SOC Reporting Services
SOC Reporting Services
Disclaimer
This publication contains general information only and Accedere is not, through this
publication, rendering any professional advice or services. This publication is not a
substitute for such professional advice or services, nor should it be used as a basis for
any decision or action that may affect your business. Before making any decision or
taking any action that may affect your business, you should consult a qualified
professional advisor.
Accedere shall not be responsible for any loss sustained by any person who relies on
this publication. As used in this document, “Accedere" means Accedere Inc. Please
visit https://accedere.io and email us at [email protected] for any specific services
that you may be looking for.
Accedere Inc is a Colorado licensed CPA Firm listed with PCAOB. and Cloud Security
Alliance as Auditors. Restrictions on specific services may apply.
Page 2
Table of Contents
1. Introduction
Page 3
01
Introduction
$3.86M
Average Total Cost of a Data Breach
280 Days
Average time to identify and contain a
breach
A B C
Regulatory SOX-404 & Vendor Due
Compliance PCOAB Diligence
Data Security & Privacy Under the Sarbanes Oxley Having a SOC Report is
are increasing concerns Act (SOX) Public essential for compliance
for many organization. companies are required to with regulatory
this is especially ensure that proper requirements. But there’s
important in cases where controls exist at the more- Think Beyond
data is regulated &/or service organizations for Legalities. If you own an
sensitive as in case of the outsourced services. organization that sells
compliance requirements Public companies have outsourced services (such
for HIPAA, PCI, GDPR,, the responsibility to as payroll services, data
CCPA etc. Cloud examine the control management or cloud
environments are adding environment & may be services) that can
to the complexity of the subject to fines and significantly affect the
issue. Privacy laws are penalties for deficiency of financial health of an user
being enforced that may effective Internal Controls organization, getting a
lead to heavy fines or over Financial Reporting clean SOC Report sends a
penalties. (ICFR). strong signal to your
existing & prospective
clients.
Page 5
D
Data Governance
Data governance issues also relate to
regulatory compliance, security, privacy
& similar concerns impacting today’s
organizations. Today’s data
management & storage landscape,
where data entropy & data sprawl are
rampant, has wide reaching
consequences for data security.
E
Adaptive use of Disruptive
Technologies
Disruptive technologies like Blockchain Change the
(Distributed Ledger) has emerged as
candidate for financial institutions to way you
reform their businesses. The speed &
cost of doing business using distributed think about
ledger technology is expected to
improve by simplifying back-office
operations & lowering the need for
the SOC
human intervention. However, a number
of security concerns around this new
Reports
technology remains a challenge.
Page 6
03
Examples of organizations that may
need SOC Report
Page 7
04
Specific terms in SOC Reports
Page 8
05
SOC Reports History
Page 9
History of CPA involvement in auditing IT controls
1974 SAS 3
The effect of EDP on the auditor’s study & evaluation of internal control
SAS 44
1982 Special-purpose reports on internal accounting control at service
organizations
1992 SAS 70
Service Organizations
SysTrust
1999 Principles & criteria for system reliability
SSAE 16
2010 Reporting on controls at a service organization
Page 10
06
Types of SOC Reports
The SOC Engagements can be split into 2 main requirements
Page 11
Type 1 & Type 2 Reports
Type I Type II
Page 12
SOC 1 SOC 2 SOC 3
Purpose: Purpose: Purpose:
Audit of GRC Programs, Marketing or
Financial Oversight, Due General
Statements diligence purpose
Intended Intended Intended
User: User: User:
Financial Management, Anyone with
Statements Regulators, need for
Auditors, Related Third confidence in
Customers, Parties service
Related Third organization’s
Parties Focus On: controls
Operational
Focus On: controls Focus On:
Internal regarding Easy to read
controls security, report on
relevant to availability, controls
Financial processing
Reporting integrity, Report
confidentiality Types:
Type 1: or privacy General
Design of
Internal Type 1: Evaluates:
Control Design of Design of
Internal controls
Type 2: Control related to SOC
Design of 2 objectives
Internal Type 2:
Control and Design of
Operating Internal
effectiveness Control and
of Internal Operating
Control during effectiveness
review period of Internal
Control during
review period
Page 13
07
Typical Statement of Work
(SOW)
Financial Reporting
Controls for SOC 1
Page 14
Trust Services Criteria (TSC) 2017 for SOC 2
Security
Information and systems are protected
The Security
against unauthorized access, unauthorized category covers
disclosure of information, and damage to
systems that could compromise the about 300 points of
availability, integrity, confidentiality, and
privacy of information or systems and focus under the
affect the entity’s ability to achieve its
objectives.
following 9 aspects:
Availability • Control
Information and systems are available for Environment
operation and use to meet the entity’s
objectives. Availability refers to the
accessibility of information used by the
entity’s systems as well as the products or
• Communication &
services provided to its customers. Information
• Change
Privacy Management
Personal information is collected, used,
retained, disclosed, and disposed of to
meet the entity’s objectives. • Risk Mitigation
Although confidentiality applies to various
types of sensitive information, privacy
applies only to personal information.
Page 15
TSC Availability Category
Page 16
TSC Confidentiality Category
Confidentiality addresses the entity’s ability to protect information
designated as confidential from its collection or creation through its
final disposition and removal from the entity’s control in accordance
with management’s objectives.
• Information is confidential if the custodian of the information is
required to limit its access, use, and retention and restrict its
disclosure to defined parties.
• Confidentiality requirements may be contained in laws or
regulations or in contracts or agreements that contain
commitments made to customers or others.
• The need for information to be confidential may arise as per the
contract between parties for many different reasons.
The following points of focus, which
apply only to an engagement using the
Trust Services Criteria for
confidentiality, :
• Identifies Confidential
information
Page 17
08
TSC Privacy Category
Privacy has become even more
important issue in the current
environment with several large
organizations facing heavy fines.
• Collection
• Access
• Quality
In addition to the Trust Services Criteria, the COSO framework, states that the
points of focus represent important characteristics of the criteria. Consistent
with the COSO framework, the points of focus assist management when
designing, implementing, and operating controls over security, availability,
processing integrity, confidentiality, and privacy .
Page 19
Risk Metrics Measurement & Governance
• As per the updated Common Criteria it is important to report on
all aspects of risks covering monitoring as well as on effective
mitigation. To do an effective monitoring and mitigation, we
need to define metrics of measurements where in you define
what legal requirements, threats or indicators of compromise
you are monitoring and their related controls. Any variance must
be monitored daily, weekly or monthly as the case may be and
all exceptions or issues must be reported to the Security
Governance committee.
I llu
s t ra
t i ve
Page 20
10
SOC Controls
SOC controls would include the entire commit of
People, Process & Technology & how they are used
in conjunction to achieve the relevant objectives. The
controls would also cover:
Policies
Communication
Procedures
Monitoring
Page 21
11
Description Criteria
As part of SOC report a Description of Controls of
the system is required from the organization. The
new 2017 Description Criteria covers the following
Final Report
areas:
• Technically SOC is an Attest
01 The types of Services Provided report not an Audit report.
Page 23
12
SOC 2 Plus Reports
A service organization may engage the service auditor to examine & report on subject matters
in addition to the description of the service organization’s system in accordance with the
description criteria & the suitability of design & operating effectiveness of controls based on the
applicable Trust Services Criteria.
Page 25
Our Value Delivery
Knowing how much extra value and assurance a SOC reports can deliver, many clients find that
it makes sense to take steps to ensure a more successful outcome, including hiring experts who
are skilled in helping organizations be more thorough and thoughtful in how they approach their
engagement. Preparing for a SOC engagement is a matter of clear thinking and smart planning.
Working with a cyber security specialist such as Accedere helps you dig into areas such as cloud
security, data security, privacy, incident response, and much more.
09 Ongoing support
https://accedere.io
Page 26