Tag: soc2

Best Practice Strategies for SOC 2 User Access Reviews

User access reviews are a critical control in almost any IT control framework because they help ensure that users have the appropriate level of access to sensitive data and systems. Without integrity of system access how can you know the data is trustworthy? In many industries, regulatory bodies have strict requirements for how organizations must manage access to sensitive information. SOC 1 and SOC 2 expect user access to be appropriate for all in-scope systems, one of such controls includes the review of privileged access – whether that be administrative permissions, confidential data, or just even the system or network itself. A user access review is considered to be a detective control because it is performed after the fact (access was already provided) to detect potential issues overlooked due to inadequate preventative controls (on-boarding/off-boarding). Performing a user access review that should be sufficient to meet your SOC 1 or SOC 2 controls is straightforward, but like anything takes planning and time to execute properly. 1. Define the Access Review Requirements: Establish the systems, boundaries, criteria, and objectives for the access review in order to ensure compliance with regulations, company policies, and industry best practices. 2. Identify the System Owners: Identify system and business owners of in-scope systems who need to be included in the review. 3. Collect User Access Information: Collect user access information, such as user name, roles, groups, applications, and any other relevant data from in-scope systems. 4. Analyze Access Information: Compare user access information to the previously

Read More »

SOC 2 Report – Trust Services Criteria and Categories

The System and Organization Controls (SOC) 2 Report will be performed in accordance with AT-C 205 (formerly under AT-101) and based upon the Trust Services Principles, with the ability to test and report on the design (Type I) and operating (Type II) effectiveness of a service organization’s controls (just like SOC 1 / SSAE 18). The SOC 2 report focuses on a business’s non-financial reporting controls as they relate to security, availability, processing integrity, confidentiality, and privacy of a system, as opposed to SOC 1/SSAE 18 which is focused on the financial reporting controls. The Trust Service Principles which SOC 2 is based upon are modeled around four broad areas: Policies, Communications, Procedures, and Monitoring. Each of the principles have defined criteria (controls) which must be met to demonstrate adherence to the principles and produce an unqualified opinion (no significant exceptions found during your audit). The great thing about the trust principles is that the criteria businesses must meet are predefined, making it easier for business owners to know what compliance needs are required and for users of the report to read and assess the adequacy. Many entities outsource tasks or entire functions to service organizations that operate, collect, process, transmit, store, organize, maintain and dispose of information for user entities. SOC 2 was put in place to address demands in the marketplace for assurance over non-financial controls to prevent SOC 1 from being misused just like SAS 70 was. Did you know? A business isn’t required to address all

Read More »

Get Our Emails

SOC Reporting Guide

Popular SSAE Resources

SOC 1 Report

A SOC 1 Report (System and Organization Controls Report) is a report on Controls at a Service Organization which are relevant to user entities’ internal control over financial reporting. The

Read More »