Hi, This should be addressed using a risk-based approach. The initial request for a SOC 2 report is typically driven by the inherent risk posed by the vendor, based on scoping factors such as data access, system access, regulatory impact, and the criticality ...