RSI Security

What Are The Soc 2 Compliance Requirements?

Many different auditing processes exist, and companies increasingly face the challenge of choosing which type to conduct. Consumers and business partners demand data protection, so it is vital that companies understand the differences of each auditing process available. Are you aware of the Soc 2 compliance requirements? Find out how to be compliant from the experts at RSI Security.

 

What is SOC 2?

At its most basic, SOC 2 (System and Organizational Control) is an auditing process targeting inter-business relationships, not business-to-consumer relationships. SOC 2 principles focus on service organizations. The American Institute of Certified Public Accountants (AICPA) defines a service organization as:

The entity (or segment of an entity) that provides services to a user organization that is part of the user organization’s information system.

 

Here are a few more articles to help you learn more about SOC 2 :

Many of the security aspects SOC 2 addresses involves external interactions that could affect internal or customer data security. The AICPA developed SOC 2 as a way to encourage the implementation and oversight of proper security procedures. Similar to other security guidelines, SOC 2 outlines a basic structure for security measures, but then allows companies to customize those basic measures to their needs. This contrasts the more strict guidelines of the Payment Card Industry Data Security Standard (PCI DSS).

 

Assess your SOC 2 compliance

 

Report Types

SOC 2 is just one of three types. SOCs 1 and 3 also exist, but they each serve a different purpose. This sometimes makes report selection difficult for companies. A SOC 1 report is equivalent to a  Statement on Standards for Attestation Engagements (SSAE 16) report. If a company’s operations can impact Internal Controls over Financial Reporting (ICFR), then it should conduct a SOC 1 report. ICFR is a process designed to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles.

Unlike SOC 1 reports, a SOC 2 report focuses on the five Trust Service Criteria (TSC) principles: security, availability, processing integrity, confidentiality, and privacy. As noted above, companies use these principles to assure their business partners and service organizations that proper security procedures are in place. A SOC 3 report is very similar to a SOC 2 report but differs in that it can be publicly distributed and provides fewer details.

 

 

Report Subcategories

Within SOC 2 there are two varieties of reports: Type 1 and Type 2. A type 1 report focuses on the Trust Services Criteria (TSC) a company chooses to use and other controls in place to mitigate security risks. A type 1 report reviews security controls based on a specified point in time (e.g., January 1). A type 2 report details how those controls are structured and implemented over a period of time (e.g., 6 months). All these categories may sound confusing, but CyberGuardian Compliance recommends the following trick to remember what each category involves:.

SOC = Scope

Type = Time

 

Components of the Trust Service Criteria

Unlike a SOC 1 report which focuses more heavily on financial controls, the TSC principles, as noted above, are key aspects of a SOC 2 report. To ensure SOC 2 compliance, companies must analyze the following five principles and consider how they relate to current company operations.

The graphic below details several different considerations relevant to each of the five principles:

What Are the Generally Accepted Privacy Principles (GAPP)?

The AICPA and the Canadian Institute of Chartered Accountants (CICA) designed the GAPP as a global privacy framework to help organizations create an effective privacy program that addresses privacy risks, obligations, and business opportunities. The following 10 principles are based on globally recognized good practices. For more complex principles, like management and information disposal, the AICPA provides more in-depth recommendations.

  1. Management: The entity should define, document, communicate, and assign accountability for its privacy policies and procedures. Consider taking a personal information survey to identify what information is being collected and how it is stored. Such a survey should specify who collects the information. Is collection done by a live person (and from which department) or an algorithm. In an age where information overload can result in less efficiency and security breaches, a survey helps managers determine if an excess or insufficient amount of data is collected.

Sample Survey:

 

  1. Noticean entity should provide notice about its privacy policies and procedures and identify the purposes for which personal information is collected, used, retained and disclosed. Customers/service organizations want to know why their information is required, how it is used, and how long the company will retain the information. If a company does not need to store information for more than a week, then policies (see #5) should ensure that the information is properly removed from the system after that designated time period. The goal is to minimize a glut of unneeded data.
  2. Choice and consentThe entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use and disclosure of personal information.
  3. CollectionThe entity collects personal information only for the purposes identified in the notice.
  4. Use, retention, and disposalThe entity should limit the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent. Make sure information is utilized only in the manner specified by the privacy policy. Likewise, once information is no longer needed, dispose of it. Factors for retention periods include: current activities, access requests, legal/regulatory requirements, benefit of storing information, collection purpose, customer authentication requirements, potential legal risks (e.g., proof), industry guidelines, and contractual obligations. Other considerations include whether the disposal process will occur on-site or off-site. The disposal process should be irreversible.

Disposal Options:

  1. AccessThe entity provides individuals with access to their personal information for review and update.
  2. Disclosure to third partiesThe entity discloses personal information to third parties only for the purposes identified in the notice and with the implicit or explicit consent of the individual.
  3. Security for privacythe entity protects personal information from unauthorized access (both physical and logical). Causes of data breaches range from lost laptops to social engineering. Conducting a PII storage inventory will help identify the weakest link in your storage practices. This includes reviewing physical and electronic means of storage. For example, make sure physical files are kept in locked filing cabinets in locked rooms. Papers lying on desks are easy targets for wandering eyes. For electronic storage, the AICPA suggests using a layered approach, meaning every electronic device has several different security measures (e.g., firewalls, encryption, wireless monitoring, unique system IDs, etc.). Other storage methods to consider include USBs, hard drives, or CDs.
  4. QualityThe entity maintains accurate, complete and relevant personal information for the purposes identified in the notice.
  5. Monitoring and enforcementThe organization should monitor compliance with its privacy policies and procedures and have procedures to address privacy-related complaints and disputes.

 

 

Privacy Classifications

One of the major aspects of audits like SOC 2 is ensuring the protection of customer and company data. The AICPA suggests each company create information-classification levels. The number of tiers will depend on a company’s scale and how much information/what type is collected. For example, a minimal classification system may include three levels: Public, Business Confidential, and Secret. Public information includes products for marketing or internal procedural documents. Business Confidential information would include basic customer information and should be protected with at least moderate security controls. Secret information would include highly sensitive PII, such as a Social Security Number (SSN) or bank account number.

In conjunction with information classification levels, a company should have an information request process and designations for personal access levels. For example, if an employee from PR or the Marketing team needs statistics on customers, that information would likely be classified under Business Confidential and only require a mid-level security authorization. Utilizing a request system will enable information sharing while minimizing the risk of “excessive” access (i.e., given more information than necessary to complete a task).

 

What Will Be Included in a SOC 2 Report?

So what’s the end result of all this hard work? After completing the compliance process, companies receive a report that verifies their efforts toward minimizing security risks. The following list provides a brief summarization of the seven-part report.

 

Audit Dissemination

Again, it’s worth noting that distribution of a SOC 2 report is limited in comparison with a SOC 3 report. SOC 2 reports may be distributed to user organizations involved with your company as a means of security assurance. However, companies cannot share SOC 2 reports with the general public. To reassure the public that proper procedures are in place, a SOC 3 report must be completed and subsequently distributed.

 

 

Need Help?

Audits simulate a trail, allowing companies to go forward but always have a record of their past actions. This “trail” acts as a safety net (in legal cases) and a means of strengthening trust between customers and businesses. If the process of auditing seems overwhelming, don’t worry! Many companies find it difficult to navigate the complex world of auditing. To learn more about SOC 2 compliance or receive help overhauling your current auditing process, contact RSI Security today.

 


Speak with a SOC 2 compliance expert today – Schedule a free consultation

 

Exit mobile version