Sales Engineer Hub

Security and Compliance Review for Sales Engineers: SOC 2, ISO 27001, Vendor Security Questionnaires in 2026

In short

Security and compliance review for SEs is the procurement-side gate that converts technical fit into commercial close at any enterprise prospect with mature procurement. The 2026 craft anchors on AICPA SOC 2 Type II across the five Trust Services Criteria, ISO/IEC 27001:2022 for international and EU-domiciled prospects, and the vendor-security-questionnaire workflow (CAIQ, SIG, custom enterprise SAQs). The senior Sales Engineer owns the architecture-review meeting with the prospect's CISO end-to-end without engineering escalation.

Key takeaways

  • SOC 2 Type II per AICPA is the canonical enterprise-procurement gate for U.S. SaaS deals. The five Trust Services Criteria are Security, Availability, Processing Integrity, Confidentiality, and Privacy; Type II covers operational effectiveness over a multi-month observation window (typically 6-to-12 months) rather than design effectiveness at a point in time. SEs route the SOC 2 report request, schedule the architecture review, and defend the report contents in front of the prospect's security team.
  • ISO/IEC 27001:2022 (Edition 3, October 2022, published by ISO) is the international Information Security Management System (ISMS) standard and applies wherever the prospect is EU-domiciled, multi-region, or operates under non-U.S. procurement rules. The certification cadence is a three-year recertification cycle with annual surveillance audits per ISO/IEC 17021. Senior SEs speak Annex A controls fluently and map them to product evidence.
  • The vendor-security questionnaire is a recurring deliverable, not a one-time event. CAIQ (Cloud Security Alliance) and SIG (Shared Assessments) are the two industry-standard formats; custom enterprise SAQs at large procurement orgs run 200+ questions and vary per prospect. Templating the 80% of common answers without losing specificity on the 20% that differs is the senior bar.
  • The architecture-review meeting with the prospect's CISO is the load-bearing senior+ Sales Engineer skill on the security surface. The meeting is not a SOC 2 read-aloud; it is a working session where the SE walks the architecture, answers drill-downs honestly, and names the limitations the SOC 2 report does not cover.
  • Adjacent compliance frameworks (PCI DSS for payments, HIPAA for healthcare, GDPR for EU data subjects, FedRAMP for federal contracts) are in scope when the prospect's industry triggers them. The SE does not own implementation but must speak the language well enough to map prospect requirements to product compliance evidence in real time.
  • The senior+ bar is end-to-end ownership without engineering escalation for routine questions. Per BLS SOC 41-9031 the May 2024 median for the role is $121,520 (BLS), and per levels.fyi /t/sales-engineer the tech-SaaS median total compensation is $197,000 in May 2026 self-reported data; both reflect the senior expectation that SEs carry this surface independently.
  • MEDDPICC's Paper process letter explicitly maps to security review and procurement per MEDDIC Academy's canonical reference. Surfacing the prospect's security-review timeline and stakeholder map during discovery (not at deal-close minus two weeks) is the qualification-framework hook into this skill.

SOC 2 Type II as the modern enterprise gate

The American Institute of Certified Public Accountants (AICPA) maintains the Service Organization Control 2 (SOC 2) framework as the canonical audit standard for service organizations that store, process, or transmit customer data. Per the AICPA SOC 2 reference, the audit reports against the five Trust Services Criteria: Security (the only required criterion), Availability, Processing Integrity, Confidentiality, and Privacy. The other four criteria are scoped in based on the customer-data the service handles and the contractual commitments the service makes.

The Type I versus Type II distinction is the load-bearing vocabulary item. SOC 2 Type I attests to the design of controls at a single point in time; SOC 2 Type II attests to the operational effectiveness of those controls over a multi-month observation window (typically 6-to-12 months). Procurement teams at enterprise prospects treat Type II as the procurement-grade signal; Type I is a startup-tier placeholder until the company matures into a Type II engagement.

The Sales Engineer is not the auditor and does not write the report. The SE does three things: route the SOC 2 report request through the right NDA-and-portal motion (most vendors gate the report behind a signed NDA via a trust portal); schedule the architecture-review meeting where the prospect's security team walks the report contents with the vendor's security and engineering leads; and defend the report contents in real time when the prospect drills into specific controls. The senior+ bar is doing all three without engineering escalation for routine questions.

The drill-down questions that recur across procurement engagements: the audit firm and date of the most recent report; the observation-window duration (a 3-month window is weaker signal than a 12-month window); the exception list (every Type II report has exceptions; the question is whether they were remediated and re-tested); the criteria in scope (a Security-only report is weaker signal than a Security-plus-Availability-plus-Confidentiality report); and the carve-out subprocessors. SEs who can answer these without escalating to the security team save days of deal-cycle latency.

ISO/IEC 27001:2022 for international and EU-domiciled prospects

ISO/IEC 27001:2022 (Edition 3, October 2022, published by the International Organization for Standardization) is the international Information Security Management System (ISMS) standard and the procurement-grade signal for prospects domiciled in the EU, the UK, APAC, or other non-U.S. jurisdictions. The 2022 edition reorganizes the Annex A controls into four themes (Organizational, People, Physical, Technological), reducing the prior 114 controls to 93 and adding 11 new controls addressing modern surfaces (threat intelligence, cloud services, ICT readiness for business continuity, physical security monitoring, configuration management, information deletion, data masking, data leakage prevention, monitoring activities, web filtering, secure coding).

The certification cadence is a three-year recertification cycle with annual surveillance audits per ISO/IEC 17021. The vendor must demonstrate sustained ISMS operation across the three-year window; a lapsed certificate is a hard procurement blocker at most EU-domiciled prospects. SEs should know the certificate's issue date, expiry date, and the most recent surveillance-audit date without looking them up.

The SE's role on ISO 27001 review parallels the SOC 2 motion but with EU-data-residency and Statement of Applicability (SoA) overlays. The SoA is the document that lists which Annex A controls the vendor has implemented and which are excluded with justification. EU procurement teams ask for the SoA as routinely as U.S. procurement teams ask for the SOC 2 report. The SE's job is to walk the SoA and the data-flow diagrams in a single working session and tie the controls back to product evidence: how access control is enforced, how cryptographic keys are managed, how incident response runs, how supplier (subprocessor) relationships are governed.

Many prospects ask for both reports. A SaaS vendor selling into a Fortune-500 European bank will be asked for the SOC 2 Type II report, the ISO/IEC 27001 certificate plus SoA, and a custom EU-specific data-protection questionnaire on top. The senior SE prepares all three deliverables in parallel during discovery rather than sequentially during the procurement phase.

Vendor-security questionnaire workflow: CAIQ, SIG, custom enterprise SAQs

Beyond the SOC 2 report and the ISO 27001 certificate, every enterprise-procurement engagement triggers a vendor-security questionnaire of its own. The 2026 industry-standard formats are CAIQ and SIG; custom enterprise Security Assessment Questionnaires (SAQs) sit on top at large procurement orgs.

CAIQ. The Consensus Assessments Initiative Questionnaire is published by the Cloud Security Alliance (CSA) and standardizes the cloud-vendor security review across roughly 260 questions mapped to the CSA Cloud Controls Matrix (CCM) domains. CAIQ is the dominant questionnaire format at SaaS companies selling into regulated industries (financial services, healthcare, federal-adjacent). A CAIQ response is a deliverable: a filled-in spreadsheet with Yes/No/N/A answers and a comment column explaining each answer.

SIG. The Standardized Information Gathering questionnaire is published by the Shared Assessments Program and comes in two flavors: SIG Lite (approximately 125 questions for lower-risk vendors) and SIG Core (approximately 850+ questions for high-risk vendors handling regulated data). SIG is the dominant questionnaire format at financial-services prospects and at procurement orgs that have standardized on the Shared Assessments toolkit.

Custom enterprise SAQs. The largest procurement orgs (Fortune-100 banks, Fortune-100 retailers, U.S. federal contractors) maintain their own questionnaires of 200-to-400+ questions that overlap heavily with CAIQ and SIG but include company-specific items the standard frameworks do not cover. The custom SAQ is where vendor-specific questions land: third-party penetration-test cadence, bug-bounty program details, data-residency guarantees, sub-processor disclosures, contractual indemnification language.

The senior bar on questionnaire response is templating the 80% of common answers without losing specificity on the 20% that differs per prospect. Most senior SE teams maintain a master answer-bank in a tool like Loopio, Responsive (formerly RFPIO), or a structured internal wiki, with answers tagged by control domain (encryption, access management, incident response, business continuity, vendor management). The SE's craft is writing answers that are reusable across prospects but specific enough to survive procurement scrutiny on the deal at hand.

The senior bar is also owning the questionnaire end-to-end without engineering escalation for routine questions. Mid-level SEs forward every encryption-control question to the security team; senior SEs answer them from the answer-bank, flag the genuinely novel or sensitive questions for security review, and ship the response inside the prospect's deadline.

The architecture-review meeting with the prospect's CISO

The architecture-review meeting is the load-bearing senior+ Sales Engineer skill on the security-and-compliance surface. It is the working session where the prospect's security architect or CISO walks the vendor's architecture and asks the questions the SOC 2 report does not directly answer. The SE owns the meeting; the vendor's security lead or staff engineer joins for backup but does not drive the conversation.

Pre-meeting prep. Read the prospect's published security posture (their own SOC 2 report if available, their public security page, recent breach disclosures, recent CISO conference talks). Anticipate their three biggest concerns based on industry: a financial-services prospect will care about encryption key management and audit-log integrity; a healthcare prospect will care about HIPAA-aligned access controls and PHI handling; a federal-adjacent prospect will care about FedRAMP boundary and FIPS 140-2 cryptography. Prepare data-flow diagrams, control-mapping diagrams, and a one-pager that answers the three biggest concerns directly.

The meeting itself. Walk the architecture top-down: identity and authentication, authorization and access control, data flow and storage, encryption in transit and at rest, key management, audit logging, incident response, business continuity, sub-processor governance. Answer drill-downs honestly. Name the limitations the SOC 2 report does not cover (every vendor has them; pretending otherwise destroys credibility). When you do not know the answer, say so, and commit to a follow-up date.

Post-meeting follow-up. Within 48 hours, send a written follow-up letter that captures the questions asked, the answers given, the open items, and the commitment dates. The follow-up letter is procurement evidence: it shows the prospect's risk team that the vendor takes the review seriously and is not relying on verbal commitments that may evaporate post-deal.

The senior+ differentiator is conducting this meeting without engineering escalation for routine questions. The engineering escalations should be reserved for genuinely novel architectural questions (a new tenancy model the prospect is asking the vendor to build, a new deployment region the vendor has not yet operated in). Routine questions about encryption ciphers, key-rotation cadence, MFA enforcement, audit-log retention, and sub-processor disclosure should be answered from the SE's own knowledge.

Adjacent compliance frameworks: PCI DSS, HIPAA, GDPR, FedRAMP

Adjacent compliance frameworks come into scope when the prospect's industry, customer base, or buyer geography triggers them. The Sales Engineer does not own implementation but must speak the language well enough to map prospect requirements to product compliance evidence in real time during discovery and the architecture review.

PCI DSS. The Payment Card Industry Data Security Standard applies whenever the vendor processes, stores, or transmits payment-card data, or whenever the integration could plausibly cause the prospect's PCI scope to expand. The SE's job is to know the vendor's PCI scope (most SaaS vendors are out-of-scope by design through Stripe or another PCI-Level-1 provider) and to defend that scope in conversation with the prospect's PCI assessor.

HIPAA. The Health Insurance Portability and Accountability Act applies whenever the vendor handles Protected Health Information (PHI) on behalf of a Covered Entity. The deliverable is the Business Associate Agreement (BAA), the contractual instrument that places HIPAA obligations on the vendor. Healthcare-vertical SEs need to know when the vendor signs BAAs, what data the BAA covers, and what HIPAA-aligned controls (access logging, encryption, breach notification timelines) the vendor commits to.

GDPR. The General Data Protection Regulation applies whenever the prospect processes EU-resident personal data. The deliverable is the Data Processing Agreement (DPA) plus the Standard Contractual Clauses (SCCs) for cross-border transfers. Senior SEs speak the GDPR vocabulary fluently: Controller versus Processor, lawful basis for processing, data subject rights (access, rectification, erasure, portability), breach-notification timelines (72 hours to the supervisory authority), sub-processor disclosure obligations.

FedRAMP. The Federal Risk and Authorization Management Program applies whenever the prospect is a U.S. federal agency or a contractor handling federal data. FedRAMP comes in three impact levels (Low, Moderate, High) and two authorization paths (Agency ATO, JAB P-ATO). Federal-adjacent SEs need to know the vendor's FedRAMP status (in-process, authorized, agency-specific, or out-of-scope), the boundary of the authorized environment, and the FIPS 140-2 cryptography requirements.

The MEDDPICC qualification framework's Paper process letter, per MEDDIC Academy, explicitly maps to security review and procurement. Surfacing which compliance frameworks the prospect requires during discovery (not at deal-close minus two weeks) is the qualification-framework hook into this skill. The senior bar is asking the right compliance questions in the discovery call, not in the contract-review meeting four weeks later when the surprises compress the deal cycle and torch the close date.

Frequently asked questions

What is the difference between SOC 2 Type I and SOC 2 Type II?
SOC 2 Type I attests to the design of controls at a single point in time; SOC 2 Type II attests to the operational effectiveness of those controls over a multi-month observation window (typically 6-to-12 months) per AICPA. Type II is the procurement-grade signal at enterprise prospects; Type I is a startup-tier placeholder until the vendor matures into a Type II engagement.
When does ISO/IEC 27001 apply instead of SOC 2?
ISO/IEC 27001:2022 is the procurement-grade signal at prospects domiciled in the EU, UK, APAC, or other non-U.S. jurisdictions, and at multi-region prospects whose procurement rules require the international ISMS standard. Many prospects ask for both: SOC 2 Type II for U.S. data, ISO 27001 plus the Statement of Applicability for non-U.S. data. The certification cadence is a three-year recertification cycle with annual surveillance audits per ISO/IEC 17021.
What are CAIQ and SIG?
CAIQ (Consensus Assessments Initiative Questionnaire) is published by the Cloud Security Alliance and standardizes cloud-vendor security review across roughly 260 questions mapped to the Cloud Controls Matrix domains. SIG (Standardized Information Gathering) is published by the Shared Assessments Program and comes in SIG Lite (approximately 125 questions for lower-risk vendors) and SIG Core (approximately 850+ questions for high-risk vendors handling regulated data). Both are industry-standard questionnaire formats that procurement teams send before purchase.
How long is a typical SOC 2 Type II observation window?
SOC 2 Type II reports cover a multi-month observation window, typically 6-to-12 months, during which the audit firm tests operational effectiveness of controls. Per AICPA, a 3-month window is weaker procurement signal than a 12-month window; many enterprise prospects require a 12-month report. SEs should know the exact observation-window dates of the most recent report and the date of the next audit cycle without looking them up.
What does FedRAMP require?
FedRAMP (Federal Risk and Authorization Management Program) is the U.S. federal-government program for authorizing cloud services. It requires the vendor to operate within a defined authorization boundary, implement NIST SP 800-53 controls at the chosen impact level (Low, Moderate, or High), use FIPS 140-2 validated cryptography, and obtain either an Agency ATO (authorization to operate from a single agency) or a JAB P-ATO (Joint Authorization Board provisional authorization). Federal-adjacent SEs need to know the vendor's FedRAMP status, the impact level of any authorization, and the boundary of the authorized environment.
Who owns the architecture-review meeting with the prospect's CISO?
The Sales Engineer owns the meeting end-to-end at the senior+ tier. The vendor's security lead or staff engineer joins for backup on genuinely novel architectural questions, but does not drive the conversation. The senior bar is conducting routine drill-downs (encryption ciphers, key-rotation cadence, MFA enforcement, audit-log retention, sub-processor disclosure) without engineering escalation. Mid-level SEs forward every question to the security team; senior SEs answer from the master answer-bank and flag only the genuinely novel items for security review.
How does MEDDPICC's <q>Paper process</q> letter map to security review?
Per MEDDIC Academy, the Paper process letter in MEDDPICC explicitly covers the prospect's procurement, legal, and security-review pipeline; the contractual and compliance pathway between verbal commitment and signed deal. Surfacing this during discovery (timeline, stakeholder map, required deliverables, blocking frameworks) is the qualification-framework hook into the security-and-compliance skill. The senior SE asks these questions in the discovery call, not in the contract-review meeting four weeks later.

Sources

  1. AICPA; SOC 2 Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy)
  2. ISO/IEC 27001:2022; Information Security Management Systems Requirements (Edition 3, October 2022)
  3. Cloud Security Alliance; Cloud Controls Matrix and Consensus Assessments Initiative Questionnaire (CAIQ)
  4. Shared Assessments Program; Standardized Information Gathering (SIG) Questionnaire
  5. MEDDIC Academy; MEDDIC and MEDDPICC Qualification Frameworks (<q>Paper process</q> covers procurement and security review)
  6. U.S. Bureau of Labor Statistics; Occupational Outlook Handbook, Sales Engineers (SOC 41-9031), May 2024 median $121,520
  7. levels.fyi; Sales Engineer Compensation Track ($197,000 median total compensation, May 2026 self-reported data)

About the author. Blake Crosley founded ResumeGeni and writes about sales engineering, hiring technology, and ATS optimization. More writing at blakecrosley.com.