Compliance before certification: what to show buyers
Learn how to talk about compliance before certification, show the controls you already run, and spot the points where formal programs start to matter.

Why buyers ask before certification
Security questions show up earlier than most founders expect. They often come before legal review, and sometimes before pricing is final. If your product touches customer data, connects to internal tools, or needs admin access, the buyer wants a fast answer to one question: "Will this create risk for us?"
That happens even when you're still small. A startup with ten customers can still get a security questionnaire from a larger prospect. Sales wants fewer surprises. Procurement wants fewer delays. Security wants facts it can share internally.
This is why the topic matters before any formal badge enters the picture. Many companies already run sensible controls without SOC 2 or ISO 27001. They use MFA, limit production access, keep backups, log changes, patch systems, and review vendors. Certification does not create those habits from nothing. It shows that you run them in a consistent, documented way.
The gap matters because buyers often treat silence as risk. If your answer is "we take security seriously," the deal can stall. The buyer may assume you don't know your own setup, or that you're hiding weak spots. Neither helps.
Clear answers work better. Buyers usually want a plain explanation of who can access production, how accounts are protected, how data is backed up, how issues are found and fixed, and what still isn't formalized.
A small SaaS team might not have SOC 2 yet, but still require MFA for every admin account, keep daily backups, limit database access to two people, and track errors in one place. That answer carries more weight than a vague promise.
The goal is not to sound bigger than you are. The goal is to remove doubt. Say what you do today, say what you don't do yet, and keep every claim easy to defend on the next call.
What you can show right now
When buyers ask about compliance before certification, they usually want proof that you already run the business with care. You don't need a badge to show that. You need current examples of how your team protects data in normal work.
Start with the controls you already use. Keep them concrete.
You can describe backups by saying how often they run, where they go, and when you last tested a restore. You can describe access by naming who can reach production, whether admin accounts use MFA, and how quickly access is removed when someone leaves. Logs matter too, but only if you explain what you record and who checks it. The same goes for laptops, code review, release approvals, and incident handling.
Plain examples are easier to trust than security jargon. "We back up the database every night and test recovery once a month" is clearer than a broad claim about resilience. "Only two engineers can touch production, and we review that list every month" is stronger than "we follow strict access controls."
Keep today's practice separate from future certification plans. Buyers get uneasy when teams blur the two. State what you do now, then explain what you plan to formalize later. For example: "We already use MFA, backups, logging, and access reviews. We'll start SOC 2 when enterprise deals require it or when the amount of customer data reaches a point where a formal program makes sense."
Your proof doesn't need to look polished. Simple evidence is often better because it is easier to update and easier to believe. A short policy note, a screenshot of backup status, a recent access review, or a sample incident record may be enough. If a control changes, you can update one page instead of rebuilding a large packet.
A lot of startup teams overdo this part. They spend days writing perfect answers when a small folder of current evidence would move the deal faster. Steady habits matter more than polished language.
How to describe controls in plain words
Most buyers do not need raw configs or a huge policy file. They want three things: what you do, how often you do it, and what risk it reduces.
Write each control as a simple sentence. Start with the action, then explain the reason. "We limit production access to a small group and review it every month. That reduces the chance of accidental changes or old accounts staying active." That works better than a paragraph full of tool names.
Drop terms that only your team uses. A buyer rarely needs "role-based access control," "SIEM," or "immutable audit trails" in the first pass. Say "only approved people can reach production," "we collect logs and watch for unusual activity," or "we keep a record of changes." If the buyer wants more detail, you can add it later.
Tie each control to a real risk
A control sounds stronger when the risk is obvious. "All code changes go through review before release" tells the buyer what happens. Add "This lowers the chance of bugs, unsafe code, and unapproved changes reaching customers" and the point lands much better.
The same approach works for backups, alerts, laptop security, vendor access, and incident response. Keep it short. Buyers want proof that the habit is real, not a wall of policy text.
It also helps to keep short answers ready for common questions:
- "Who can access production?" "A small approved group. We review access every month and remove it when roles change."
- "How do you prevent bad changes?" "Every change goes through code review and automated checks before release."
- "What happens if something breaks?" "We monitor systems, alert the team, and follow a written incident process."
- "Do you back up customer data?" "Yes. We run scheduled backups and test recovery so we can restore data if needed."
If a buyer asks for evidence, pair each answer with one record. That might be an access review note, an alert screenshot, a backup report, or a change log. Let the record support the claim.
Build a simple compliance brief
Buyers do not need your whole internal wiki. They need one document that shows how you reduce risk today. If your answers live in chat threads, old notes, and a few people's memories, deals slow down.
Pull your current controls into one brief and keep the language plain. Write what you actually do, not what you hope to do later. If you review admin access every month, say that. If backups run every day and someone checks restore logs each week, say that too. In many cases, this brief helps more than a half-finished policy pack.
A simple structure works well. Cover access, data handling, change management, and incidents. Explain who can reach code, cloud systems, and admin tools. State where customer data lives, how you protect it, and how long you keep it. Describe how changes are reviewed, tested, approved, and released. Then explain how you spot problems, who responds, and how follow-up is recorded.
For each control, add an owner and a review rhythm. The owner can be a person or a role. The rhythm can be daily, weekly, monthly, or quarterly. That makes your claims easier to trust. "We use MFA" is thin. "The engineering lead checks admin access monthly, and all admin accounts use MFA" gives the buyer something concrete.
It helps to keep two versions. The short version should fit on one or two pages and work well during a sales call. The longer version can include more detail on backups, logging, vendor access, laptop rules, and incident response. Sales can use the short brief early, then send the longer one when security questions go deeper.
A small startup can do this well. A six-person SaaS team may not have a formal program yet, but it can still document code review, daily backups, restricted production access, and a named incident owner.
Review the brief every month. Teams change, tools change, and old answers create awkward gaps. A quick pass keeps it accurate and saves time when the next buyer asks the same questions.
When formal programs start to make sense
Formal certification starts to make sense when buyer questions stop feeling occasional and start showing up in almost every serious deal. One prospect asking for a security document is normal. Three larger prospects in a quarter asking for procurement review, audit evidence, or named controls is a pattern.
You can usually see the shift before anyone says, "You need SOC 2." Larger customers bring procurement, security reviewers, and legal into the sale. That changes the conversation. Instead of asking, "Do you use MFA?" they ask for policy documents, incident response details, access review records, and proof that the same process is followed every time.
A longer questionnaire is another useful signal. Early buyer forms are often easy to answer from memory. Later, they turn into dense spreadsheets with tabs for access control, backups, vendor management, logging, and employee onboarding. If your team keeps spending days on these forms, your security setup may be fine, but your sales process is starting to outgrow informal answers.
Watch for a few signs showing up together:
- Procurement joins late-stage calls.
- Buyers ask for vendor reviews or audit reports.
- Legal terms name SOC 2, ISO 27001, or a similar framework.
- The same evidence requests come up again and again.
- One delayed deal could cover much of the certification cost.
Deal size matters more than startup anxiety. If you're chasing small contracts, formal certification may cost more than it returns. If you're moving upmarket and each deal is larger, even one blocked contract can change the math. A six-month sales cycle with repeated security objections gets expensive fast, even before you count engineering time spent answering questionnaires.
This is where SOC 2 timing becomes practical. You don't start because certification sounds mature. You start because revenue, buyer pressure, and internal effort all point in the same direction. When contracts get bigger, legal review gets stricter, and sales slows on the same issues, formal programs become part of closing business.
Teams often need help making that call without building too much too early. An experienced CTO advisor can compare certification cost against pipeline risk, then decide whether to tighten informal controls first or start a formal program now.
How to handle the conversation
When a buyer asks about compliance, don't send every policy, screenshot, and note you have. Start with the exact question. If they ask, "Do you have SOC 2?" answer that first, then explain what controls you already run.
A short, direct reply usually works better than a document dump. Say what you do now, where the boundary is, and what would trigger a formal program. Buyers usually want clarity more than volume.
For example, a small SaaS company selling into larger accounts might explain that access is limited by role, production changes go through review, logs are monitored, backups are tested, and incidents have an owner. Then it should state plainly that it is not yet SOC 2 certified and plans to start when enterprise deal size or buyer requirements cross a set threshold.
Keep one answer across teams
Sales, product, and ops should give the same core answer. If sales says "we are almost certified" but ops says "we have not started," trust drops fast. One short internal brief fixes that.
That brief should cover five things: the control in place now, how the team runs it, what is documented, what is not in place yet, and when the company plans to add the next layer.
This is the practical side of the whole topic. You're not pretending to have a badge. You're showing that you already run the business with care.
Be honest about limits. If you don't have a formal vendor review process yet, say so. Then explain the current fallback, such as manual approval by a technical lead or founder. Buyers can work with a gap they understand. Vague answers are harder to accept.
After every call, save the new objections and questions. If three buyers ask about data retention, add a plain answer to your brief. If one buyer asks for encryption details, write a cleaner explanation for the next call. Over time, the conversation gets shorter and calmer.
This works even better when one person owns the message and updates it often. A startup working with an experienced fractional CTO can usually tighten these answers quickly because the controls, limits, and next steps all live in one place instead of five different heads.
A simple example as sales moves upmarket
Picture a startup that sells workflow software to finance teams. Its first buyers are companies with 100 to 400 employees. The product handles approvals, invoices, and internal notes, so buyers care about security, but they do not always require a full audit report.
For the first larger deal, the founder sends a short controls brief instead of leaning on vague language. The brief explains who can access production, how the team uses MFA, how data is encrypted, how systems are backed up, how logs are reviewed, and what happens if an incident occurs. It also names the main vendors and shows that access is limited by job.
That may be enough for a mid-market buyer. The security contact gets direct answers, has a real person to talk to, and can see that the company already runs sensible controls. The deal moves forward because the buyer can tell the difference between "no formal program" and "no discipline."
A few months later, the startup starts talking to a much larger company. This buyer has procurement, legal review, and a security questionnaire that runs for pages. Halfway through the process, the buyer asks one direct question: "Do you have SOC 2?"
Now the team has a clear trigger point. They can still share the same controls brief, but this buyer wants outside proof, not just internal answers. The sales lead also notices that this is not a one-off request. Two other late-stage deals ask for the same thing.
At that point, the team can make a simple decision. Start a formal program when three things are true:
- Larger buyers ask for SOC 2 more than once.
- The contract size can pay for the work.
- The lack of certification starts to slow deals, not just create extra questions.
That keeps spending tied to revenue. Until the report is ready, the team keeps using the same plain-language brief, updates it after each buyer call, and treats every security question as a useful signal about where the market is heading.
Mistakes that slow deals down
A lot of deals stall because a team tries to sound bigger, safer, or more prepared than it really is. Buyers can handle a company that is early. They usually do not trust a company that blurs the line between real controls and formal certification.
The first mistake is saying you are compliant when you are not certified. If you run access reviews, logging, backups, and incident response, say that. If you have not finished SOC 2, say that too. A buyer may accept "we already run these controls and plan formal certification when enterprise revenue reaches a set point." They will push back hard on "we are basically SOC 2."
Another mistake is sending raw technical notes with no context. A page of firewall settings, cloud screenshots, and tool names does not answer the buyer's question. Buyers want to know what you do, how often you do it, and who owns it.
Dates cause trouble fast. Teams often promise a certification timeline to keep a deal alive, then miss it by months. That hurts more than a careful answer up front. If an audit depends on hiring, budget, or outside help, say so. A realistic date keeps trust intact.
Sales teams also create problems when they answer security questions from memory. One rep says data stays in one region. Another says the product supports SSO next quarter. A founder says both are under review. Now the buyer sees three stories. Give sales a short approved brief and make one person own final answers.
And not every buyer request means you need a full certification effort right away. A mid-market prospect might only need a security summary, a basic questionnaire, and a call with someone technical. If you launch a large audit project every time a buyer asks for documentation, you burn time and money before the pattern is clear.
The better approach is usually simple:
- Describe the controls you run today.
- Name the gaps without drama.
- Give dates only when you can support them.
- Keep sales, founders, and engineering on the same script.
- Treat certification as a business decision, not a reflex.
That approach may feel less polished, but it closes more trust gaps than a glossy answer.
A short checklist before buyer calls
Buyer calls go better when your team agrees on a few plain facts before anyone joins. Ten minutes of prep can save days of follow-up.
Use one short checklist before each call:
- Write a two-minute explanation of your current controls in plain English.
- Keep one shared document as the source of truth, with the latest update date.
- Separate active controls from planned work.
- Decide what would trigger a formal program like SOC 2 or ISO 27001.
- Make sure sales and technical staff use the same wording.
That first point matters more than many teams expect. If a buyer asks how you manage access, backups, or incident response, someone on your side should answer without jargon. "We review admin access monthly, back up production data daily, and log incidents in one place" is much better than a long, fuzzy speech.
The shared document can be very small. One page often works. It should list the controls you actually run, the tools or routines behind them, the owner for each control, and the areas you do not cover yet. If sales uses one deck and engineering uses a different note, the buyer will spot the mismatch.
You also need a clear line for when formal certification starts to make sense. A common trigger is when larger deals keep stalling in security review, or when procurement asks for third-party proof in most late-stage conversations. Until then, solid answers and real controls may be enough.
A quick test helps. Ask one person from sales and one from engineering the same five buyer questions. If their answers differ, fix the brief before the call.
What to do next
Start with a rule your team can follow without debate. Stay informal while buyers only ask for a short security summary, a basic questionnaire, and a clear description of your current controls. Move toward a formal program when larger deals start to stall, procurement asks for the same proof again and again, or a target customer says certification is part of vendor approval.
That rule saves time because it avoids two expensive mistakes: rushing into an audit too early, or waiting so long that revenue slips. Good preparation here is about showing what you already do, not pretending you have a badge you haven't earned.
Give one person ownership of buyer security answers. That person doesn't need to know every technical detail, but they should know where the facts live, who approves responses, and how to answer the same questions the same way each time. When nobody owns this work, replies get slow and inconsistent.
A simple plan is enough. Write down the controls you already run. Keep one current security brief and one questionnaire template. Track how often buyers ask for formal certification. Start a certification project only when deal flow clearly supports the cost.
If you see three or four serious upmarket deals in a short period and each one asks about SOC 2 timing or similar proof, that's usually enough to plan the first certification. If those requests are still rare, keep tightening your controls and documentation first.
Outside help can speed this up. A practical advisor can map your current setup to what buyers expect, point out weak spots, and tell you whether you need better answers now or a formal program soon. For teams that want a grounded second opinion, Oleg Sotnikov at oleg.is works as a fractional CTO and startup advisor and helps companies make these calls without turning them into oversized projects.
Pick an owner this week, write your rule, and review your last five buyer conversations. Once those notes sit in one place, the pattern is usually obvious.
Frequently Asked Questions
Why do buyers ask about security so early?
Buyers want to know if your product adds risk before they spend more time on the deal. If you handle customer data, connect to internal tools, or need admin access, security often comes up before legal review or final pricing.
Can a small startup answer security questions without SOC 2?
Yes. You do not need a badge to give a solid answer. You need clear facts about how you protect accounts, limit production access, back up data, review changes, and handle incidents.
A small team can still show discipline. Buyers usually trust a direct answer more than a vague promise.
What should I show buyers if I’m not certified yet?
Start with what you already run today. Show who can access production, whether admin accounts use MFA, how often backups run, when you last tested recovery, how you review code changes, and who owns incident response.
Simple proof helps. A recent access review note, a backup status screenshot, or an incident record often works better than a polished deck.
How do I describe security controls in plain English?
Use plain sentences. Say what you do, how often you do it, and why you do it. For example: "We review production access every month to remove old or unnecessary accounts."
Skip tool-heavy language in the first answer. If the buyer wants more detail, add it after they understand the control.
What should go into a simple compliance brief?
Keep it short and practical. Cover access, data handling, change management, backups, logging, and incidents. Name an owner for each control and say how often the team reviews it.
Make two versions if you can. A one-page summary works for early calls, and a longer version helps when security review goes deeper.
When should we start thinking seriously about SOC 2?
SOC 2 starts to make sense when bigger deals keep running into the same security questions. If procurement joins late-stage calls, buyers ask for audit evidence, and one delayed contract could cover the cost, the timing may be right.
Do not start just to look mature. Start when revenue, buyer pressure, and team effort all point the same way.
How should I answer when a buyer asks, "Do you have SOC 2?"
Answer the question directly first. If you do not have SOC 2, say that. Then explain the controls you already run and what would trigger a formal program.
A short reply works well: "We are not SOC 2 certified yet. We already use MFA, restricted production access, code review, tested backups, and incident tracking. We plan a formal program when larger deals require outside proof."
What mistakes usually slow deals down?
Teams slow deals down when they blur the line between real controls and certification. Trouble also starts when sales promises dates it cannot support or sends raw technical notes with no explanation.
Another common problem is inconsistency. If sales, founders, and engineers give different answers, the buyer loses trust fast.
How do I keep sales and engineering on the same message?
Give both teams one approved brief and keep it current. That brief should say what controls you run now, what is documented, what gaps still exist, and who owns each answer.
Run a simple test before buyer calls. Ask one person from sales and one from engineering the same security questions and compare their answers.
What trigger should I use to decide when certification becomes necessary?
Use a business rule, not a gut feeling. Stay informal while buyers only need a short security summary and a basic questionnaire. Move toward certification when larger deals stall, procurement asks for the same proof again and again, or target customers name certification in vendor approval.
Tracking the last few buyer conversations usually makes the pattern clear. If three or four serious upmarket deals ask for the same proof, you likely need to plan the work.