SOC2 4mb
SOC2 4mb
SOC2 4mb
Reporting 101
SOC 2 | RSI Security
858.999.3030 | [email protected]
2021
Understanding SOC Audits
and SOC Reporting
There are three primary SOC standards developed by the American Institute of Certified Public
Accountants (AICPA). A SOC audit involves a comprehensive review of an organization’s con-
trols, related to either financial reporting or information security.
Type 2
A report on the design and operational
effectiveness of controls, with
assessment occurring over 3-12 months.
Note: SOC 3 reports do not have a “Type” designation, but use a long-term Type 2 audit.
In many cases, organizations generate a Type 1 SOC 1 or SOC 2 report en route to a longer Type 2
report at a later date. For example, a service organization might generate a SOC 2 Type 1 report, then a
SOC 2 Type 2 report (for auditors) and then also a SOC 3 report for the public.
Selecting the Appropriate SOC Report
When deliberating about which SOC audit to For financial services organizations and
conduct, the first question to ask is: segments, the second question is:
Which kind of organization are we? Or, which What level of detail is required concerning
part of the organization is being audited? controls over financial reporting?
For all other service organizations and For service organizations seeking a report for
segments, the second question is: clients and auditors, there is a third question:
Who is the intended audience for the report on What level of detail is required concerning
information security controls? controls over information security?
SECURITY
Ensuring that information and systems involved in
its collection, use, or storage are protected against
unauthorized access or disclosure compromising
integrity, confidentiality, and privacy.
Security applies to all engagements; the additional criteria may or may not apply
to a SOC 2 or SOC 3 engagement, depending on the specific reasons for the
organization’s audit reporting:
AVAILABILITY CONFIDENTIALITY
Ensuring that all information and systems Ensuring that all information designated
are accessible and meet defined confidential is protected, up to defined
objectives. thresholds and objectives.
And, beyond all the Common Criteria, there are three supplemental Availability criteria (A Series), two
supplemental Confidentiality criteria (C Series), five supplemental Processing Integrity criteria (PI
Series), and eight supplemental Privacy criteria (P Series).
Depending on the nature of your SOC engagement, you may be assessed on all 13 Series of Criteria, or
only a portion of the supplemental controls specified outside of the Common Criteria.
www.rsisecurity.com • 858.999.3030 • [email protected]
RSI Security’s
SOC 2 Services
RSI Security has helped countless service
organizations generate SOC 2 Type 1 and
SOC Type 2 reports. We offer comprehensive
SOC 2 advisory and assessment services. Our
experts will conduct a readiness assessment to
gauge your organization’s needs and the state
of your cybersecurity controls per the Trust
Service Criteria. Then, we will assist in program
development and acquisition to meet or surpass
all requirements for your assessment. Finally,
RSI Security will conduct the assessment,
either Type 1 or Type 2— leading to a successful
report. We can then assist in long-term
management to maintain compliance.