Agency|Insights
Industry PerspectivesIndustry Perspectives

SOC 2 for Payment Processing Companies

Payment processing companies, payment gateways, and merchant services platforms need SOC 2 in addition to PCI DSS because the two frameworks serve fundamentally different audiences.

Agency Team
Agency Team
·14 min read
Hand-drawn illustration of credit card, lock, and building representing SOC 2 for payment processing

If your payment platform already has PCI DSS locked down but enterprise deals keep stalling at the security review stage, we've seen this pattern dozens of times — and SOC 2 is almost always the missing piece. Here's how we guide payment processing companies through it.

Payment processing companies, payment gateways, and merchant services platforms need SOC 2 in addition to PCI DSS because the two frameworks serve fundamentally different audiences. PCI DSS satisfies card network requirements and demonstrates cardholder data protection. SOC 2 satisfies enterprise buyer trust requirements and demonstrates that your organization's broader security controls — access management, change management, incident response, vendor oversight, and operational monitoring — are designed and operating effectively. For payment companies selling to enterprise merchants, platforms, or financial institutions, SOC 2 has become a standard procurement requirement alongside PCI DSS.

This guide covers how to build a SOC 2 compliance program specifically for payment processing companies that already maintain PCI DSS compliance. We walk through the SOC 2 and PCI DSS overlap (which reduces your incremental effort), the Trust Service Criteria most relevant to payment platforms, scoping challenges unique to tokenization vaults and settlement systems, processing integrity controls that are critical for transaction accuracy, and how enterprise buyers in the payments industry evaluate SOC 2 reports.

Why Payment Companies Need Both SOC 2 and PCI DSS

PCI DSS and SOC 2 are complementary — not interchangeable — frameworks. Understanding why enterprise buyers require both helps you prioritize and communicate your compliance position.

Different Audiences, Different Purposes

DimensionPCI DSSSOC 2
Who requires itCard networks (Visa, Mastercard, etc.) and acquiring banksEnterprise merchants, platforms, and financial institution partners
What it coversCardholder data environment (CHD and SAD)Entire service delivery system including people, processes, and technology
FocusProtecting payment card data specificallyDemonstrating organizational security maturity broadly
Assessment typeSelf-assessment or QSA assessmentCPA firm attestation
Report formatReport on Compliance (ROC) or SAQSOC 2 Type I or Type II report
Buyer usageVerified during onboarding; rarely reviewed in depth by merchantsRead in detail by security teams during procurement evaluation

The Gap PCI DSS Does Not Fill

PCI DSS is scoped specifically to the cardholder data environment — the systems, networks, and processes that store, process, or transmit cardholder data. It does not evaluate your broader organizational security practices: how you manage employee access across all systems, how you handle change management for non-payment infrastructure, whether you conduct risk assessments beyond the CDE, or how you manage third-party vendors who do not touch cardholder data.

In our experience working with payment companies, this gap is where enterprise deals get stuck. Enterprise buyers — particularly large merchants, e-commerce platforms, and financial institutions — need assurance that your entire organization operates with security discipline, not just the payment-processing components. SOC 2 provides this broader view. We regularly see payment companies with PCI DSS but no SOC 2 struggle to close enterprise deals where the buyer's security team evaluates vendor security holistically.

SOC 2 and PCI DSS Control Overlap

Organizations already maintaining PCI DSS compliance have a significant head start on SOC 2. In our experience, approximately fifty to sixty percent of SOC 2 controls overlap with PCI DSS requirements, particularly in technical security areas. We tell our clients this is one of the best leverage points in compliance — you've already done the hardest technical work.

Overlap Map

Control AreaPCI DSS RequirementSOC 2 EquivalentOverlap Level
Access managementReq 7: Restrict access by business needCC6.1-CC6.3: Logical access controlsHigh
AuthenticationReq 8: Identify users, authenticate accessCC6.1: Authentication mechanismsHigh
Encryption (transit)Req 4: Encrypt transmission over open networksCC6.7: Transmission securityFull
Encryption (at rest)Req 3: Protect stored cardholder dataCC6.1: Data protectionHigh
Logging and monitoringReq 10: Log and monitor accessCC7.1-CC7.2: Monitoring and anomaly detectionHigh
Vulnerability managementReq 6: Develop secure systemsCC7.1: Vulnerability identificationModerate
Network segmentationReq 1: Network security controlsCC6.6: External threat protectionModerate
Physical securityReq 9: Restrict physical accessCC6.4: Physical access controlsModerate
Incident responseReq 12.10: Incident response planCC7.3-CC7.5: Incident managementModerate
Security policiesReq 12: Security policies and programsCC1-CC2: Control environment, communicationModerate

Where SOC 2 Goes Beyond PCI DSS

SOC 2 requires several control areas that PCI DSS does not address (or addresses only minimally). We recommend our payment processing clients pay close attention to these gaps early, since they represent the bulk of your incremental work:

  • Formal risk assessment methodology: SOC 2 requires a documented risk assessment process with risk registers and treatment plans beyond PCI DSS's risk assessment requirement
  • Vendor management program: SOC 2 expects security assessments of all third-party vendors, not just those in the cardholder data environment
  • Change management formalization: SOC 2 requires documented change management controls with approval workflows across all in-scope systems
  • Employee lifecycle management: SOC 2 evaluates background checks, security training, and offboarding for all employees, not just those with CDE access
  • Board/leadership security oversight: SOC 2 expects evidence that security is discussed at the organizational leadership level
  • Business continuity and disaster recovery: SOC 2 evaluates broader continuity planning beyond PCI DSS's CDE-focused requirements
  • Independent CPA attestation: SOC 2 requires a CPA firm report; PCI DSS uses QSA assessment or self-assessment

Trust Service Criteria for Payment Platforms

Choosing the right Trust Service Criteria is critical for payment processing companies. Enterprise buyers in the payments industry have specific expectations, and we advise our clients to think carefully about which criteria to include from day one.

Recommended Criteria

CriterionRecommendationReasoning
Security (Common Criteria)Required for allMandatory for every SOC 2 audit
Processing IntegrityStrongly recommendedValidates transaction accuracy, completeness, and authorization — core to payment platform value
AvailabilityStrongly recommendedValidates uptime and reliability commitments critical for payment processing
ConfidentialityRecommendedValidates protection of merchant data, transaction records, and business intelligence
PrivacySituationalRequired if you collect or process consumer PII directly (beyond card data)

Processing Integrity: The Critical Criterion for Payments

Processing Integrity is the criterion that distinguishes payment company SOC 2 reports from generic SaaS SOC 2 reports. It evaluates whether your system processing is complete, valid, accurate, timely, and authorized — precisely the assurances enterprise merchants need when routing transactions through your platform.

Processing Integrity controls specific to payment platforms:

  • Transaction completeness: Controls that ensure all initiated transactions are processed and no transactions are lost, duplicated, or dropped
  • Transaction accuracy: Validation that transaction amounts, currencies, merchant identifiers, and settlement figures are processed correctly
  • Transaction authorization: Verification that every transaction is properly authorized before processing and that unauthorized transactions are rejected
  • Settlement accuracy: Controls ensuring that merchant settlements reconcile accurately with processed transactions
  • Error detection and correction: Automated systems that identify processing errors, transaction discrepancies, and reconciliation failures with defined correction procedures
  • Processing audit trails: Complete, immutable records of every transaction from initiation through settlement

Without Processing Integrity, your SOC 2 report documents generic security controls but does not directly address what enterprise payment buyers care most about: whether your platform processes their transactions correctly and reliably. We strongly recommend every payment processing company include it.

Scoping Challenges for Payment Platforms

Payment processing infrastructure has unique characteristics that create scoping challenges for SOC 2 audits. We help our clients navigate these early so there are no surprises during the audit itself.

Tokenization Vaults

If your platform uses tokenization to protect cardholder data, the tokenization vault occupies a unique position in your SOC 2 scope:

  • The vault itself is typically in scope for both PCI DSS and SOC 2
  • Controls around vault access, key management, and token lifecycle management must be documented for both frameworks
  • The benefit of tokenization for SOC 2 is that it reduces the sensitivity of data in other system components — non-vault systems handle tokens rather than cardholder data, which simplifies the SOC 2 data flow documentation

Payment Rails and Third-Party Processors

Payment platforms often connect to multiple payment rails (card networks, ACH, wire transfer systems) through third-party processors and financial institution partners. For SOC 2 scoping:

  • Complementary User Entity Controls (CUECs): Document which security controls your merchants and partners must implement on their end
  • Subservice organization considerations: If you rely on third-party processors for core transaction processing, their SOC 2 report (or lack thereof) affects your report. You must either use the inclusive method (incorporating their controls into your report) or the carve-out method (excluding them and noting the dependency)
  • API security boundary: Your APIs that connect to payment rails must be in scope, with controls around authentication, rate limiting, input validation, and error handling

Settlement Systems

Settlement and reconciliation systems present scoping considerations because they handle financial data that directly affects merchant revenue:

  • Settlement calculations must be in scope if Processing Integrity is included
  • Reconciliation processes between transaction processing and merchant settlements should be documented as controls
  • Settlement timing (daily, weekly, custom schedules) must be accurately described in the system description


Enterprise Buyer Expectations in Payments

Enterprise merchants, platforms, and financial institutions evaluate payment vendor SOC 2 reports with specific expectations that differ from typical B2B SaaS procurement. Based on what we see across our payment processing clients, here is what those buyers focus on.

What Payment Buyers Look For

Buyer ExpectationWhat They ReviewWhy It Matters
Processing Integrity inclusionWhether the PI criterion is in scopeValidates transaction accuracy and reliability
Availability commitmentsSLA documentation and uptime evidencePayment downtime directly impacts merchant revenue
Key management controlsEncryption key rotation, access restrictions, HSM usageCritical for payment security infrastructure
Multi-tenancy isolationMerchant data segregation controlsEnsures one merchant's data cannot be accessed by another
Incident response maturityResponse procedures, incident history, breach notificationEvaluates how the platform handles payment disruptions
Subservice organization treatmentHow third-party processors are addressed in the reportAssesses supply chain risk in the payment flow

Financial Institution Partners

Banks and financial institutions that partner with payment platforms often have the most rigorous SOC 2 review processes. In our experience:

  • They typically require Type II reports with twelve-month observation periods
  • They expect all five Trust Service Criteria or at minimum Security, Processing Integrity, and Availability
  • Their security review teams are experienced SOC 2 readers who examine exceptions closely
  • They may require additional reporting beyond the standard SOC 2 report (questionnaires, on-site assessments)

Building a Unified PCI DSS + SOC 2 Program

The most efficient approach — and what we recommend to every payment processing client — is to build a single compliance program that satisfies both frameworks rather than managing them separately.

Step 1: Map Existing PCI DSS Controls to SOC 2

Review your current PCI DSS controls and map each one to the corresponding SOC 2 Trust Service Criteria. The overlap map above provides the starting point. For each PCI DSS control, determine whether it fully satisfies the SOC 2 requirement, partially satisfies it (requiring extension), or has no SOC 2 equivalent.

Step 2: Extend Controls Beyond the CDE

The primary gap between PCI DSS and SOC 2 is scope. PCI DSS controls are scoped to the cardholder data environment. SOC 2 requires these same types of controls applied across your entire service delivery system. Extension means applying access management, monitoring, and change control practices to non-CDE systems that are in your SOC 2 scope.

Step 3: Add SOC 2-Specific Controls

Implement the SOC 2 requirements that PCI DSS does not cover:

  • Formal risk assessment with risk register and treatment plans
  • Comprehensive vendor management program covering all third-party vendors
  • Board/leadership security oversight documentation
  • Enhanced business continuity and disaster recovery testing
  • Formalized employee lifecycle management with background checks and annual training

Step 4: Use a Single GRC Platform

GRC platforms like Vanta, Drata, and Secureframe support both SOC 2 and PCI DSS frameworks. Controls implemented once are automatically mapped to both frameworks, evidence is shared, and compliance status is tracked across both programs on a single dashboard.

Step 5: Coordinate Audit Timing

Schedule PCI DSS and SOC 2 assessments to run consecutively or use overlapping timelines. Using the same or affiliated audit firms for both engagements reduces total interview and evidence review time. Some CPA firms that perform SOC 2 audits also have QSA certifications for PCI DSS, enabling a single firm to conduct both assessments.

Cost Efficiency

Organizations already maintaining PCI DSS typically spend twenty to forty percent less on their initial SOC 2 engagement compared to organizations starting from scratch. The savings come from existing technical controls (encryption, logging, access management), established security policies, and organizational familiarity with compliance processes.

We help our clients build unified PCI DSS and SOC 2 programs from the ground up — mapping existing controls, closing gaps efficiently, and coordinating audit timelines so nothing is duplicated unnecessarily.

Key Takeaways

  • We advise payment processing companies to pursue both PCI DSS and SOC 2 because they serve different audiences — card networks versus enterprise buyers — and neither substitutes for the other
  • In our experience, PCI DSS and SOC 2 overlap fifty to sixty percent on technical security controls, giving PCI-compliant organizations a significant head start that we help clients leverage fully
  • We strongly recommend including Processing Integrity as a Trust Service Criterion for payment platforms — it validates transaction accuracy, completeness, and authorization, which is what enterprise buyers care most about
  • We also recommend Availability and Confidentiality alongside Security and Processing Integrity for a complete payment company SOC 2 report
  • Scoping challenges we frequently navigate with clients include tokenization vault boundaries, payment rail dependencies, subservice organization treatment, and settlement system inclusion
  • Enterprise payment buyers and financial institution partners expect mature SOC 2 reports with Processing Integrity, twelve-month observation periods, and detailed subservice organization documentation — we prepare clients for this level of scrutiny
  • Building a unified PCI DSS + SOC 2 program managed through a single GRC platform is forty to fifty percent more efficient than maintaining separate programs, and it is the approach we recommend to every payment processing client
  • Organizations already PCI DSS compliant typically spend twenty to forty percent less on initial SOC 2, and we help ensure that cost advantage is fully realized

Frequently Asked Questions

Does PCI DSS compliance mean we are already SOC 2 compliant?

What we tell clients is: PCI DSS gives you a tremendous head start, but it does not get you across the finish line on its own. PCI DSS covers cardholder data environment controls specifically, while SOC 2 evaluates your broader organizational security program. In our experience, approximately fifty to sixty percent of SOC 2 controls are already addressed by a solid PCI DSS program — but you still need to extend controls beyond the CDE, implement SOC 2-specific requirements like formal risk assessment, vendor management, and leadership oversight, and engage a CPA firm for the SOC 2 attestation. We treat PCI DSS and SOC 2 as complementary certifications, not substitutes.

Which should we pursue first — SOC 2 or PCI DSS?

Based on what we see with our payment processing clients, PCI DSS should come first if you process card payments — it is non-negotiable and a contractual requirement from card networks and acquiring banks. SOC 2 is a market requirement driven by enterprise buyer expectations. Most payment companies we work with establish PCI DSS compliance first (often required to begin processing), then add SOC 2 to expand their enterprise sales capabilities. That said, both frameworks can be pursued simultaneously using a GRC platform that supports dual-framework compliance, and we help clients do this when timelines demand it.

How much does adding SOC 2 cost on top of our existing PCI DSS program?

In our experience, for payment companies with established PCI DSS compliance, incremental SOC 2 costs typically range from $40,000-$100,000 in year one (including auditor fees, GRC platform, and internal effort) and $30,000-$80,000 annually thereafter. This is twenty to forty percent less than the typical SOC 2 cost for organizations without PCI DSS because existing technical controls, security policies, and compliance team experience reduce the implementation and audit effort. We help clients maximize that overlap so they are not paying for redundant work.

Do our merchants care whether our SOC 2 includes Processing Integrity?

What we consistently see is that enterprise merchants increasingly expect Processing Integrity in payment vendor SOC 2 reports. Smaller merchants may not review SOC 2 reports in detail, but enterprise merchants, platforms, and financial institution partners specifically look for Processing Integrity because it validates that your platform processes transactions accurately and reliably. Including Processing Integrity adds approximately ten to fifteen percent to auditor fees but significantly strengthens your SOC 2 report's relevance to the payments industry. We recommend it for every payment processing client.

Can we use the same auditor for both PCI DSS and SOC 2?

We advise clients to explore this option whenever possible. Some audit firms hold both CPA firm credentials (for SOC 2) and QSA certifications (for PCI DSS), enabling them to conduct both assessments. Using a single firm reduces total audit effort because the auditor already understands your control environment, infrastructure, and security practices. Even if you use different firms, we recommend coordinating the audit timelines so evidence collected for one assessment can be reused for the other.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Get expert insights on cybersecurity compliance delivered to your inbox.