Back to Resources
Field Note March 2026 7 min read

Your SOC 2 Report Is Silent on OT. That's a Problem.

Most SOC 2 scopes stop at the corporate perimeter. For data centers and manufacturers, that leaves the most operationally consequential systems outside the audit boundary.

C

Cascadia OT Security

Compliance Readiness

AUTHMFAAUDITCRYPTOKEYSVAULTACCESS CONTROLHARDEN

I have read a lot of SOC 2 reports. At data centers, at manufacturers, at SaaS companies. One pattern keeps showing up at industrial customers: the SOC 2 scope is defined in terms of the corporate IT environment. The OT environment — the BMS, the DCIM, the plant-floor controllers — is silent, excluded, or sometimes explicitly out of scope.

That is not SOC 2's fault. SOC 2 is a flexible framework; scope is defined by the service organization. But the practical consequence is that many data center and manufacturing SOC 2 reports do not actually cover the systems that would cause a customer-visible outage if compromised. That is a problem worth being deliberate about.

Why SOC 2 scope drifts away from OT

Three reasons, in rough order of frequency:

All three are understandable. None of them are defensible when a customer reviews the report and notices that the BMS — the system that keeps their equipment cool — is not mentioned.

What "in scope" would mean

Including OT in SOC 2 scope is not an all-or-nothing move. At most data centers and manufacturers, a phased approach works:

This is a 24-month journey, not a quarterly project. But it's durable, and it produces a report that holds up under enterprise customer scrutiny.

What customers are actually looking for

When a sophisticated enterprise customer reviews your SOC 2 report, they are looking for two things in particular:

If your report is ambiguous on scope, or if the controls named under Availability are generic IT controls that happen to be applicable, sophisticated customers will notice. Some will push back in the vendor review process. Others will simply mark your report as "basic" internally and prefer a competitor with a more credible posture.

The PCI angle

Similar pattern on PCI DSS v4.0. At data centers that host payment environments, the PCI scope often stops at the logical cardholder data environment and does not include the physical infrastructure — the BMS and DCIM that would, in an outage, render the cardholder data environment unavailable. PCI DSS v4.0 Requirement 9 (physical security) is increasingly where this pressure shows up in assessments.

What to do

Three actions, in order:

OT compliance readiness is one of our primary service lines. If you would like an independent read on your current scope, we can help.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call