soc 2 and you

42
SOC 2 and You | 1 Overview & Updates SOC 2 and You

Upload: schellman-company

Post on 16-Feb-2017

286 views

Category:

Business


0 download

TRANSCRIPT

Page 1: SOC 2 and You

SOC 2 and You | 1

Overview & Updates

SOC 2 and You

Page 2: SOC 2 and You

SOC 2 and You | 2

Introduction

Page 3: SOC 2 and You

SOC 2 and You | 3

Debbie Zaller

Principal

Completed SOC projects: 945

Danny Manimbo

Manager

Completed SOC projects: 185

Instructors

Page 4: SOC 2 and You

SOC 2 and You | 4

Agenda 01. Background / Overview of SOC 2

02. The AICPA Framework

03. Purpose and Scope

04. The Anatomy

05. Considerations

06. Mapping – Other Standards

07. Q/A

Page 5: SOC 2 and You

SOC 2 and You | 5

Background & Overview 01

Page 6: SOC 2 and You

SOC 2 and You | 6

Growth & Popularity

Page 7: SOC 2 and You

SOC 2 and You | 7

Service Auditors

Page 8: SOC 2 and You

SOC 2 and You | 8

Service Providers

Page 9: SOC 2 and You

SOC 2 and You | 9 ©2015 BrightLine CPAs & Associates, Inc. All Rights Reserved

User Entities

Page 10: SOC 2 and You

SOC 2 and You | 10

Why Do You Need a SOC Report?

Regulatory requirements

User entity mandates

Vendor management programs

Due diligence

Independent 3rd party opinion

Competition and market

Page 11: SOC 2 and You

SOC 2 and You | 11

Overview

• What is a SOC 2 report?

• How does a SOC 2 differ from a SOC 1 report

• SOC 2 versus SOC 3

Page 12: SOC 2 and You

SOC 2 and You | 12

Overview of the AICPA Framework 02

Page 13: SOC 2 and You

SOC 2 and You | 13

AICPA SOC Framework

Applicable SOC-1 SOC-2 SOC-3

Standard/Guidance SSAE 16:

AICPA Guide (2013)

AT 101:

AICPA Guide (2013)

AT 101:

Technical Practice Aid

(2014)

Scope ICFR Security/Systems, Privacy Security/Systems, Privacy

Criteria Control Objectives Trust Services

Principles/GAPP

Trust Services

Principles/GAPP

Usage of report User auditor, user entity,

management of SO Knowledgeable parties Anyone

Page 14: SOC 2 and You

SOC 2 and You | 14

Purpose & Scope 03

Page 15: SOC 2 and You

SOC 2 and You | 15

Purpose

• What SOC 2 does cover?

• What SOC 2 does cover?

Page 16: SOC 2 and You

SOC 2 and You | 16

• System

• Boundaries

• Commitments

• System Requirements

Scope

Page 17: SOC 2 and You

SOC 2 and You | 17

Principles

• Security

• Availability

• Processing Integrity

• Confidentiality

• Privacy

Page 18: SOC 2 and You

SOC 2 and You | 18

Common Criteria (Security):

1: Organization & Mgmt

2: Communications

3: Risk Mgmt & Controls

4: Monitoring of Controls

5: Logical and Physical Access

6: System Operations

7: Change Management

Principles

Page 19: SOC 2 and You

SOC 2 and You | 19

Availability Common Criteria: +3

Processing Integrity Common Criteria: +6

Confidentiality Common Criteria: +6

Privacy Common Criteria: +74

Principles

Page 20: SOC 2 and You

SOC 2 and You | 20

• Type 1

• Type 2

Report Type

Page 21: SOC 2 and You

SOC 2 and You | 21

The Anatomy 04

Page 22: SOC 2 and You

SOC 2 and You | 22

Report Structure

Service Auditor’s Report – “The Opinion”

Management’s Assertion

Description of the System

Tests of Controls and Corresponding Results

Additional Information – Provided by Service Organization

Page 23: SOC 2 and You

SOC 2 and You | 23

Unqualified vs. Qualified

Service Auditor’s Report

Page 24: SOC 2 and You

SOC 2 and You | 24

• Commitment - suitability and accuracy

• Subservice organizations

Management’s Assertion

Page 25: SOC 2 and You

SOC 2 and You | 25

• Management’s objective description of the

services provided to user entities

• Components of a System Description

System Description

Page 26: SOC 2 and You

SOC 2 and You | 26

• Test procedures

• Results

• Deviations / Exceptions

Test of Controls / Results

Page 27: SOC 2 and You

SOC 2 and You | 27

Intended Use

• Management of service organization

• User entities of the services

• Other knowledgeable parties

Page 28: SOC 2 and You

SOC 2 and You | 28

Considerations 05

Page 29: SOC 2 and You

SOC 2 and You | 29

Relevance To The User

• RFP requirements

• Customer mandates

• Regulatory needs

• Vendor management process

Page 30: SOC 2 and You

SOC 2 and You | 30

Understanding Reporting • SOC 1 vs. SOC 2

• AT 101

• AT 601

• Agreed Upon Procedures

• Readiness Assessment

• PCI

Page 31: SOC 2 and You

SOC 2 and You | 31

Education & Preparedness • Contracts, RFP, SLA

• AICPA website

• Training and awareness

• Executive communication

• Discussion with service auditor

Page 32: SOC 2 and You

SOC 2 and You | 32

Control Environment • Start-up

• Developing systems

• No customers yet

• Lack of documentation /evidence

• No monitoring of controls

Page 33: SOC 2 and You

SOC 2 and You | 33

Carve-out Vs Inclusive • Subservice organization

• Carve-out method emphasis

• Inclusive method requirements

Page 34: SOC 2 and You

SOC 2 and You | 34

• Identify in-scope services

• Select physical locations

• Identify subservice organizations

• Identify risks

• Document processes

• Identify control activities

• Identify timeline

Risk Assessment & Scope

Page 35: SOC 2 and You

SOC 2 and You | 35

• Internally

• Service auditors

Readiness Assessment

Page 36: SOC 2 and You

SOC 2 and You | 36

• Policies / Procedures

• Segregation of duties

• Monitoring

Remediation

Page 37: SOC 2 and You

SOC 2 and You | 37

• Licensed CPA firm

• Independent

• Single vendor approach

• Audit team

Audit Firm Selection

Page 38: SOC 2 and You

SOC 2 and You | 38

Mapping to Other Standards 06

Page 39: SOC 2 and You

SOC 2 and You | 39

• SOC 1

• ISO 27001

• HIPAA

• HITRUST

• PCI

Other Standards

Page 40: SOC 2 and You

SOC 2 and You | 40

Questions & Answers 07

Page 41: SOC 2 and You

SOC 2 and You | 41

Join Us Next Time

Locking Up Your Cloud Environment:

Get Vital Information on ISO 27017 and ISO 27018

March 25th

www.schellmanco.com/resources

Page 42: SOC 2 and You

SOC 2 and You | 42

Debbie Zaller

[email protected]

866.254.0000 ext. 117

Danny Manimbo

[email protected]

866.254.0000 ext. 110

THANK YOU