SOC engagement categorizes

Overview:

same benefits as outsourcing, knowledge, what they excel at, etc.

Types of services: outsource payroll processors, cloud service providers, credit card processes organization, enterprise IT outsourcing services, financial technology services (asset management or loan services), customer support

Why we need SOC engagement: user entries and those who depend on the user entity need to understand and have verification that the design, operation, and controls are working properly.

Requires:

•independence since it is an attestation service

Types of SOC engagements:

•SOC 1

Focuses on internal control over financial reporting

restricted to management, user entity of service org, and independent auditors

Not for potential users

•SOC 2

Focused on security, availability, process integrity, confidentiality or privacy (5 defined trust service categories)

Includes complimentary service entity controls and subservice organizations

Designed and intended for the service org (mgmt and auditor should pre-agree on it)

•SOC 3

Also based on trust service criteria but is for general use.

Does not have a description of system or description of service auditors controls and results

•SOC for cyber security

Reporting on cybersecurity risk management and controls

•SOC for supply chain engagements

Controls over the 5 trust service criteria in the supply chain

SOC reports

What the report looks like depends on what kind of engagement it was, and what kind of report you want to issue.

•Type 1:

Is description accurate of the service organization system

Is the control is designed suitable

•Type 2

Is description accurate of the service organization system

Is the control is designed suitable and operating effectiveness

Throughout a specified period

Note: no such thing as a SOC 3 type 2 report

Content of Type 1 and Type 2 SOC reports

Type 1 for SOC 1 or 2:

•management description of service org system

•Written assertion about whether management description is designed and implemented and is suitably designed to meet control objectives as of a certain date

•Gives an opinion as whether it is fairly stated

Type 2 for SOC 1 or 2:

•management description of service org system

•Written assertion about whether management description is designed, implemented and operated effectively and is suitably designed to meet control objectives with results of the test as of a period of time

•Gives an opinion as whether it is fairly stated

SOC: less than SOC 2

Trust service criteria: from ASEC to meet business objectives, designed to be flexible in application and use.

•Security - required since it could effect everything plus the ability of the entity to meet the objectives

•Availability

•Process integrity

•Confidentiality

•(Or) Privacy

CAPPS

The COSO Framework and the Trust criteria are aligned. CRIME

•Control Environment

•Risk Assessment

•Information and communication

•Monitoring

•Existing controls

A1.1 the entity maintains, monitors. And evaluates current processing capacity and use of system components to manage capacity demand and enable the implementation of additional capacity to meet entity objectives.

A1.2 the entity ensures systems are available by identifying, responding, and communicating environmental threats, designing detection measures, implementing protection mechanics and alerts, performing back up's, ensuring off site storages and considering data recoverability.

PI1.1: entity is either obtaining or generating info that is relevant and of quality

PI1.2 entity will implement the appropriate policies and procedures over systems input to result in products, services, and reporting that meet entity objectives

PI1.3 entity implements policies and procedures over system processing to result in products service, and reporting that meet entity standards

PI1.4 entity will implement policies and procedure to make available or deliver output

PI1.5 implement policed and procedures to store inputs

C1.1 the entity identifies and maintains confidential information

C1.2 the entity disposes of confidential information

P: relate to collecting personal data, concent, using data for specific purposes, managing data, disclosure, and maintaining accurate records.

P1 communication of objectives related to privacy

P2: choose and concent

P3 collection

P4 user access, retention and disposal

P5 access

P6: data and notifications

P7:quality

P8: monitoring and enforcement