Overview of IT Audit and SOC 2
Overview of IT Audit and SOC 2
Introduction:
Now that we have gained a solid understanding of change management
and cloud computing, we can now shift our focus to the realm of auditing
and specifically SOC audits.
This chapter will begin with an overview of IT auditing, then introduce the
SOC framework. It will culminate in an in-depth examination of SOC 2 and
its detailed process.
In this section, we will discuss the meaning, types, objectives, and the
process of Information System Audit.
Definition
The Audit of Information System is an evaluation of an IT
infrastructure, controls, and operations made by an independent
external third party. It also shows the organization its strong and
weak spots and gives recommendations for improvement. Through
IT Audit, a firm can review whether its existing controls are
protecting its property and maintaining its data accuracy.
2
As an unbiased observer, the IT auditor makes sure that an
organization’s controls are implemented appropriately to lower the
risk of data breaches and any risk of security concerns.
SOC 2 reports form an essential part of IT audits, it provides a
thorough evaluation of the quality of an organization’s controls in
areas such as Security, processing integrity, confidentiality,
availability, and privacy. It is a component of IT audit and have a
synergistic relationship with it: On one hand, SOC 2 reports improve
IT audits through providing in-depth analysis and insights about an
organization’s controls. On the other hand, IT audits can expand the
scope of the SOC 2 report. Actually, the boarder scope of IT audits
can identify areas or controls that should be covered in the
upcoming SOC 2 assessment.
Types
There are 3 different types of IT audits, each has its distinct purpose
and concentrate on a particular facet of the information technology.
In this part we are going to delve into each type to better
understand their roles and objectives:
Contractual Audit:
A contractual audit is carried out without being mandated by law, it
is a contract based on an agreement between the auditor, the
organization, and stakeholders. Its primary objective is to fulfill
contractual obligations that were previously agreed upon by all the
involved parties.
In this type of IT Audit, the client is responsible of specifying the
areas that need to be reviewed, this includes the creation of a SOC
report.
Security Audit:
The security audit includes the assessment of the systems
infrastructure and the security practices of an organization. It
suggests corrective measures and improvements through identifying
weaknesses and potential security risks. Security audit different from
on-site inspections: It is not limited in scope with specific guidelines
3
and standards, instead; it thoroughly evaluates the entire system to
detect any vulnerabilities and thus suggests corrective actions.
Legal Audit:
4
strict risk assessment to determine potential vulnerabilities,
weaknesses, and the impact of security incidents on corporate
operations.
Analyzing computer systems and their management processes in
order to determine its inefficiencies and potential risks. This helps in
identifying areas for improvements and avoid upcoming risks and
vulnerabilities.
In this part we will explore the IT audit process and define the aim of
each step involved:
Planning:
During the planning phase, the first thing that auditors do is to define the
audit mission, its objectives, and its scope. The role and responsibilities of
each team member are clearly defined, and the resources are correctly
assigned. Auditors and the auditee collaborate in this step to be sure that
the upcoming steps will be conducted effectively and smoothly. Together,
they set a detailed plan of the audit activities, agree on the timeline, and
discuss the procedures and areas that should be evaluated during the
audit.
5
applications that should be evaluated, list of contacts to meet,
schedule of the future interviews, work plan...
Evaluate:
During the evaluation step, auditors start analyzing the auditee’s IT
environment to better understand its infrastructure and to identify
patterns and complexities. Then, they determine the controls and IT risks
that needs to be addressed to make sure that they are properly managed
and well organized. In this step, the audit plan should be revised before
validation; auditors should ensure that in aligns with the objectives of
audit and then do the necessary modifications if required.
Investigate:
During the investigation step, auditors use all the documentation and
evidence that they have gathered to test the operational efficiency of the
control activities. Then, they will revise and improve their initial results
with the audited entity to ensure the accuracy and validity of their
assessment. If needed, auditors can carry out additional investigations to
go more deeply into some areas of concern and to provide a more
complete and accurate evaluation of the IT controls of the company. To
make it short, this step is crucial because it allows to detect potential
problems and make sure that the current controls are operating as
intended.
Conclude:
During this step, the auditor delivers it findings and results to the audited
entity’s management, they communicate to them how IT risks are being
handled and evaluate their scope. In some cases, the audit report should
be shared with the financial audit team to make sure that risks and
controls related to financial reporting are being correctly addressed.
6
Lastly, the performance of each member of the audit IT tam is evaluated
and the audit work is archived.
Introduction to SOC
Businesses are confronting more and more cybersecurity risks as they are
increasingly relying on cloud services and undergoing frequent changes on
their IT system. Service Organization Control (SOC) reports are critical to
assess and guarantee the security, availability, confidentiality, and privacy
of the services of an organization. These reports prove adherence to
rigorous security regulations and regulations which will promotes
transparency and foster trust among stakeholders. In this section, we will
explore the SOC reports and delve into its history, types, and better
understand the SOC 2 report.
Definition
Service Organization Control (SOC) reports are a set of standards issued
by the American Institute of Certified Public Accountants (AICPA) to
evaluate and report controls related to security, confidentiality, processing
integrity, and availability. They are generated and validated by third-party
auditors to strengthen the trustworthiness of an organization. They certify
that this organization have implemented the necessary and efficient
controls to secure the data of its clients and protect it from any risk. SOC
reports are generally conducted once a year and are considered crucial for
organizations that operate in sectors where privacy and data protection
7
are critical. One of the main objectives of SOC is to test evaluate the
security of an information system; those who seek SOC compliance should
be working in the field of managing large amounts of data on behalf of
other companies. Yet, a service provider can independently opt for SOC
compliance before anyone asks for it; this will show that he is trustworthy
which can help in attracting new clients.
History of SOC:
Since 1990, organizations have been outsourcing all or part of their data
and operations to service providers to run their activities more effectively.
Consequently, risks related to outsourcing grew, and concerns about data
security became alarming.
With the rapid technological evolution and the rising concerns of hacking
and data theft, financial controls were barely covering only 10% of the
risks. Clients became more conscious of the importance of protecting their
data, they started looking for a more complete and thorough assessment
of data security and privacy.
After looking at the history of SOC, we will now discuss its different types
and contents and standards that apply to them.
8
controls. In this part, we will have an overview of the different SOC reports
we will mostly be focusing on SOC 2 reports.
9
The definition of each SOC report is summarized in the illustration
below:
Objectives and
Who needs it?
characteristics
- Assess the internal
controls for financial
reports.
- Focuses on financial - Businesses offering
controls. financial services. It can
SOC 1
- Are available only for be the providers of
auditors and clients. payment services
- Standards:
ISAE 3402
SSAE 18
10
- It evaluates the
efficiency of user
entities’ data security,
integrity, availability, and
confidentiality controls.
- The IT service providers
- Focuses on operational
who oversee the
controls.
SOC 2 transfer, processing,
- Are available only for
and storage of the data
auditors and clients.
of its clients.
- Standards:
SSAE 18 AT-C 105 /
205
ISAE 3000
TSP Section 100
- Its scope and content are
like the SOC 2 report, but
it doesn’t include the - For commercial
testing procedures, reasons, it is used by
controls, or results. businesses who want to
SOC 3
- Depends also on the 5 communicate their
Trust Service Criteria compliance to SOC 2
- For marketing purposes, standards.
it is published for the
public.
Table 1: Objectives and characteristics of each SOC report
11
evaluating the effectiveness of these controls during an extended
period.
Type 2:
SOC type 2 reports form a 12-month assessment of the testing of
the operational efficiency of controls. It provides stakeholders
with valuable insights about how well the organization’s internal
controls function in terms or consistency and reliability over an
extended determined period.
We will now explore the types of the SOC 2 report in more details,
with a particular attention to how SOC 2 type 1 and SOC 2 type 2
differ from one another:
SOC 2 Report
- SOC 2 type 1 is generated at a particular moment in
time.
report
12
- SOC 2 type 2 is generated over an extended period (3 to
12 months)
controls.
resources.
Understanding SOC 2:
The SOC 2 certification is gaining recognition on a worldwide level. It is
designed for companies who provide systems and services such as the
cloud, Software as a Service (SaaS), or Platforms as a Service (PaaS) to
their clients. This certification helps clients to guarantee that service
providers are adhering to high standards in terms of Security,
Availability, Integrity, Processing, and Privacy.
In this part, we will explore the content of the SOC 2 report, go over the
Trust Service Criteria (TSC), and discover the advantages of elaborating
a SOC 2 report.
Management Assertion:
13
In this part, the company’s executives should confirm that the
description of the system that they have stated in the report is
correct and the list of the controls provided in this report is
designed and functioning properly. This part should include:
- A statement that attests to the validity and precision of the
system description
- A statement that the controls are appropriately designed and in
line with the Trust Service Criteria.
- Confirming that the controls were functioning properly during
the designated time frame.
System Overview:
14
This part shows if there is a compliance between the system’s
controls and the Trust Service Criteria. It involves:
- Describing each control used to meet requirements for security,
privacy, processing integrity, availability, and confidentiality.
- An evaluation of the controls’ weaknesses and if there is any
area for improvement.
- A description of the way the control is designed to reduce risks
and conformity to the criteria.
Table 3: Content of SOC 2 report
=> The structure of the SOC 2 report differs from one audit
firm to another. However, it often similar components.
15
This criteria states establish whether the system is functioning
correctly. It ensures that the system processing is valid, accurate,
timely, complete, and authorized.
Confidentiality:
This criterion enables to guarantee the privacy of the clients’ data
and the internal data of the service provider.
Privacy:
This criterion enables to ensure that the process of collecting,
transferring, and storing clients’ data is carried out while
guaranteeing people’s privacy.
17
assessing organizational practices and internal controls. In this part, we
will delve into the approach of the SOC 2 audit process and discuss every
phase of it.
18
- Competitive advantage: This depends on the company’s vision and
objectives; for example, if the aim is to gain a competitive edge, it
should opt for a type 2 report.
- Regulatory compliance: There are some industries that are subject
to regulatory restrictions that impact the type of the report required.
Companies operating in a highly regulated industries may need a
Type II report to meet certain specific requirements.
The second step of the process is to define the relevant scope, including
the services, systems, and criteria that the end user needs assurance
over. This includes determining the audit period (the AICPA recommended
a period of six months for type II audit) and the relevant Trust Service
Criteria (a firm can choose the criteria that are the most critical to them
especially if they have limited resources).
Once the reporting period and the TSC are fixed, we should identify which
controls and security systems are relevant to the chosen TSC. Then, we
gather all the required documentation for the controls and systems. The
documentation include:
After collecting all the necessary documentation above, the auditor should
review them and assess the operational efficiency of the controls and
systems in question.
Step 3: Conducting a gap analysis:
The gap analysis helps to identify areas where the system is not
adequately protecting clients’ data. The findings from this analysis will
help in highlighting areas that require improvements and setting a plan to
19
fix these gaps and ensure that the system complies before undergoing the
official SOC 2 audit.
Step 4: Conducting a readiness assessment:
During this phase, the IT auditor will develop a readiness assessment in
which he will identify the company’s gap and provide his
recommendations. Throughout this evaluation, the auditing company will
evaluate the degree to which the systems and controls conform to the
selected Trust service criteria. It is imperative that the organization
educates itself about these criteria and be prepared to respond to specific
questions such as:
- About availability: “How do you determine when to share sensitive
data?”
- About Security: “How is the system protected against cyber-
attacks?”
- About Privacy: “What measures do you take to ensure secure
exchange when sharing information?”
- About Confidentiality: “How do you make sure that the system is
maintaining the confidentiality of private information?”
- About Processing Integrity: “Does the system performs its intended
functions accurately?”
20
- Level of experience: Seek a team that has already performed SOC
audits for businesses of a similar size and operating in related
industries.
- Compatibility: There should be a compatibility between the
organization and the auditing firm. Effective communication and
collaboration are crucial to achieve a successful audit process and
accomplish objectives.
- Engagement duration: Verify the expectations regarding the audit
timeline and on-site visits. SOC 2 audit engagement often take
several months including the periodic assessment and the final
reporting. It is crucial to go over these timelines with the auditor to
make sure they fit the demands and schedule of the firm.
- Audit process: Seek a clear understanding of how the auditing firm
will conduct the audit and prepare the final report. Identify their
methods for gathering data, assessing controls, and distributing
results.
Step 6: Beginning the formal audit process:
With all preparations done, the formal and official SOC 2 audit process
begins. But first, the auditor should spend several weeks working with the
company’s team to schedule the convenient start date and discuss the
audit process and here’s what happens exactly:
1- Security Questionnaire: Various auditing firms prefer to start the
process with posing questions about the firm’s policies, processes,
controls, and IT infrastructure. This will be helpful for the firm’s team
to develop good security habits.
2- Collecting control evidence: The firm should provide auditors
evidence and documentation of security controls. Auditors will
typically review an average of 85 distinct controls; they should
demonstrate the existence of all security policies and internal
controls to show that everything is working correctly. They will then
use these demonstrations as part of their assessment to understand
how controls are intended to operate.
21
3- Evaluation: Auditors should collaborate and discuss with process
owners to review operational practices and security measures.
4- Follow up: During the SOC 2 Audit, auditors should meticulously
verify everything for compliance, that’s why they may request
additional evidence or clarification on some controls or processes
despite all the preparation work. If the auditor observes any
compliance gaps that can be quickly corrected, he may request a
correction to it before proceeding further.
5- Final SOC 2 report: At the end of the audit, the firm will get a written
report that outline all the findings. A favorable audit report is
something beneficial that will add more value to the company,
however; if there are any identified issues, the report will serve as a
guidance on addressing them to improve compliance.
Step 7: Receiving the audit report.
A comprehensive report covering all areas of controls across all layers of
Trust Service Criteria is provided to the client demonstrating assurance in
compliance with the SOC 2 requirements.
The SOC 2 Common Criteria list, also known as the CC series, is organized
into nine categories; and change management is specifically addressed
within one of these categories.
22
and ethical behavior, it analyzes ethical standards, governance
frameworks, and management philosophy.
23
In-depth Analysis of change management controls in SOC 2:
24
Control evaluation process:
Design suitability:
Checking if a control is properly configured to manage a particular risk is a crucial step in
evaluating the control’s design and checks if it responds to the relevant TSCs for this process.
Here is what this involves:
- Identify the missing controls: We check if there is any important control that is
missing.
- Assess the existing controls: We evaluate the current implemented controls, and we
check if they are properly designed and achieve their intended objectives. In some
cases, a control can be operating properly and as it should, yet it may not be effective
and does not manage the risks it meant to manage.
During this step, the firm’s auditor usually needs to implement these
procedures:
25
Operational effectiveness:
The operational effectiveness is evaluated during a period of 12 months to make sure that
the control is functioning effectively and achieves its desired objectives.
To validate this step, it is crucial to obtain the necessary documentation that describe how
the control is operating. W should then make sure that these documents are accurate and
complete through assessing these criteria:
The Information Provided by the Entity (IPE) refers to the documents and data supplied
to the audit team to test the control’s effectiveness.
The Information Used by the Control (IUC) refers to the data used by the service
provider’s team to perform the internal controls. The audit team should determine
whether the information is accurate, comprehensive, and complete to support their
testing phase.
- Data source: We should access the data sources to verify their completeness and
accuracy, it is through determining where the information is created, transmitted,
and stored.
- Parameters: This involves the paths
- Logical reports: Checking the algorithm, formula, and scripts used to extract and
provide the require information.
Once IPE and IUC have been verified, we can start the operational effectiveness testing.
To test how well the controls are working, we first need to understand how it operates. This
can be done using three techniques:
26
c) Determining the scope and effectiveness of control testing:
The auditor team should rely on their experience and professional judgment to decide
whether to test the full population or just a sample of it when determining the scope of
control testing.
- The population size: The total number of transactions or items that should be tested.
- The control frequency: How often the control in applied?
- Inherent Risk (RAIT): The possibility that a significant anomaly or incident would
happen throughout the process regardless of the internal controls in place. The RAIT
can be LOWER or HIGHER.
- Control risk (RAWC): It refers to the risk that a major anomaly would arise in the
process and go unnoticed by the internal control which will lead to unsolved
problems. The RAWC can be HIGHER or NOT HIGHER.
Once the control’s design and operational effectiveness are both regarded effective, the
control is then deemed valid. If, however, there are issues with the effectiveness tests, it
is deemed useless.
Conclusion:
SOC 2 reports are becoming highly common and crucial for companies
that offer services to user entities, it guarantees the existence of strong
internal controls and plays a necessary role in preserving trust between
service providers and their clients. In this chapter, we have explored,
going over its background, different types, and the detailed process of the
audit mission. We also covered the content of a SOC 2 report and the
importance of having such a report. In the upcoming chapter, we will
highlight a theoretical case study of a SOC 2 mission and we will
demonstrate its practical application especially for change management.
27