Last month, I almost lost a great client because of four words: “Show me your SOC 2.”
I run a small CPA practice in Chicago—just me and two part-time bookkeepers—and we had a promising lead: a Series A startup needing monthly accounting and tax planning. Perfect fit for our practice. Then their CFO sent over a 12-page security questionnaire.
The questions weren’t unreasonable:
- How do you encrypt data at rest and in transit?
- What access controls and authentication do you use?
- What’s your incident response procedure?
- How do you handle data backup and disaster recovery?
- Do you perform vendor security assessments?
But the implicit question behind all of this was: “Do you have a SOC 2 report?”
The Small Firm Security Dilemma
Here’s the problem: SOC 2 audits cost $15,000-30,000 for initial certification, plus ongoing annual audits. For a small practice billing $250k/year, that’s 6-12% of gross revenue just to prove we’re taking security seriously.
But in 2026, enterprise clients—even small startups—won’t work with firms that can’t document their security posture. They’ve been burned by vendor breaches, they’re under pressure from their own investors and compliance teams, and they’re not taking chances with their financial data.
So what do small firms do? Give up on enterprise clients? Pay for expensive audits we can’t afford?
The Beancount Security Documentation Approach
I decided to document our actual security controls instead of pursuing formal SOC 2 certification. Since we use Beancount for client work, I created a “Data Security Controls” document specifically addressing plain-text accounting security:
Encryption at Rest:
- All Beancount files stored in Git repositories with GPG encryption enabled
- Client data encrypted at file system level using full-disk encryption (FileVault on Mac, BitLocker on Windows)
- Backup repositories use AWS S3 with server-side encryption (AES-256)
Access Controls:
- SSH keys required for Git repository access (no password authentication)
- Mandatory two-factor authentication (2FA) on all systems: GitHub, AWS, email, tax software
- Separate Git repositories per client—no co-mingling of client data
- Team members have access only to their assigned client repositories (principle of least privilege)
Incident Response:
- Documented incident response playbook: detection → containment → notification → remediation → post-mortem
- Client notification protocol: within 24 hours of confirmed breach involving their data
- Git commit log provides audit trail for forensic investigation if needed
Backup & Disaster Recovery:
- Automated daily backups to encrypted AWS S3 buckets
- Git version history provides point-in-time recovery capability
- Backup verification tested quarterly
- RTO (Recovery Time Objective): 4 hours; RPO (Recovery Point Objective): 24 hours
Vendor Security:
- All vendors reviewed for security practices (GitHub, AWS, domain registrar)
- No third-party access to client data without written approval
- Documented list of all systems with access to client information
The Outcome
I sent this documentation to the CFO along with a one-page “Plain-Text Accounting Security Advantages” explanation:
"Your data is stored as plain-text files in encrypted Git repositories. This means:
- Transparency: You can audit exactly what’s stored (no proprietary formats, no hidden fields)
- Immutability: Every change is cryptographically signed and logged in Git history (tamper-evident audit trail)
- Portability: Your data isn’t locked in a vendor’s system—you have complete copies at all times
- Control: Your financial data lives in repositories YOU own, not on shared SaaS servers with hundreds of other companies"
They approved the engagement. Turns out, explaining why plain-text + Git is secure—and documenting the specific controls we’ve implemented—was more convincing than a checkbox SOC 2 certification from a firm they’d never heard of.
Questions for the Community
I’m curious how others are handling this:
-
Are you seeing enterprise clients demand security documentation? Is this becoming more common in 2026?
-
What security controls do you document for clients? What’s the right balance between “enough to demonstrate competence” and “overkill for a 3-person firm”?
-
Has anyone pursued actual SOC 2 certification? Was it worth the cost? Did it actually help win clients?
-
How do you explain Beancount security to non-technical clients? What language resonates with CFOs who’ve only used QuickBooks?
The security landscape is shifting, and I think small firms using Beancount actually have some unique advantages—but we need to learn how to articulate them to clients who are asking harder questions about data protection.
Would love to hear your experiences and approaches to documenting security controls without breaking the bank on expensive compliance audits.