You might find auditors that would go along but any reasonable client will check your SOC2 report and quality of your auditors.
SOC2 requires tons of paperwork and management and separation of duties with also mandatory roles in your company - never feasible in a one man show.
I don't think you would be able to be compliant as a solo dude though, not easily. A bunch of protocols and practices revolve around governance, handovers, failovers, risk mitigation etc and if you're the only guy there's a hard path ahead. Are you reviewing and approving your own code that goes to production? If things go down and you're the first to call (let's say by automated alerting) and you're not available, who is the next one to call as in what's the documented succession plan or automated remediation.. etc.
Compensatory controls do not strictly require a human, they require mitigation of risk associated with a single human. You'd have to automate a lot of these governances "gates" then. So it would be possible, since evidence you would have to provide is work not org-chart, but it'd be a ton of work.
I went into it thinking I need to answer these 167 documents and provide evidence on an ongoing basis, but it actually also transformed the way we do things. I think for the better. At the end of the day, I also think this can be gamed as probably most certificates, but it's not worth it and transformation you go through makes sense.
Start by pre-filling your own CAIQ v4 with an earnest “we don’t do this” or “we haven’t even thought about this” attempt: https://cloudsecurityalliance.org/artifacts/cloud-controls-m...
Then read through it and see what you can address immediately (EDR on your laptop, MFA on your cloud environments, etc), followed by role playing your client; “based on answers to this questionnaire, what would I not accept?”
There will be some items you can’t fix.
You’ll soon find out the majority of customers, including banks, governments, defence contractors, crypto startups — simply do not care. If they want to use your product, they’ll work with you.
It may be single-tenancy, it may require architectural changes, it may mean making it selfhosted with a time-bomb, but you’ll be able to address the requirements of the CISO, compliance monkey or executive.
I’ve yet to meet an industry or individual I can’t convince. Even if the product is a hot mess, half baked and radioactive — we’ll deploy it on a VM running inside of a VDI within the customer’s environment, because slopping together a migration path is _so easy_, and those early, highly regulated clients are worth it.
If I recall correctly the minimum in a standard setup is 9 roles which cannot overlap. You're going to have a very hard time doing that as a solo entrepreneur, so you'll probably need to find someone who is experienced in making unusual setups like these compliant - which isn't going to be cheap. Even after that there's a pretty decent chance you'll end up needing to hire 3rd-party services in order to be compliant: our "internal" auditor is just some big firm doing it for us.
We regularly audited and questioned SMBs (and big corps) with regards to their security posture. We knew that small shops wouldn’t be able to be fully compliant to SOC2 Type 2 or have an ISO27001 certified environment. If it was clear that our business wanted the product, we either tried to help the company with the questionnaire or created a risk report that was then signed by the business. In other words: even if your customer asks you to be compliant, you don’t have to be if they care enough about your product.
If you seem intent on getting things right, that’s a big plus. Most of your competitors don’t even know what SOC 2 is.
On a positive side, you won't have to do 100% of SOC 2 Type 2. The only required part is security if I remember correctly. And a lot of it is best practices that need to be in place anyway. If you are using an established cloud provider a lot of it is in place through their certifications. Some of the controls can be "silly", but generally not hard to put in place. I'd try to figure out what are the minimum nr of controls required and see if that is doable. Pretty sure auditors will give a discount there if the scope is smaller.
It can be somewhat useful for the company if taken seriously, as it can point out weaknesses in processes. Although I agree with other comments that most of it is a checkbox exercise than something that provides any real guarantees to the client demanding it.
I also don't know if getting through it with <20k $ is something that is feasible. Before doing SOC 2 we relied on the clients' security questionnaires instead, so maybe something to always ask about. Usually they were able to make an exception and allow it, although the % started shrinking over time.
Edit: Also, the auditor makes a difference. Pick one that understands small companies. A corporation auditor will get confused with "segregation of duties" if you are the only person in the company.