The prospect is real, the deal is significant, and they need SOC 2 Type 1 before they can move it through procurement. Your security posture right now is informal — you have good practices in some places, nothing documented in most, and no one who has ever been through an audit. Ninety days sounds impossible.

Let me be direct with you: it’s possible. I’ve helped companies get there. But it requires making smart decisions about what to prioritize, and it requires understanding the difference between getting the report and actually having the security program it’s supposed to represent.

What SOC 2 Type 1 Actually Requires

SOC 2 Type 1 is a point-in-time assessment. An auditor looks at your systems and controls on a specific date and attests that your controls are designed appropriately. It does not verify that your controls have been operating effectively over time — that’s Type 2, which requires a minimum observation period of three to six months.

This distinction matters enormously for your 90-day timeline. Type 1 is achievable because you’re not proving history — you’re proving that your controls are in place today. That means your 90 days are about building and documenting controls, not about waiting for time to pass.

The five Trust Services Criteria under SOC 2 are Security, Availability, Processing Integrity, Confidentiality, and Privacy. Almost every SOC 2 engagement starts with Security as the baseline. The others are added based on your business. If you’re not a payment processor and your contract doesn’t specifically require Availability or Privacy criteria, start with Security only. Every additional criterion adds time and cost.

The 90-Day Path

Days 1–30: Scope and gap assessment.

Before you implement anything, you need to know where you are. A gap assessment against the SOC 2 Trust Services Criteria for Security will tell you which controls you already have (often more than you think), which controls need to be documented, and which controls need to be built from scratch.

Common gaps at companies your size: formal access review processes, written security policies, employee security training with records, incident response procedures, and change management documentation. These are not hard to fix — they’re mainly organizational and procedural. They take time and attention, not engineering effort.

The gap assessment also drives your auditor selection. Get the assessment done before you sign with an auditor. You want to know your gap size before you’re committed to a timeline.

Days 30–75: Close the gaps.

This is the execution phase. The controls you need to build fall into two categories.

Procedural controls: written policies, training records, access review evidence, vendor risk documentation. These can be built in parallel by one focused person — a compliance-focused project manager, an operations lead, or an engaged founder. Compliance automation platforms like Vanta, Drata, or Secureframe dramatically accelerate this — they auto-collect evidence from your AWS/GCP/Azure environment and tell you exactly what evidence is still missing.

Technical controls: multi-factor authentication everywhere, encryption in transit and at rest, vulnerability scanning, logging and monitoring, access controls to production. Most of these you should already have. If you don’t, the ones you’re missing are likely real security gaps, not just compliance gaps — which means you want to close them regardless.

Days 75–90: Audit preparation and fieldwork.

Your auditor will conduct fieldwork — reviewing your documentation, testing your controls, and asking questions. Make sure one person at your company is the single point of contact for the audit. Auditors who have to chase down five different people for answers find more problems.

What You Cannot Fake

The auditor will test whether your controls are actually in place — not just whether you have a policy that says they should be. If your policy says you require MFA for all production access and you don’t actually have MFA on your production database admin account, that’s a finding. If your policy says you do quarterly access reviews and you’ve never done one, that’s a finding.

Findings are not automatically disqualifying for Type 1 — but significant findings will result in exceptions in your report that your enterprise prospect will read. “Clean” Type 1 reports pass enterprise procurement. “Type 1 with management response to five exceptions” often does not.

The shortcut that bites companies: copying policies from a template without verifying that your actual practices match the policy. Your auditor will ask to see evidence that the policy is followed. If the evidence doesn’t exist, you have a problem.

What Happens After You Get the Report

Type 1 gets you in the door. Most enterprises will accept Type 1 to start a contract but will require Type 2 at renewal. That means the 90-day sprint is just the beginning — you need to maintain and operate the controls you built for the 6–12 months until your Type 2 audit window.

Companies that treat SOC 2 as a checkbox lose their certification at renewal. Companies that treat it as the beginning of a real security program use it to close the next five enterprise deals.

If you have 90 days and a deal on the line, a 15-minute call is enough to tell you whether your specific situation is achievable, what platform and auditor combination makes sense, and what you need to staff for this to work. Book that conversation at go.nebari.cc/15-min.


Related: Do I Need SOC 2? | SOC 2 Type 1 vs. Type 2 — What’s the Difference? | Proving Compliance Is Harder Than Being Compliant