Press TechRound interviews Secure.com CEO on the future of AI security
Read

What Is a SOC 2 Bridge Letter?

Learn what a SOC 2 bridge letter is, why companies use it during vendor reviews, and what it includes.

SOC 2 reports don’t stay current forever. That becomes a problem pretty quickly during vendor reviews.

Say a company completed its SOC 2 Type II audit in January, covering controls through December. Then a customer asks for proof of compliance in June. The report is technically valid, but there’s now a six month gap between the audit period and the present day.

That gap is where a SOC 2 bridge letter comes in.

A SOC 2 bridge letter is a document issued by a company to confirm that no major changes have occurred to its security controls, processes, or compliance posture since the end date of its most recent SOC 2 report. It helps reassure customers, partners, and auditors that the controls reviewed during the audit are still operating as expected.

You’ll also hear it called a “gap letter” or “representation letter” in some compliance workflows.


Why Companies use SOC 2 Bridge Letters?

SOC 2 audits happen periodically, usually once a year. But vendor security reviews happen constantly.

Procurement teams, enterprise buyers, and compliance teams often ask questions like:

  • Has anything changed since the audit ended?
  • Are the same controls still in place?
  • Were there any major incidents after the report period?

A bridge letter fills that timing gap without forcing the company to complete another full audit early.

Most people don’t realize how common this is in SaaS procurement. A SOC 2 report can already feel outdated a few months after issuance, especially when infrastructure changes fast.


What a SOC 2 Bridge Letter Includes?

The format varies between organizations, but most bridge letters contain a few standard elements:

Reference to the existing SOC 2 report

The letter identifies the previously completed SOC 2 audit, including:

  • Audit period dates
  • Report type
  • Audit firm name

This connects the bridge letter directly to the original report.

Statement about control changes

The company explains whether any material changes occurred after the audit period ended.

That usually includes changes related to:

  • Security controls
  • Infrastructure
  • Hosting providers
  • Access management
  • Policies and procedures

If significant changes did happen, they are typically disclosed.

Disclosure of major security incidents

If the company experienced a serious breach or event that could affect the validity of the SOC 2 report, the bridge letter may mention it.

This is often the section legal and procurement teams care about most.

Coverage period

Bridge letters typically cover the time between:

  • The SOC 2 report end date
  • The current review or request date

Usually that window spans a few months, not multiple years.


Who Requests SOC 2 Bridge Letters?

Bridge letters are common in B2B software sales, especially during enterprise procurement reviews.

Typical requesters include:

  • Enterprise customers
  • Vendor risk management teams
  • Procurement departments
  • Auditors
  • Business partners

If you sell into regulated industries like healthcare, finance, or government, requests for bridge letters show up often.

Bridge letter requests often surface late in enterprise sales cycles, creating unexpected compliance hurdles for growing companies.


SOC 2 Bridge Letter vs SOC 2 Report

A bridge letter is not a replacement for a SOC 2 report.

That distinction matters.

A SOC 2 report is produced by an independent auditor after reviewing controls over a defined period. A bridge letter, on the other hand, is written by the company itself.

It does not provide independent attestation.

Think of it more as an interim update tied to the original audit.


Are SOC 2 Bridge Letters Required?

No official SOC 2 rule says companies must issue bridge letters.

Still, many organizations expect them as part of vendor due diligence. In practice, they’ve become fairly standard once a SOC 2 report gets older.

Some procurement teams start requesting them after three months. Others wait six months. It depends on the customer’s risk tolerance and internal policies.


Risks of Relying on Outdated Bridge Letters

A bridge letter loses value if it becomes stale or overly vague.

Customers may question:

  • Whether controls actually remained effective
  • If infrastructure changed significantly
  • Whether undisclosed incidents occurred
  • How much visibility leadership really has into security operations

That’s often where continuous compliance monitoring becomes important. Static audits alone rarely tell the full story anymore.


The Bigger Shift in Compliance

SOC 2 bridge letters exist because compliance snapshots age quickly.

Cloud infrastructure changes constantly. Teams deploy new services, update permissions, rotate vendors, and change architectures throughout the year. A report tied to a single audit window can only capture so much.

That’s part of the reason buyers increasingly ask for continuous evidence, ongoing monitoring, and current security posture data instead of relying only on annual audits.


Conclusion

A SOC 2 bridge letter helps close the timing gap between an older SOC 2 report and a current security review. It gives customers a written update on whether security controls and compliance conditions have materially changed since the last audit period ended.

For SaaS companies, bridge letters are now a routine part of enterprise sales and vendor risk reviews. And for buyers, they offer another layer of visibility when a compliance report no longer reflects the current moment.