SOC 2
What Is SOC 2?
SOC 2 is a security framework that specifies how organisations should protect customer data from unauthorised access, security incidents, and other vulnerabilities.
The American Institute of Certified Public Accountants (AICPA) developed SOC 2 around five Trust Services Criteria.
These Trust Services Criteria are the basic elements of your cybersecurity posture.
They include organisation controls, risk assessment, risk mitigation, risk management, and change management.
SOC 2 Reports
Unlike PCI DSS, which has very rigid requirements, SOC 2 reports are unique to each organisation. In line with specific business practices, each designs its own controls to comply with one or more of the trust principles.
Security is the only TSC required for every SOC 2 audit although most organisations also include Availability and Confidentiality.
Additional criteria are optional based on the services you provide to your customers.
The Five Trust Services Criteria
How is my system protected against attacks?
Information and systems must be protected against unauthorised access and unauthorised disclosure, including potentially compromising damage to systems. Information (or data) should be protected during its collection or creation, use, processing, transmission, and storage.
How do we decide when to make data from the system available?
Data and systems should be available for operation and use. Your systems must include controls to support accessibility for operation, monitoring, and maintenance.
Does the system work the way it needs to?
System processing (particularly of customer data) must be complete, valid, accurate, timely, and authorised to meet the entity’s objectives.
When information must be shared, what keeps the exchange secure?
The organisation should protect information designated as confidential (i.e. any sensitive information).
How do we ensure the system keeps private information safe?
When personal information is collected, used, retained, disclosed, and disposed of, it must be in accordance with relevant regulations and policies.
Benefits Of SOC 2 Attestation Report
Type I & Type II
Type I
Type I describes an organisations systems and whether their design is suitable to meet relevant trust principles. An auditor examines the design of the SOC 2 framework and creates a set of agreed controls to assess against by examining the description of security and compliance controls and reviewing evidence around controls.
In summary, a SOC 2 Type I tests security control and process design for a point in time, whereas a SOC 2 Type II tests actual security controls and processes operating effectiveness over a period of time. During this period of time, the customer must operate without deviation from the required SOC 2 controls and processes – evidence collection does not start to occur until the end of this assessment period.
Type II
Type II details the operational effectiveness of those systems and provides greater assurance to customers and partners than a SOC 2 Type I. This is because the auditor attests to the continued effectiveness of internal governance, controls, and processes over a period of time (rather than a point in time). For clarification, in a SOC 2 Type II audit, an auditor will request populations and samples as evidence stemming from the entire assessment window.