Glossary
SOC 2, or System and Organization Controls 2, is an established auditing standard created by the American Institute of Certified Public Accountants (AICPA). A SOC 2 report serves as evidence for a service organization – a company that provides services to businesses and handles their data – that it has the internal controls in place to protect its customers' data.
A SOC 2 report is similar to a trusted stamp or seal that makes it clear that the service provider takes data security seriously and operates in a trustworthy manner. It goes beyond a "check the box" type of certification, with a detailed report from an independent auditor explaining how a service organization's systems and processes manage customer data in accordance with specific, crucial criteria. This is important in an increasingly cloud-first world, where businesses outsource important functions to third-party vendors that are entirely responsible for key components of their businesses like data storage, Software as a Service (SaaS), managed IT, etc.
The Five Trust Services Criteria:
The Trust Services Criteria (TSCs) are critical criteria that govern SOC 2 audits. When obtaining a SOC 2 report, organizations select the relevant Trust Principles for their service and demonstrate that they have sufficient controls in place to satisfy criteria related to those Trust Principles. The following are the five Trust Principles:
Security (Mandatory): This is the base level and required criterion. Security states that information should be protected, and there should be controls in place to not allow unauthorized access to, use of, or disclosure of, information; or damage to systems that affect availability, integrity, confidentiality, and privacy. Security focuses on technical controls, and examples could include firewalls, intrusion detection, multi-factor authentication, and access controls.
Availability: Availability indicates whether a system's products or services are available for operation and use as promised or according to the engagement. Availability encompasses several sub-components - network uptime, performance monitoring, and disaster recovery plans.
Processing Integrity: Processing integrity indicates whether the system's processing is complete, valid, accurate, timely, and authorized. Processing integrity provides the user assurance that information has been processed properly throughout its lifecycle.
Confidentiality: Confidentiality refers to the protection of information that has been specifically described as confidential, to limit access to and sharing of these pieces of information to a limited set of persons or organizations. Confidential information can include business plans, intellectual property, or internal financial information.
Privacy: Privacy refers to the organization's collection, use, retention, disclosure, and disposal of personal information, and was done in accordance with the organization's privacy notice and AICPA generally accepted privacy principles. This applies strictly to Personally Identifiable Information (PII).
SOC 2 Report Types - Type 1 vs. Type 2
SOC 2 audits have two types of reports, which provide different levels of assurance:
SOC 2 Type 1 Report: A Type 1 report is a snapshot in time. The report represents the service organization's system, and evaluates the reasonableness of its controls design as of a timeframe. Essentially, any controls in place are designed in a way which will reasonably support the relevant TSCs.
SOC 2 Type 2 Report: A Type 2 report is much more complex. It evaluates not only the suitability of the design of controls but also examines and reports on their operational effectiveness over time, usually 3 to 12 months. A Type 2 report provides a greater level of assurance because it tells the reader that the controls have been working as intended and consistently.
Why SOC 2 Compliance Matters for Trust and Business Growth
For many businesses currently operating, particularly ones that do business in sensitive data, leverage cloud services, or are in a Software as a Service (SaaS) world, SOC 2 compliance is no longer a "nice-to-have" but a "have-to-have" for their business to be successful.
Why getting SOC 2, and maintaining SOC 2 is important:
Builds Trust From Customers: After all of the data breaches happening these days, customers want to know that their sensitive data is going to be safe. A SOC 2 report, especially a Type 2 report, serves as independent assurance of the organization's commitment to security and privacy, and will increase customer confidence to do business with that organization.
Commercial Advantage: Having a SOC 2 report differentiates a service organization from their competitors. Many larger enterprises and security-conscious client organizations have SOC 2 compliance as a pre-requisite for doing business.
Supporting Strong Security: The nature of the audit process that leads to SOC 2 compliance obligates organizations to identify their vulnerabilities, state their security policies, and invest in strong cybersecurity practices which increases the overall security posture of their organization.
Vendor Management: For businesses that leverage vendors (service organizations) to run their business, if they have a SOC 2 report it can simplify their vendor due diligence, and provide a baseline standard when reviewing the security controls applied to their vendors.
Supports Other Compliance Processes: The controls needed to achieve SOC 2 compliance overlap with the logic of other regulatory frameworks such as HIPAA, GDPR, or DPDPA; thus decreasing overall compliance burden.
Identifying Risks and Reducing Breaches: By continuously evaluating and managing risks to the TSCs, the organization is able to continually identify their weaknesses and deploy controls to prevent issues and compromises such as, but not limited to, breaches, unauthorized access, and other incidents by identifying risks to the organization and operational controls that need to be in place.
Increased Operational Efficiency: The vast majority of the time necessary to get ready for a SOC 2 audit is invested in improving their documentation, processes, and more formalized internal controls which will drive operational efficiencies and consistency.
With ReShield’s identity security platform, it either directly helps organizations to achieve and support SOC 2 compliance, especially in the case of the mandatory Security criterion, often the Confidentiality criterion and Privacy criterion; with the identity security controls needed for Least Privilege Access (LPA), availability for lifecycle administration for human and machine identities, Separation of Duties (SoD), audit trails, and continuous visibility on who can access what data. All critical controls for SOC 2 auditors to provide "reasonable assurance" as to protecting sensitive customer data.