BlogOperations · SOPs and compliance
Operations · SOPs and compliance

SOC 2 Audit-Ready SOPs Without a Documentation Sprint

A SOC 2 auditor does not want pretty Notion pages. They want proof a control was executed. Owner-recorded guides with timestamped clicks are the cleanest evidence most auditors see all year.

Portrait of Charles Krzentowski
Written by
Charles Krzentowski
Co-founder, Capture
Published
Stack of guide cards with timestamped step lines connecting to a target ring, brutalist editorial illustration suggesting SOPs producing audit evidence
The numbers
Library rebuild
6 weeks
21 SOPs, owners trained
Audit coverage
100%
Controls with screen evidence
Audit follow-ups
0
3
On documentation, prior audit
Audit close
2 weeks early
Versus the planned window
In 60 seconds

The short version.

A SOC 2 audit fails most often on documentation, not on controls. Teams have the controls. They cannot prove the controls run. The fix is owner-driven SOPs with screen evidence built in: each process owner records the workflow once, the recording has timestamps and screenshots, and the artifact ships as both an SOP and the evidence pack at audit time. This is a six-week pattern that has produced 100% control coverage at a 38-person B2B fintech without writing a single new doc from scratch.

01 · Section

The SOC 2 documentation gap nobody warns you about

Most early-stage companies prepare for SOC 2 by hiring a compliance vendor (Vanta, Drata, Secureframe) and spending six weeks on policies. Policies are the easy part. The vendor templates ninety percent of them.

The gap shows up in the audit fieldwork. The auditor asks for evidence that a specific control was executed in the audit period. Not the policy. The execution. Examples.

For Access Review (CC6.3), the auditor asks: "Show me your last quarterly access review, the list of users reviewed, and the actions taken." The team has done access reviews. The evidence is a screenshot from someone's Google Drive that may or may not match the policy timing.

For Change Management (CC8.1), the auditor asks: "Walk me through how a code change gets reviewed and deployed in this environment." The team has the process. The walkthrough is a senior engineer at a whiteboard for thirty minutes during the audit.

For Vendor Management (CC9.2), the auditor asks: "Show me how you onboard a new sub-processor and the evidence of the assessment." The team has done it. The evidence is a Notion page with five tabs, half of which describe the old vendor.

These are not policy gaps. They are evidence gaps. The cost of closing them in audit week is roughly forty hours of senior leadership time per control. For a small team prepping for SOC 2, that is the bill that surprises everyone.

The fix that most teams reach for, "rewrite the SOPs", makes things worse. Eighteen SOPs at two hours each is thirty-six hours of writing for documentation that ages out two months later. AICPA's SOC 2 Trust Services Criteria is clear on what auditors look for: evidence is the artifact of the work, not a written description of the work.

02 · Section

What auditors actually want, versus what teams write

An auditor's evaluation of evidence runs against three tests.

1. Was the process followed during the audit period? Pretty Notion pages do not answer this. A timestamped recording does. A click log does. A screenshot from the live system, dated, does. The auditor is not looking for a description. The auditor is looking for a trace.

2. Is the process repeatable? A one-off Loom from January 2024 is not repeatable evidence. A guide that says "Owner: Alice; Last refresh: April 2026; Q1 access review attached" is repeatable evidence. The auditor wants to know that the same process ran in Q1, Q2, Q3, and Q4 of the audit period.

3. Can the process be operated without the author? This is the question most teams fail. The CFO recorded the SOP, then left, and the CFO who replaced her does not run the process the same way. Auditors call this "key-person dependency" and flag it under CC1.4.

The pretty Notion page passes none of these tests. The owner-recorded guide passes all three. After watching a 38-person B2B fintech rebuild its SOP library in six weeks for SOC 2, the auditor's note read: "the cleanest SOC 2 evidence I have seen this year." The library was twenty-one guides, recorded by the process owners, with timestamps and screenshots embedded in each one. AICPA's Trust Services Criteria PDF lays out exactly which control categories require this kind of operational evidence.

Auditor question
Show me how you reviewed user access in Q1
Wrong answer
"Here is the policy"
Right answer
"Here is the recorded review with timestamps, the user list as it was on March 31, and the deprovisioning actions taken"
Auditor question
How does a code change get deployed?
Wrong answer
"Senior engineer walks the auditor through it"
Right answer
"Here is the recorded SOP with screen evidence of CI checks, the PR review, and the deploy step"
Auditor question
What happens when a sub-processor is added?
Wrong answer
"Here is the Notion page"
Right answer
"Here is the recorded vendor-onboarding guide and the evidence of the last three assessments"
03 · Section

The owner-driven SOP pattern

The pattern that produced 100% control coverage at a 38-person fintech runs on a single rule: the process owner records the SOP, not a central documentation team.

Three reasons this works.

1. The recording captures the actual process. A central writer interviewing the owner produces a description. The owner recording the workflow produces the workflow. The difference matters more than it sounds. The auditor can tell.

2. The maintenance loop is shorter. When the process changes (a new tool, a new approver, a new threshold), the owner re-records the affected step in two minutes. A central writer is a bottleneck that breaks the maintenance loop within a quarter.

3. Ownership is auditable. SOC 2 CC1.4 (defined within the SOC for Service Organizations suite) requires defined responsibilities. An SOP with a named owner who can be asked to demonstrate the process satisfies CC1.4 directly. An ownerless Notion page does not.

The setup is straightforward.

Step 1. List the controls in the SOC 2 scope. Most companies have between fifteen and thirty controls in scope for a Type 2 audit. Each control needs an owner and an SOP.

Step 2. Assign one owner per control. The owner is the person who runs the process today. Not the person who owns the policy. Not the person who wrote the policy. The person who clicks through the actual workflow when it runs. For Access Review, that is usually the IT lead, not the CISO. For Vendor Management, that is usually Operations, not Legal.

Step 3. Each owner records the SOP once. The first one takes twenty-five minutes. The third takes ten. The owner runs the process exactly as they would on a normal day, talks through the reasoning, and stops when the process ends. The output is a guide with timestamps, screenshots, and narrator audio if the auditor wants it.

Step 4. Re-record the affected step on process change. Same pattern as customer onboarding documentation: change a step, re-record that step. The library stays current without a documentation sprint.

The tool used in the case study was a Chrome-extension capture flow that records clicks and screenshots automatically. Other tools work; the operating model matters more than the tool. What stops working is monolithic Notion pages that nobody owns.

04 · Section

How to record evidence as you go

The pattern above produces SOPs. The audit-week ask is for the SOP plus the evidence of recent execution. The trick is to make those the same artifact.

Three patterns to record evidence in-flight.

1. Timestamp the run. Every recording produces a timestamped artifact. When the access review runs in Q1, the owner records the run. The same recording is the SOP for Q2 and the evidence for Q1. Auditors love this because the SOP and the evidence are the same artifact, traceable to a date.

2. Capture the data view, not the code path. The evidence the auditor wants is the data the operator saw, not the steps the operator took. A recording of the access review captures the user list as displayed in the IDP, the role assignments, and the deprovisioning actions. That is the evidence. The click sequence is the SOP.

3. Export as branded PDF for the evidence pack. Most audit platforms ingest PDF or HTML. Capture and similar tools export branded PDFs with timestamps, click counts, and step-by-step screen captures. The owner exports each guide as a PDF and uploads to the audit folder. No separate evidence compilation.

The compounding effect is the surprise. The first audit takes more work because the library is being built. The second audit takes a fraction of the time because the library exists, the owners know the recording flow, and the evidence pack assembles itself from the live SOP set.

If your team has not yet picked the documentation tool for the SOC 2 effort, the best Scribe alternatives 2026 roundup covers the seven candidates auditors most often see in evidence packs. If the question is whether to start with customer onboarding or internal SOPs first, start with the SOC 2 controls. The customer-facing pattern is in the customer onboarding documentation guide.

05 · Section

The audit-week checklist

By audit week, the library should answer every standard auditor question without senior leadership writing new content. The checklist below is what closes the audit two weeks early.

  1. Every control has a named owner in the SOP metadata. The auditor asks "who runs this", the answer is in the artifact, not in someone's head.
  2. Every SOP has been re-recorded or refreshed in the last six months. Six months is the auditor's expected freshness. Older than that and the auditor pushes back.
  3. The most recent run is timestamped and matches the audit period. A Q1 access review recorded in Q2 is fine. A January recording with no Q3 update is not.
  4. The SOP and the evidence are the same artifact. The PDF in the evidence pack is the same guide the team uses to operate the process. No discrepancy between policy and practice.
  5. Recording metadata is auditable. Click counts, timestamps, and narrator audio (if requested) are exportable. The auditor can verify that the recording is from the system and not a recreation.
  6. The SOP library has a single index page. "Start here" is a real page with twenty-one entries. The auditor asks for the master list, the team sends one URL.

For comparison, the audit-week pattern that does not close on time has at least four of these missing. Most commonly, items 3 and 4 (freshness and SOP/evidence parity).

The three-line summary the COO in the case study used to scope the SOC 2 effort: ownership is auditable, screen evidence is auditable, and one re-recorded step is faster than rewriting a wiki page. Those three lines, applied to twenty-one controls, closed an audit two weeks ahead of schedule.

Auditors do not want pretty Notion pages. They want proof a process is followed. A guide with timestamped clicks is proof.
COO, B2B fintech, Series A
FAQ

Frequently asked questions.

Does this approach work for SOC 2 Type 1 or only Type 2?

Both. Type 1 is a point-in-time test, so the SOPs need to be recorded as-of the test date. Type 2 is a period test, which is where the timestamped recording pattern compounds: each quarterly run becomes evidence for the previous period and SOP for the next. Most teams build the library for Type 2 because the per-control investment amortizes across the audit period.

How does this differ from using Vanta, Drata, or Secureframe?

The compliance platforms (Vanta, Drata, Secureframe) handle the policy templates, the control monitoring, and the evidence collection from connected systems (cloud, IDP, ticket system). They do not generate the SOPs themselves. The recording-first method fills exactly that gap. Teams typically run a compliance platform for monitoring and a guide tool for SOPs, and the two together produce the audit-ready package.

What about ISO 27001 or HIPAA?

The same pattern applies. ISO 27001 is more documentation-heavy than SOC 2, which makes the owner-recorded SOP approach even more valuable: the documentation requirement compounds with the control count. HIPAA has narrower scope but the same evidence-of-execution principle. The recording-first method is auditor-agnostic; the auditor cares about timestamped, traceable evidence regardless of the framework.

How do we handle SOPs that involve sensitive data (PII, financial)?

Two approaches. First, redaction: most guide tools support blurring or masking selected screen regions. Capture and similar products let the recorder draw a redaction box over PII before the recording is published. Second, sandbox capture: record the SOP against a sandbox or staging environment with synthetic data. Auditors accept either as long as the SOP matches the production process and the redaction or sandbox is documented.

How long does it take to build the library from scratch?

A 38-person fintech in the case study built twenty-one SOPs in six weeks with one owner per SOP and one recording session per owner per week. The pattern scales: a 60-person team with thirty SOPs runs the same six-week window because the work is parallel across owners. The bottleneck is owner availability, not recording time. The recording itself is twenty-five minutes per SOP for the first attempt, ten minutes by the third.

Take the next step

Ready to record SOPs that double as audit evidence?

Capture records the SOP, captures the screen evidence, and exports a branded PDF for the audit pack. Free Chrome extension, no signup. Each owner records once, the library updates one step at a time.

Try it

Record one workflow.

Free Chrome extension. No signup required.