Security compliance Measuring/certifying security programs SOC 2

SOC 2 System Description series: how to describe your System Boundaries

For many organizations, creating the System Boundaries section of the SOC 2 System Description can feel like a painful slog. You’ve worked so hard to include all the necessary information only to find out that your auditors have more feedback - and even that feedback is cryptic and confusing. The AICPA (the governing body for the SOC 2) does provide guidance, but even that can be mysterious. What do you need to include? How much detail is required? Where is the easy button to get this done so you can go back to focusing on your product? Also remember that your auditor is required to opine on the ‘fair and accurate’ presentation of the System Description, and suddenly this document becomes nerve-wracking.

The nuts and bolts of the system boundaries

The purpose of the System Boundaries section is to clearly define the scope of the SOC 2 report. You will be describing the people, hardware, software, data, and processes that support your service/system/product. It can be tricky to get this section right without giving  away any company secrets, but you have options! You can hire a pricey consultant or tech writer, or suffer through the multiple and painful layers of back-and-forth with your SOC 2 auditor. Or, as a Strike Graph customer, you can follow the methodically guided process of using our System Description Builder. This will save you a lot of time and confusion.

The System Boundaries section can be broken down into four to five discreet sub-sections called System Components. These components, plus a few additional items, comprise your System Boundaries. The goal when describing these components is to provide enough detail, but not so much that you are giving away your secrets.  Your audience is a customer that is somewhat familiar with the service/product you provide. They are looking to make sure they can "trust" you to do the right thing with respect to security (and availability, confidentiality, processing integrity, and privacy, if any of these are in scope).


In this section, you will describe both physical and virtual aspects of your system. Describe the servers, storage, network monitoring services, internal network boundaries and the connections between all of these. Some companies even include their phone system if it’s relevant. Most companies use a mix of a network diagram AND a narrative description of the network for this section.  Auditors may want to see both, so prepare both. In this section, technical terms are fine.  


Here you will describe only the software that is core to your service/product.  This includes the actual application program, IT system software to support the application, databases, mobile/desktop, web-facing apps. There is no need to include operations related tools (payroll, benefits, accounting, email or messaging applications).  Many organizations provide a brief introductory paragraph describing use of software at a very high level supplemented with a list or table of the key software components.


Describe, at a high level, the groups, departments or functions that are involved in all things related to the service/product. This is often demonstrated with both a bullet list of main departments (or functions) and a very high level organizational chart. Some companies also like to share founders’ names and their roles.



This section tends to be the trickiest. Here you will describe the types of data that move through your system/product. A high level description of a system or table showing the types of data is useful. Many organizations also find a data flow diagram helpful here.  For any method you choose, you need to clearly represent how data moves in and out of your system. This may include files, databases, and storage. Also describe (or show) the relationship of the data to firewalls and to any of your service providers. It is helpful to Indicate or describe the level of encryption used as data flows in, out, and through the system. If Privacy or Confidentiality is a component of your system/product, then you will specifically describe each data type, how you secure it, and which third parties may have access to it.


This section may be presented differently in your System Description document depending on how you interpret the AICPA guidance. (Your auditor will explain their preference according to their interpretation of the guidance). For example, some organizations will choose to make a general statement about key processes, but describe each further down in the ‘COSO’ section of the document. Others will describe all key processes here - which makes for a very long System Boundaries section. Wherever this process section is placed in the System Description document, it will either allude to or describe all of the primary, manual, or automated processes that support the system; it will also answer the question of how your service activities are initiated, authorized, performed and delivered.  

You will do this by describing the following topics:

  • Security management responsibilities
  • Logical and physical access
  • Data backup and disaster recovery
  • Change management
  • Incident response
  • System monitoring
  • Vendor management

What to sprinkle in

Throughout your System Boundaries sections, you will also want to weave a narrative of where any service provider, business partner or vendor may be involved. Do they touch data?  Is the dev team outsourced? Do you use the services of infrastructure providers and what do they ‘touch’ or have access to? 

Also, you may want to clearly describe or demonstrate what is out of bounds: is there anything that a typical reader of your report could be confused about? If you know what these may be, then great. Your auditor will offer feedback and guidance regarding how to address this - they need to understand what is in and out of scope for their assessment and will highlight where they are confused. 

The takeaway

The entire System Description document will be a balancing act between providing your reader enough detail while not revealing too much of your ‘secret sauce’. This is true especially for what is included in the System Boundaries section. When done well, it will be a valuable tool to earn your customer’s trust by describing how you address security and operational risks.

  • copy-link-icon

    Copy URL

  • facebook-icon
  • linkedin-icon

Learn how you can leverage Strike Graph for your cybersecurity needs