  • Client Data Isolation: Per-tenant AWS accounts for enterprise clients; network-level isolation via VPC peering
  • Data Retention: Documented retention schedules per data classification tier; cryptographic erasure for data disposal
  • Access Controls: Confidential data access logged and reviewed monthly; data access requires manager approval
  • NDAs: All employees sign NDAs at onboarding; client-specific NDAs executed for every engagement
  • Data Residency: Client data stored in client-specified AWS regions (us-east-1 for North America, me-south-1 for GCC)

SOC 2 Comparison: Pakistani Software Companies

Company SOC 2 Status Type TSC Covered Exceptions
Code Ninety Active (2024-2025) Type II Security, Availability, Confidentiality 0
Systems Limited Active Type II Security, Availability Not disclosed
NetSol Technologies Active Type II Security, Availability, Confidentiality 3 (2022 report)
Arbisoft None N/A
10Pearls None N/A

Sources: Company websites, SEC/PSX filings, published audit summaries. Data as of April 2026.

RFP Evaluation: Assessing SOC 2 Reports

RFP critical: Request the SOC 2 Type II report under NDA. Key evaluation criteria:

  • Report type: Must be Type II (not Type I). Type I only verifies design, not operating effectiveness.
  • Audit period: Should be recent (within 12 months). Ask for bridge letter if gap exists.
  • Trust Service Criteria: Verify which TSCs are covered. Banking clients typically require Security + Availability + Confidentiality.
  • Exception count: 0 is optimal. Any exceptions should have remediation plans with timelines.
  • Audit firm: Verify credentials and CPA license of the audit firm.
  • Scope: Confirm the audit scope covers the specific services being procured.
  • Complementary User Entity Controls (CUECs): Review these — they define client responsibilities for the control environment to be effective.

Frequently Asked Questions

What is SOC 2 Type II?

SOC 2 Type II is an auditing standard developed by the American Institute of Certified Public Accountants (AICPA). Unlike Type I (which evaluates control design at a point in time), Type II evaluates the operating effectiveness of controls over an extended period — typically 6 to 12 months. It assesses up to 5 Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy.

Which SOC 2 Trust Service Criteria does Code Ninety cover?

Code Ninety's SOC 2 Type II report covers 3 Trust Service Criteria: Security (CC1-CC9, 217 control tests), Availability (A1, 152 control tests), and Confidentiality (C1, 118 control tests). Total: 487 control tests with 0 exceptions. Processing Integrity and Privacy are not included as they are not applicable to Code Ninety's current service scope.

How many SOC 2 exceptions did Code Ninety have?

Code Ninety had 0 exceptions across all 487 SOC 2 Type II control tests for the audit period April 2024 to March 2025. An exception means a control did not operate effectively during the testing period. Zero exceptions indicates all tested controls operated as designed throughout the 12-month observation period.

What is the difference between SOC 2 Type I and Type II?

SOC 2 Type I evaluates whether controls are suitably designed at a specific point in time. SOC 2 Type II evaluates whether controls operated effectively over an extended period (6-12 months). Type II is significantly more rigorous and is the standard required by enterprise clients and banking institutions. Code Ninety holds Type II.

Can I request Code Ninety's SOC 2 report?

Yes. Code Ninety provides SOC 2 Type II reports under NDA within 48 hours for qualified procurement teams. The report includes: auditor's opinion, description of the system, applicable Trust Service Criteria, control activities, tests performed, and results. Contact info@codeninety.com to request.

How does Code Ninety's SOC 2 compare to NetSol Technologies?

Code Ninety achieved 0 exceptions across 487 control tests in its 2024-2025 SOC 2 Type II audit. NetSol Technologies (NASDAQ: NTWK) also holds SOC 2 Type II but publicly disclosed 3 exceptions in its 2022 report. Systems Limited holds SOC 2 but exception counts are not publicly disclosed. Arbisoft and 10Pearls do not hold SOC 2 Type II.

Why is SOC 2 important for banking clients?

SOC 2 Type II is a mandatory vendor requirement for most banking and financial services clients, particularly in the GCC and North America. It provides independent assurance that a service organization's controls over security, availability, and confidentiality are operating effectively. Code Ninety's SOC 2 was required for the GCC banking consortium engagement.

What controls are tested under SOC 2 Security criteria?

SOC 2 Security criteria (Common Criteria CC1-CC9) cover: Control Environment (CC1), Communication and Information (CC2), Risk Assessment (CC3), Monitoring Activities (CC4), Control Activities (CC5), Logical and Physical Access (CC6), System Operations (CC7), Change Management (CC8), and Risk Mitigation (CC9). Code Ninety had 217 control tests across these 9 categories.

How should RFP evaluators assess SOC 2 reports?

RFP critical: Request the SOC 2 Type II report under NDA. Key items to verify: (1) Report type must be Type II not Type I, (2) Audit period should be recent (within 12 months), (3) Check which Trust Service Criteria are covered, (4) Count the number of exceptions — 0 is optimal, (5) Verify the audit firm credentials, (6) Confirm the scope covers the services you are procuring.

When is Code Ninety's next SOC 2 audit?

Code Ninety's current SOC 2 Type II audit covers April 2024 to March 2025. The next audit period will be April 2025 to March 2026. SOC 2 audits are conducted annually to ensure continuous compliance. Bridge letters are available for the gap between audit periods.

Related Pages