Control (SOC) 2 audit?
The Trust Services Criteria (TSC) is an industry-recognised, third-party assurance standard for auditing service organisations such as cloud service providers (CSPs), software providers and developers, web marketing companies and financial services organisations.
The Trust Services Criteria are divided into five trust services categories. They are aligned with the 17 principles in the 2013 COSO (Committee of Sponsoring Organizations of the Treadway Commission) Internal Control – Integrated Framework.
In addition to the 17 COSO principles, the TSC contain criteria that supplement COSO principle 12 (“The entity deploys control activities through policies that establish what is expected and procedures that put policies into action”).
- 1. Logical and physical access controls
- 2. System operations
- 3. Change management
- 4. Risk mitigation
01.
SECURITY
03.
INNOVATION
05.
SUCCESS
02.
AVAILABILITY
04.
MANAGEMENT
01.
SECURITY
02.
AVAILABILITY
03.
INNOVATION
04.
MANAGEMENT
05.
SUCCESS
What does a SOC 2 audit report contain?
A System and Organisation Control (SOC) 2 report is designed to assure service organisations’ clients, management and user entities about the suitability and effectiveness of the service organisation’s controls relevant to security, availability, processing integrity, confidentiality and privacy. The report is generally restricted use for existing or prospective clients.
There are two types of SOC audits and reports:
- Type 1 – is an audit and report carried out on a specified date.
- Type 2 – is an audit and report carried out over a specified period, usually a minimum of six months.
There are two types of SOC audits and reports:
- An opinion letter.
- Management assertion.
- A detailed description of the system or service.
- Details of the selected trust services categories.
- Tests of controls and the results of testing.
- Optional additional information.
The audit report will also specify whether the service organisation complies with the AICPA TSC.
A SOC audit can only be performed by an independent Certified Public Accountant (CPA) or accountancy organisation. CPA organisations may employ non-CPA professionals with relevant information security and technology skills to participate in preparing for a SOC audit. However, the final audit report must be provided and issued by a CPA. A successful SOC audit carried out by a CPA permits the service organisation to use the AICPA logo on its website.
SOC auditors are regulated by, and must adhere to the specific professional standards established by, the AICPA. They are also required to follow specific guidance related to planning, executing and supervising audit procedures. AICPA members are also required to undergo a peer review to ensure their audits are conducted in accordance with accepted auditing standards.
Who are SOC 2 audits designed for?
SOC 2 audits are targeted at organisations that provide services and systems to client organisations (for example, Cloud computing, Software as a Service, Platform as a Service).
A SOC 2 audit is often a prerequisite for service organisations to partner with or provide services to tier-one organisations in the supply chain. The client company may ask the service organisation to provide an assurance audit report, particularly if confidential or private data is being entrusted to the service organisation.
If your organisation provides technology infrastructure services, such as cloud computing services, then a SOC 2 audit report will be beneficial in establishing trust with clients and stakeholders.
Other benefits
- ISO 27001 and (Information Security Management )
- GDPR (The General Data Protection Regulation)
- The PCI DSS (Payment Card Industry Data Security Standard)
- COBIT 5 (Common Objectives for Information and Related Technologies)
- HIPAA (the US Health Insurance Portability and Accountability Act) security standards
- NIST SP 800-53 (Security and Privacy Controls) and SP 800-66 (Implementing the HIPAA Security Rule)
Our SOC 2 Audit Readiness Assessment and Remediation Service
1. Readiness assessment
We assess your state of SOC 2 preparedness by evaluating the type of service your organisation offers, the trust services categories applicable to the service(s) you provide and the security controls relevant to the delivery of those services. We will examine and analyse your processes and procedures, system setting configuration files, screenshots, signed memos, and organisational structure.
2. Remediation
Once any deficiencies have been identified, XpertDPO can help you remediate them. We can help with audit scoping, compiling the system or service description, risk assessment, control selection, defining control effectiveness measurements and metrics , or integrating your SOC 2 requirements into your ISO 27001 compliant ISMS (information security management system).
3. Testing and reporting
XpertDPO has partnered with a leading AICPA and PCAOB (Public Company Accounting Oversight Board) registered CPA audit organisation based in the US , which will perform the required testing and reporting. XpertDPO can assist with the full SOC audit process, from conducting a readiness assessment and advising on the necessary remediation measures through to testing and reporting. We facilitate the audit process and put the client in contact with our partners, which can deliver the audit at a fraction of the costs demanded by the Big Four accounting firms. The SOC audit process involves:
- Reviewing the audit scope;
- Developing a project plan;
- Testing controls for design and/or operating effectiveness;
- Documenting the results;
- Delivering and communicating the client report.
Data Protection journey with us?
XpertDPO is a data security, governance, risk and compliance, GDPR and ISO consultancy that offers practical, tailor-made solutions.
XpertDPO is a data security, governance, risk and compliance, GDPR and ISO consultancy that offers practical, tailor-made solutions.
We are one of the leading providers of Outsourced Data Protection Officer services in Ireland and the UK. We also specialise in offering Nominated European Representative Services to non EU based organisations.
- Certified Data Protection Officer
- Certified Information Security Manager (ISACA)
- Certified Information Systems Auditor (ISACA)
- Certified in Risk and Information Systems Control (ISACA)
- Certified Cloud Security Professional (ISC2)
- Certificate of Cloud Security Knowledge
- Cyber Essentials