SOC 2 reports are unique to each organization; companies design controls to comply with one or more of the five Trust Services Criteria - security, availability, processing integrity, confidentiality, and privacy - with security as the foundation of every SOC 2.