What Is a SOC Report and Bridge Letter? A Guide
February 11, 2026
By
Evie Secilmis

You've got your fresh SOC 2 report in hand, but there's a ticking clock. Audits happen once a year, but your biggest customers need proof of compliance right now. As your report ages, a gap appears that can stall major deals. So how do you bridge that time between audits? You use a SOC 2 bridge letter. This simple document is the key. This guide explains how using a soc report and bridge letter together keeps your compliance current, builds trust, and ensures your sales cycle never misses a beat.
A SOC 2 bridge letter, sometimes called a gap letter or management assertion letter, is a stopgap measure that covers the period between your current SOC 2 Type II report and your next one. It’s not a replacement for a full audit, but it tells your customers that your organization’s security controls are still operating effectively during the waiting period. When vendors and buyers understand how to use SOC 2 bridge letters, they can move faster through security reviews without sacrificing confidence in your security posture.
In this guide, we’ll walk you through what a SOC 2 bridge letter is, when you actually need one, what should be included, and how to reference your SOC 2 documentation efficiently during vendor security assessments. Understanding these concepts will help you manage vendor relationships more smoothly and respond to security questionnaires with confidence.
What's a SOC 2 Bridge Letter?
A SOC 2 bridge letter is a statement from your organization’s management confirming that your security control activities have continued to operate as described in your most recent SOC 2 Type II report. Think of it as a formal assertion that nothing fundamental has changed since your audit ended. Your internal controls are still functioning, your security policies are still being followed, and your team is still maintaining the same level of oversight.
The bridge letter is typically prepared by your management team, sometimes with input from your auditors or legal counsel. It’s usually shorter and simpler than a full SOC 2 report. Instead of going through months of testing and validation, your organization is essentially saying, “We’ve reviewed our controls, and they’re still working as designed.” This statement covers the interim period between your last audit and your upcoming one.
Bridge letters serve an important purpose in the world of vendor management. As a buyer, you want assurance that your vendors’ security practices haven’t lapsed. As a vendor, you want to give your customers confidence without waiting 12 months for a new audit. The bridge letter fills that gap.
It’s a Letter of Assurance, Not an Audit
It’s important to be clear about what a bridge letter is and what it isn’t. As Secureframe notes, "A SOC 2 bridge letter...is a stopgap measure...It’s not a replacement for a full audit, but it tells your customers that your organization’s security controls are still operating effectively during the waiting period." This means the letter is a formal statement from your company’s leadership, not an independent verification from a third-party auditor. It provides assurance by confirming that no significant changes have been made to your control environment since your last successful audit. For customers, it’s a sign of good faith that shows you’re committed to maintaining your security posture year-round, not just during audit season.
The Auditor’s Role (and What It Isn’t)
A common point of confusion is who actually writes the bridge letter. While it’s related to the audit, the auditor doesn't issue it. According to Strike Graph, "The company (service organization or vendor) writes and provides the bridge letter, not the auditing firm." Your management team is responsible for creating and signing it because they are the ones accountable for the day-to-day operation of the security controls. Your auditor’s job is to assess those controls at a specific point in time. However, that doesn't mean you're on your own. Many auditing firms are happy to provide guidance or a template to ensure your letter contains all the necessary information and follows a standard format.
Why It’s an Industry Practice, Not a Requirement
You won’t find any laws or regulations that mandate the use of bridge letters. They are an industry-accepted best practice that evolved to solve a practical problem: the time gap between annual audits. As Secureframe clarifies, "Bridge letters are not required by law or regulation. They are a helpful tool to show customers you are keeping up with your security controls between official audits." When a customer sends over a security questionnaire, they’re looking for current proof of compliance. Providing your latest SOC 2 report along with a bridge letter is an efficient way to satisfy that request. For sales and proposal teams, having these documents organized and accessible in a central knowledge base can make responding to security assessments a much smoother process.
SOC 1 vs. SOC 2: A Quick Primer
Before we go any further, let's clear up a common point of confusion: the difference between SOC 1 and SOC 2 reports. You’ll often see both mentioned in security questionnaires, and while they sound similar, they serve very different purposes. Knowing which is which helps you quickly identify what your customer is actually asking for. This distinction is key because providing the wrong documentation can slow down your sales cycle and create unnecessary back-and-forth with a prospect’s security team. Getting it right from the start shows you’re prepared and professional, helping you build trust early in the relationship.
SOC 1: Focusing on Financial Controls
A SOC 1 report is all about the money. Its main job is to assess the controls at a service organization that could impact a client's financial statements. According to the AICPA, these reports evaluate a company's internal control over financial reporting. Think about services like payroll processors, claims administrators, or financial data management companies. If their systems have a flaw, it could directly affect their customers' financial books. So, if your product doesn't touch a client's financial reporting processes, a SOC 1 report probably isn't what they need from you, and you can confidently clarify that.
SOC 2: Focusing on Security and Trust
This is the one that matters most for SaaS and tech companies. A SOC 2 report centers on a company's controls related to one or more of the five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy. It’s designed to give customers assurance that you are managing their data securely. When a prospect asks for your "SOC report," they are almost always referring to your SOC 2. This report demonstrates that you have the proper systems and processes in place to protect their sensitive information, which is a critical step in building trust and closing deals with enterprise customers.
SOC 2 Type I vs. Type II: What's the Difference?
Before we dive deeper into bridge letters, it helps to understand the difference between SOC 2 Type I and Type II reports, since bridge letters are typically used to extend Type II assurance.
A SOC 2 Type I report evaluates your organization’s security controls at a single point in time. An auditor comes in, reviews your processes and systems, and certifies that your controls are designed properly as of that specific date. It’s a snapshot. A Type I report is useful early on when you’re building out your security program, but it doesn’t show whether your controls work over time.
A SOC 2 Type II report is what enterprise customers really want. It examines your controls over a period of time, usually six months to a year. The auditor tests whether your controls actually work in practice, not just whether they look good on paper. They’ll check logs, interview staff, run tests, and validate that your team is genuinely following the security procedures you’ve documented. A Type II report gives customers confidence that your security posture is real and sustainable.
The challenge with Type II reports is that they take time to complete, and they’re valid for only about 12 months. During that 12-month window, your customers have assurance. But as the end of that window approaches and you’re in the middle of your next audit, there’s a gap period where your most recent report is getting stale. This is exactly when a bridge letter becomes valuable.
When Do You Need a SOC 2 Bridge Letter?
The most common scenario for needing a SOC 2 bridge letter happens when your current SOC 2 Type II report is about to expire, and your next audit is still in progress. Maybe your 2024 audit ended in January, and your 2025 audit won’t be complete until May or June. If enterprise customers are asking for current SOC 2 documentation in March, you’re in that gap period. A bridge letter tells them you’ve maintained your controls during those in-between months.
You might also need a bridge letter if you’ve made no significant changes to your security program since your last audit. If your control environment is stable and your processes haven’t fundamentally shifted, a bridge letter can validate that continuity without requiring a full new audit. This is especially useful for fast-growing companies that undergo multiple vendor assessments throughout the year.
Some organizations issue bridge letters proactively as part of their compliance calendar. Rather than wait until customers ask for updated documentation, they publish a bridge letter every quarter or semi-annually. This approach demonstrates ongoing commitment to security and reduces friction during deal cycles.
Another situation where bridge letters help is during organizational changes. If you’ve merged with another company, restructured your security team, or implemented new tools, a bridge letter can confirm that your core control environment is still functioning even as you navigate these transitions.
Bridging the Gap Between Reporting Periods
The main purpose of a bridge letter is to maintain trust between your annual SOC 2 audits. Imagine your Type II report covers the last calendar year, but a high-value prospect asks for your compliance documents in March. Your report is technically a few months old, which can raise red flags during a security review. A bridge letter closes this gap. It’s a formal statement from your management team, confirming that the security controls detailed in your last audit are still in place and operating just as effectively. This letter provides the assurance customers need, showing them your security posture hasn’t weakened while you wait for the next audit cycle to finish. It’s a standard and accepted way to keep momentum in your sales process.
Handling Unexpected Delays
Sometimes, things just don’t go as planned. An internal restructuring, a key system migration, or even a simple scheduling conflict with your auditor can delay your new SOC 2 report. This creates an unintentional gap between your old report’s end date and the new one’s start date, which can be a deal-stopper. A bridge letter is the perfect tool for this situation. It’s a straightforward document prepared and signed by your management team that asserts your controls have remained consistent. While it isn't a new audit, it’s a credible way to show stakeholders you’re still committed to your security program, even when timelines shift. This simple letter can be the difference between a stalled vendor security assessment and a closed deal.
What Goes Into a SOC 2 Bridge Letter?
A well-written SOC 2 bridge letter should cover a few essential elements to be credible and useful to your customers.
First, it should clearly state the period it covers. Specify the start and end dates of the gap period and reference your most recent SOC 2 Type II report by name and audit period. Your customers need to know exactly when this bridge letter is valid.
Second, the letter should confirm that your organization has reviewed its security control activities and found them to be operating effectively. You’re not running a full independent audit, so be honest about that. But you are asserting that your management team has validated the controls and found no material breakdowns.
Third, the letter should acknowledge any significant changes or new initiatives since your last Type II report. If you’ve implemented new security tools, changed personnel, updated policies, or made other material changes, your bridge letter should address these. You don’t need to go into exhaustive detail, but transparency matters.
Fourth, include a statement about the scope and limitations of the bridge letter. Make clear that this is a management assertion, not an independent audit. This honesty actually increases credibility because customers understand exactly what they’re looking at.
Finally, the letter should be signed by appropriate members of your organization, typically your CEO, CFO, Chief Information Security Officer, or other senior leaders responsible for security governance.
Key Components of a Strong Bridge Letter
While there isn't a rigid, one-size-fits-all template for a SOC 2 bridge letter, a strong one always includes a few key elements. Think of these as the building blocks of trust. When your customers see these components, they know you’re being thorough and transparent about your security posture. Including this information proactively helps you get ahead of follow-up questions and keeps your sales and compliance processes moving smoothly. Let’s break down what a good bridge letter should contain.
Dates of the Previous and Next Audit
First and foremost, clarity is king. Your bridge letter needs to explicitly state the time period it covers. This means specifying the start and end dates of the gap period you’re addressing. It should also reference your most recent SOC 2 Type II report by its official name and the audit period it covered. This context is crucial because it allows your customer to connect the dots between your last official audit and the current assertion, leaving no room for ambiguity about your compliance timeline.
Statement on Material Changes
The core of the bridge letter is the assertion from your management. The letter should confirm that your team has reviewed its security controls and that they are still operating effectively. It’s important to be honest here—this isn't an independent audit. Instead, you are asserting that your management has validated the controls and found no material breakdowns or significant changes that would negatively impact your security environment. If there have been changes, like a new data center or a key system update, they should be described transparently.
Reminder of User Entity Controls
Security is a shared responsibility. A comprehensive bridge letter often includes a reminder for your customers to maintain their own controls, which are known as complementary user entity controls (CUECs). This essentially states that while your organization is upholding its security commitments, the overall security of the service also depends on the customer implementing their own necessary safeguards. It’s a professional way to clarify the scope of your responsibility and remind everyone that security is a team sport.
Important Disclaimers and Limitations
Transparency builds trust, and that includes being upfront about what a bridge letter is—and what it isn’t. Your letter should include a clear statement about its scope and limitations. The most important point to make is that the letter is a management assertion, not the result of an independent audit. This disclaimer doesn’t weaken your letter; it strengthens it by setting accurate expectations and showing that you understand the formal distinctions in compliance documentation. It demonstrates confidence and honesty in your processes.
Following Industry Best Practices (Not AICPA Rules)
It’s interesting to note that the organization that sets the standards for SOC reports, the American Institute of Certified Public Accountants (AICPA), doesn't actually have specific rules for what must be in a bridge letter. Because of this, the components listed above are considered industry best practices. They’ve become the unofficial standard because they provide the information that customers and their auditors need to feel confident during a vendor security review. When you’re responding to dozens of vendor security questionnaires, having a bridge letter that follows these best practices makes the process much smoother, as it proactively answers the questions your customers are likely to ask.
Bridge Letter Best Practices
Bridge letters are a practical tool, but they aren’t a free pass. To maintain trust with your customers and keep your sales cycles moving, it’s important to use them correctly. Following a few key best practices will show prospects that your organization is proactive and transparent about its security posture, even between official audits. It’s about managing expectations and demonstrating that your commitment to security is a year-round effort, not just a once-a-year scramble for a report. When used thoughtfully, a bridge letter can be a sign of a mature compliance program.
Keep the Gap to Three Months or Less
When you issue a bridge letter, you’re asking customers to trust your self-assessment for a short period. The key word here is short. The industry consensus is that a bridge letter should cover a period of three months at most. Anything longer starts to raise questions, as a lot can change in a security environment over several months—key personnel might leave, new systems could be introduced, or policies might become outdated. Sticking to a three-month window signals that the letter is a temporary measure while you complete your formal audit, not a way to delay it. This gives your customers confidence that an official, third-party assessment is just around the corner.
Plan Ahead to Avoid Needing a Letter
The best-case scenario is not needing a bridge letter at all. While that’s not always realistic, relying on them too often can be a red flag. If you find your team constantly writing bridge letters to cover long gaps, it might be time to rethink your audit schedule. As compliance experts at Linford & Company suggest, organizations that frequently need to cover longer periods should consider adjusting their SOC report's coverage dates. Proactive planning can help you align your audit cycle to better match your sales cycle, ensuring you always have a recent report on hand. This preparation makes responding to security questionnaires much smoother, as your compliance documentation is always ready to go.
Align Your SOC Report Period with Customer Needs
Your SOC 2 report doesn’t exist in a vacuum; it’s a document your customers rely on for their own risk assessments. A great way to build trust is to align your reporting period with their needs. For example, many companies operate on a calendar fiscal year and conduct vendor reviews early in the new year. If your SOC 2 report is available in January, you make their job much easier. SOC reports typically cover a six- to twelve-month period, giving you some flexibility. By thinking about your customers’ compliance calendars, you can turn your audit from a simple necessity into a strategic tool that reduces friction and strengthens relationships.
Smarter SOC 2 Vendor Management Tips
Whether you’re building your own SOC 2 bridge letter or evaluating your vendors’ compliance documentation, understanding best practices in SOC 2 vendor management will help you move faster and more confidently through security reviews.
As a buyer, start by asking your vendors about their SOC 2 reporting schedule. Find out when their most recent Type II audit was completed and when their next one is expected. Ask specifically about their audit period.
Next, request the actual SOC 2 report or, if vendors prefer not to share it in full, ask them to provide a summary of the trust service criteria they were audited against. The major categories are security, availability, processing integrity, confidentiality, and privacy.
When evaluating a specific SOC 2 Type II report, pay attention to the control environment and risk assessment activities. These form the foundation of everything else. Ask your vendor about their change management process, how they train staff on security, and how they identify risks.
Also evaluate the auditor’s management letter comments. These are observations from the audit that, while not full findings, point to areas where the vendor could improve.
As a vendor, be prepared to explain your SOC 2 documentation clearly and answer follow-up questions. Make it easy for them by creating a one-page summary of your Type II audit results. This is where a tool like Iris for security questionnaires can help. Instead of manually pulling excerpts from your SOC 2 report every time a customer asks about specific security practices, you can auto-cite the relevant sections of your report directly in your responses to questionnaires.
Using a Centralized Knowledge Base for Security Docs
Keeping track of your SOC 2 report, the latest bridge letter, and all your security questionnaire answers can feel like a full-time job. When a customer asks for documentation, you don't want your team scrambling to find the right version. A centralized knowledge base solves this by creating a single source of truth for all security-related information. This ensures everyone on your team provides consistent, management-approved answers. Platforms like Iris take this a step further by not only storing your answers but also connecting them directly to source documents, making it simple to prove your controls are operating effectively. This organized, proactive approach helps you build trust and reduces friction in your sales cycle.
How to Handle SOC 2 Questions in Security Reviews
When a potential customer sends you a security questionnaire, many of their questions will relate directly to your SOC 2 Type II report or bridge letter. The challenge is connecting the dots between what the customer is asking and what’s documented in your SOC 2 report.
A common mistake vendors make is treating the SOC 2 documentation separately from the questionnaire response. Instead, think of your SOC 2 report as the evidence that backs up your answers.
Some vendors create a mapping document that cross-references common security questionnaire questions to the relevant sections of their SOC 2 Type II report. With Iris, you can streamline this entire process. The platform helps your team reference SOC 2 documentation automatically when answering questionnaires.
Streamlining Responses to Security Questionnaires
Answering security questionnaires can feel like a never-ending loop. The questions are often similar, but you still have to pull information from different documents to prove your security posture. Instead of starting from scratch every time, you can use your SOC 2 report as a central source of truth. A smart, low-tech way to do this is by creating a mapping document that connects common questionnaire items to the exact sections in your SOC 2 report that address them. This simple cross-referencing can save you from hunting through a hundred-page document for every single question.
To take it a step further, you can use a response management platform to automate this entire workflow. For example, Iris helps you build a smart knowledge library where your SOC 2 documentation and other compliance materials live. When a new questionnaire comes in, the platform can instantly suggest accurate, pre-approved answers and automatically cite the relevant sections of your SOC 2 report as evidence. This approach turns a tedious, manual task into a quick, streamlined process, freeing up your team to focus on the more strategic parts of the deal cycle.
Keeping Your SOC 2 Answers Consistent and Accurate
When a potential customer is evaluating your security, consistency is everything. If one response contradicts your SOC 2 report or a previous answer, it can create doubt and slow down the sales process. Every answer you provide in a security questionnaire should align perfectly with the information in your SOC 2 documentation and bridge letter. If your bridge letter mentions a material change, like the implementation of a new security tool, your questionnaire responses need to reflect that update. This transparency shows that you have a mature and well-managed security program.
Using a centralized knowledge base is the best way to maintain this level of accuracy across your entire team. When everyone is pulling from the same source of truth, you eliminate the risk of someone accidentally using an old answer or outdated information. Platforms like Iris are designed to maintain this consistency by not only storing approved content but also proactively flagging information that might be out of date. This ensures your responses are always current, accurate, and build trust with every customer interaction, ultimately helping you improve your deal volume and win rates.
Where Do Bridge Letters Fit in Your Compliance Plan?
Managing the timing of your SOC 2 audits and bridge letters is important for maintaining smooth vendor relationships. Many organizations plan their audit cycles to align with their business calendar.
If your audit typically completes in January but you’re not starting your next audit until September, you have an eight-month gap. During that time, proactively sharing a bridge letter in April or May can prevent questions from customers who are asking for current compliance documentation.
Also consider the cost and effort of bridge letters versus the cost and effort of more frequent audits. A bridge letter is relatively inexpensive and quick to prepare. A full Type II audit can cost $20,000 to $100,000 or more. For most organizations, one full audit per year supplemented with bridge letters is the right balance.
Frequently Asked Questions
Q: Is a SOC 2 bridge letter as strong as a full Type II report?
A: No, a bridge letter is not a substitute for a full Type II audit. A bridge letter is a management assertion, while a Type II report is an independent audit. However, bridge letters are valuable for demonstrating that your controls are still operating effectively during the interim period between audits.
Q: Who should sign the SOC 2 bridge letter?
A: The letter should be signed by senior leaders responsible for security and governance, such as your CEO, CFO, Chief Information Security Officer, or Chief Operating Officer.
Q: How long is a SOC 2 bridge letter valid?
A: A bridge letter typically covers a specific gap period between your current SOC 2 Type II report and your next one, usually three to six months.
Q: Can I use a SOC 2 Type I report instead of a bridge letter?
A: A Type I report and a bridge letter serve different purposes. A Type I report is a snapshot audit at a specific point in time, while a bridge letter covers a time period when your prior Type II report is expiring. If you’re looking to extend Type II assurance, a bridge letter is the right choice.
Q: What if my organization has made significant changes since the last Type II audit?
A: If you’ve made material changes to your control environment, you should disclose these in your bridge letter. Major changes might warrant a new independent audit rather than relying on a bridge letter.
Putting Your SOC Report and Bridge Letter to Work
A SOC 2 bridge letter is a practical tool for managing the gap between annual Type II audits. It demonstrates to your customers that your security controls are still operating effectively, even while you’re in the middle of your next audit cycle.
The most successful vendors treat their SOC 2 documentation as a strategic asset. They understand that customers want both independent verification and practical answers to their security questions. By connecting your SOC 2 reports and bridge letters directly to customer questionnaires, you demonstrate that your answers are backed by audit evidence.
Ready to streamline your security reviews? Book a demo with Iris to see how our platform helps teams reference SOC 2 documentation automatically when answering security questionnaires. With a 4.9/5 rating on G2, Iris helps security and compliance teams respond to vendor assessments faster. You can also explore how teams use Iris to accelerate their vendor security reviews, or read customer success stories to see the impact. For more compliance definitions, learn more in our glossary.
Key Takeaways
- Maintain sales momentum between audits: Use a SOC 2 bridge letter to assure customers that your security controls are still effective, even when your official report is months old. This simple document closes the compliance gap and prevents security reviews from slowing down your deals.
- Build trust with a transparent letter: A strong bridge letter is a statement of integrity. Always include the specific time period it covers, disclose any significant changes to your security environment, and keep the gap to three months or less to show you're on top of your formal audit.
- Turn compliance documents into sales assets: Stop treating your SOC 2 report as a static file. Integrate it into your response process by using it as direct evidence for security questionnaire answers. A centralized knowledge base helps your team provide consistent, accurate, and audit-backed responses every time.
Related Articles
Share this post
Link copied!












