Service Organization Controls (SOC) Reports
Service Organization Controls (SOC) Reports
Service Organization Controls (SOC) Reports
com
Service Organization
Controls (SOC) Reports
SOC 2 Basics:
A comprehensive look at the
SOC 2 reporting standard
Agenda
PwC
Section One:
Background of Service Organization Controls
(SOC) Reports
PwC
Background on Service Organization’s Controls
(SOC) Reports
PwC 4
SOC 1 Reports
PwC 6
SOC 3 Reports
SOC 3 reports address a similar subject matter and use the same
criteria (Trust Service Principles) as a SOC 2 report, but do not include the
following reporting components.
• A description of the service organization's system prepared by
management of the service organization.
• A description of the service auditor’s tests of controls or results
SOC 3 reports are general use reports, which allows the service
organization to provide the report to anyone. On the other hand, SOC 2 reports
are restricted use reports and are typically intended for a specific party with
prior business knowledge or understanding of the services provided by the
service organization.
PwC 7
Combination of SOC reports
Combining SOC1 and SOC2 reports is not permitted, as SOC2 reports are not
specifically designed to focus on systems and controls that may be relevant to
user entities’ internal controls over financial reporting. Further, SOC1 and
SOC2 reports are issued under different standards.
SOC 2 and SOC 3 reports can be combined, the work performed in a SOC2
engagement may enable a service auditor to report on a SOC3 engagement as
well. However, you will need to consider the following key factors:
• No subservice organizations can be carved out from a SOC 3 report. All
subservice organizations must be included in the scope of the
engagement.
• All significant controls relevant to meet the applicable Trust Services
Principles need to be encompassed in the SOC 3 report. Complementary
user entity controls cannot be used to address these Trust Services
Principles, in the SOC3 report.
PwC 8
Comparison of SOC 1, SOC 2, and SOC 3 reports
PwC 9
Comparison of SOC 1, SOC 2, and SOC 3 reports
(continued)
What is the To provide the auditor of a user To provide management of a To provide interested parties with
purpose of entity's financial statements service organization, user an independent accountant’s
the report? information about controls at the entities, and other specified opinion on controls at the service
service organization that may be parties with information and an organization relevant to security,
relevant to a user entity's internal independent accountant’s opinion availability, processing integrity,
control over financial reporting. A on controls at the service confidentiality, or privacy.
type 2 report can be used as organization relevant to security, If the report addresses the
audit evidence that controls at availability, processing integrity, privacy principle, the service
the service organization are confidentiality, or privacy. organization's compliance with
operating effectively. If the report addresses the the commitments in its privacy
privacy principle, the service notice.
organization’s compliance with its
privacy commitments.
Who are the Management of the service Management of the service General distribution
intended organization; user entities during organization and other specified
users of the some or all of the period covered parties who have sufficient
report? by the report (for type 2 reports) knowledge and understanding of
and user entities as of a specified the business, including
date (for type 1 reports); and prospective users.
auditors of the user entities'
financial statements. This does
not include prospective users.
PwC 10
Section Two:
The Details of SOC 2 Reporting and Other Key
Considerations
PwC
Types of SOC 2 reports
PwC 12
Components of a SOC 2 report
PwC 13
Responsibilities of Management
PwC 14
Section Three:
The Trust Service Principles
PwC
Defining the system components
Key components of the System
Footnote 1 of TSP section 100, Trust Services Principles, Criteria, and
Illustrations for Security, Availability, Processing Integrity, Confidentiality,
and Privacy (AICPA, Technical Practice Aids), contains the following
definition of a system:
A System consists of five key components organized to achieve a
specified objective. The five components are categorized as follows:
• Infrastructure. The physical and hardware components of a system
(facilities, equipment, and networks)
• Software. The programs and operating software of a system (systems,
applications, and utilities)
• People. The personnel involved in the operation and use of a system
(developers, operators, users, and managers)
• Procedures. The programmed and manual procedures involved in the
operation of a system (automated and manual)
• Data. The information used and supported by a system (transaction
streams, files, databases, and tables)
PwC 16
The Five Trust Services Principles
TSP section 100 provides criteria for evaluating and reporting on controls
related to security, availability, processing integrity, confidentiality, and
privacy. In TSP section 100, these five attributes of a system are known as
principles, and they are defined as follows:
a. Security. The system is protected against unauthorized access (both
physical and logical).
b. Availability. The system is available for operation and use as committed or
agreed.
c. Processing integrity. System processing is complete, accurate, timely, and
authorized.
d. Confidentiality. Information designated as confidential is protected as
committed or agreed.
e. Privacy. Personal information is collected, used, retained, disclosed, and
destroyed in conformity with the commitments in the entity's privacy notice
and with criteria set forth in generally accepted privacy principles (GAPP)
issued by the AICPA and CICA.
PwC 17
Trust Principles Criteria Components
The following four components are represented in the respective principles and
criteria.
• Policies – The entity defines and documents its policies for the ‘Trust
Services Principle’ of its system.
• Communications – The entity communicates its defined ‘Trust Services
Principle’
policies to responsible parties and authorized users.
• Procedures – The entity placed in operation procedures to achieve its
documented ‘Trust Services Principle’ objectives in accordance with its
defined policies.
• Monitoring – The entity monitors the system and takes action to maintain
compliance with its defined system Trust Services Principle’ policies.
PwC 18
Security Principle
PwC 19
Availability Principle
PwC 22
Confidentiality Principle
Information designated as confidential is protected as committed
or agreed.
• In the course of communicating and transacting business, partners often
exchange information they require to be maintained on a confidential
basis.
• The confidentiality principle refers to the system’s ability to protect the
information designated as confidential, as committed or agreed.
• Examples of the kinds of information that may be subject to confidentiality
includes: intellectual property and client and customer lists
• What is considered to be confidential information can vary significantly
from business to business and is determined by contractual arrangements
or regulations.
• Confidential information that is provided to another party is susceptible
to unauthorized access during transmission and while it is stored on the
other party’s computer systems.
PwC 23
Privacy Principle
PwC 24
Privacy (continued)
Reporting on a company's compliance with GAPP requires an evaluation of the
following:
Notice – The entity provides notice about its privacy policies and procedures
and identifies the purposes for which personal information is collected, used,
retained, and disclosed.
Choice and Consent – The entity describes the choices available to the
individual and obtains implicit or explicit consent with respect to the
collection, use, and disclosure of personal information.
Collection – The entity collects personal information only for the purposes
identified in
the notice.
Use, Retention and Disposal – The entity limits the use of personal
information to the purposes identified in the notice and for which the
individual has provided implicit or explicit consent. The entity retains personal
information for only as long as necessary to fulfill the stated purposes or as
required by law or regulations and thereafter appropriately disposes of such
information.
PwC 25
Privacy (continued)
PwC 26
New Guidance from AICPA Available
• Risk assessment: To illustrate the linkage between criteria, risks, and controls,
appendix B, “Illustrative Risks and Controls,” was developed to provide examples of
risks that may prevent the criteria from being met, as well as examples of controls
that would address those risks.
PwC
Section Four:
Is SOC 2 Applicable To Your Organization?
PwC
Applicability
PwC
Section Five:
How it Works: What to Expect From Your
Accounting Firm
PwC
Evaluating Fairness of the Presentation of the
Description
SOC 2 requires that management provide a written assertion and that such
assertion be attached to management's description. Suitable criteria is the
standard or benchmark used to measure and present the subject matter.
Management will select the criteria used to measure the and present the subject
matter and will state those criteria in the assertion.
Below is a subset of the criteria for determining whether the description
of the service’s organization’s system is fairly presented:
• Types of services provided
• Components of the system used to provide the services (infrastructure,
software,
people, procedures, data)
• Boundaries/aspects of system
• Information on subservice organizations
• Other aspects of the service organization’s control environment
• Any changes over the period represented.
PwC 31
What Does it Cost?
The cost of delivering SOC 2 reporting varies across different
organizations. The following factors will impact the cost of reporting for
SOC 2:
• The size and complexity of your organization (number of employees,
multiple locations, etc.)
• The number of Principles selected. You can select one, several, or all
of the Principles.
• The Type of report (Type 1: design only vs. Type 2: design and
operating effectiveness)
• The period covered by your report (6-12 months)
• The number of controls. You can include all of your controls or
minimize the scope to only high level controls or certain business areas
to reduce cost and impact.
Remember this is an annual recurring report, so the upfront cost is
always higher. Expect costs to lower by 10-20% in subsequent years.
PwC
How Long Does it Take?
Type 2 Report
Planning and Scoping: 2-4 weeks
Design Assessment: 4-6 weeks (sometimes spread over 2 periods)
Reporting: 4 weeks
Total Time: 10-14 weeks
PwC
Section Six:
The Next Frontier: SOC 2+
(When SOC 2 Isn’t Enough)
PwC
Questions?
This publication has been prepared for general guidance on matters of interest only, and does
not constitute professional advice. You should not act upon the information contained in this
publication without obtaining specific professional advice. No representation or warranty
(express or implied) is given as to the accuracy or completeness of the information contained
in this publication, and, to the extent permitted by law, [PricewaterhouseCoopers LLC, its
members, employees and agents do not accept or assume any liability, responsibility or duty of
care for any consequences of you or anyone else acting, or refraining to act, in reliance on the
information contained in this publication or for any decision based on it.
© 2010 PricewaterhouseCoopers LLC All rights reserved. In this document, “PwC” refers to
[PricewaterhouseCoopers LLC which is a member firm of PricewaterhouseCoopers
International Limited, each member firm of which is a separate legal entity.