Isc-V1 2024
Isc-V1 2024
Isc-V1 2024
1
Regulations, Standards, and
Frameworks
Module
Overview
The application of information technology (IT) in an organization is the systematic
implementation of hardware and software so that data can be transmitted, modified, accessed,
and stored both securely and efficiently. As the field of information science advances, the speed
at which IT devices can perform these tasks has rapidly increased, and organizations must
reevaluate their technology on a regular basis.
Organizations adopt technology to enhance or support business operations, protect digital
records and assets, and safeguard physical assets. This makes the selection and deployment of
management information systems critical to the success of any organization.
CORE TIERS
PROFILE
These five functions define the high-level framework and are subdivided into 23 categories, and
then 108 subcategories.
Categories: Tie outcomes to specific activities and company needs.
Subcategories: Divide categories into management and technical activities that help achieve the
category outcomes.
Falcon CPAs and Associates is a large accounting and IT auditing firm that has several
clients for whom it provides bookkeeping, tax work, and IT audit services. Falcon decided
to run a scan using its new NIST-based security software for a client. The application scans
various applications and devices, generating a report with findings.
The report came back with high-risk employee behavior and the use of high-risk devices
as potential red flags. The employee behavior included access to records on the weekends
and after business hours. The use of high-risk devices included excessive use of USB
drives that were being plugged into the network to transfer data. Both were related to an
individual who was later determined to be stealing employee banking information from the
payroll department outside of normal working business hours.
Falcon's utilization of the application helped to detect high-risk areas and behaviors,
including those determined to be from an individual committing theft of banking
information. Falcon's response may include the analysis of impact, communication to those
employees impacted by the stolen information, and mitigation strategies to reduce the risk
of similar breaches. Falcon's recovery may include restoring any stolen data, improving
protections to restrict unauthorized access, and taking necessary disciplinary or legal action
against the individual committing the data theft.
A locked door on an empty house is a preventive measure: if the criminal knows no one is
home, the criminal is free to break the lock and steal from the house. If the same locked
door has a webcam pointed at it to identify the thief and simultaneously alert the police,
the presence of the camera may deter the thief from breaking into the house. The camera
is not a preventive measure; it does nothing to stop a break-in, but because the thief can
see the detective measure put in place, the camera may deter the crime.
This concept applies to the NIST Framework Core. Detection processes may be included
as part of the protection process as a way to protect information and data. Similar to the
webcam in the empty house, if detection tools are in place to identify individuals who
access information or data, such detection tools may serve as a deterrent and protect
sensitive information.
External Participation
Source: Reprinted courtesy of the National Institute of Standards and Technology, U.S.
Department of Commerce. Not copyrightable in the United States.
Implementation Tiers
Risk Management Risk Management External Participation
Process Program Integration
Tier 1 Risk management is Incident management Corporate cybersecurity
(Partial) ad hoc and reactive is ad hoc and not is isolated, and the
where prioritization integrated into organization does not
of information organizational evaluate external risks.
security efforts is not processes.
strategic or directed by
organizational priority.
Tier 2 Cybersecurity The rest of the There is awareness of
(Risk- prioritization is based on organization is aware how environmental
Informed) organizational risk, and of cybersecurity, but security risks impact
management approves not managing securely. the organization, but
cybersecurity efforts; There is awareness, but inconsistent actions
however, cybersecurity no integration. are taken to respond to
may be isolated those risks.
from organizational
processes.
Tier 3 The organization utilizes There is an The organization
(Repeatable) cybersecurity in planning organizational collaborates with, and
and has enshrined risk approach to contributes to, the
cybersecurity practices cybersecurity where security community
in formal, documented cybersecurity is at large. It also has
policies. integrated into governance structures
planning and regularly internally to manage
communicated among cyber risk (governance
senior leadership. counsels, written
agreements, etc.).
Tier 4 Organizational Managing cybersecurity The organization
(Adaptive) cybersecurity is based on is an organization-wide robustly participates in
iterative improvement affair where cyber risk external information-
based on internal and is prioritized similarly sharing activities and
external cyber incidents to other forms of frequently contributes
and is responsive to organizational risk. to the cybersecurity
evolving threats. community at large.
An example would be a Profile of a particular industry that gives an overview of the entire sector,
business objectives, goals for reducing cybersecurity threats, and a roadmap for how to reach
those goals.
Cybersecurity Privacy
Framework Framework
IDENTIFY-P/C
GOVERN-P
CONTROL-P
COMMUNICATE-P
PROTECT-P/C
DETECT-C
RESPOND-C
RECOVER-C
Framework Core
The Privacy Framework Core is contained in Appendix A of the Privacy Framework and is divided
into the following eight Framework Functions:
Function Category
Unique Function Unique Category
Identifier Identifier
ID.IM-P Inventory and Mapping
ID.BE-P Business Environment
ID-P Identify-P
ID.RA-P Risk Assessment
ID.DE-P Data Processing Ecosystem Risk Management
GV.PO-P Governance Policies, Processes, and Procedures
GV.RM-P Risk Management Strategy
GV-P Govern-P
GV.AT-P Awareness and Training
GV.MT-P Monitoring Review
CT.PO-P Data Processing Policies, Processes, and
Procedures
CT-P Control-P
CT.DM-P Data Processing Management
CT.DP-P Disassociated Processing
CM.PO-P Communication Policies, Processes, and
CM-P Communicate-P Procedures
CM.AW-P Data Processing Awareness
PR.PO-P Data Protection Policies, Processes, and
Procedures
PR.AC-P Identity Management, Authentication, and Access
PR-P Protect-P Control
PR.DS-P Data Security
PR.MA-P Maintenance
PR.PT-P Protective Technology
DE.AE Anomalies and Events
DE Detect DE.CM Security Continuous Monitoring
DE.DP Detection Processes
RS.RP Response Planning
RS.CO Communications
RS Respond RS.AN Analysis
RS.MI Mitigation
RS.IM Improvements
RC.RP Recovery Planning
RC Recover RC.IM Improvements
RC.CO Communications
Source: Reprinted courtesy of the National Institute of Standards and Technology, U.S. Department of Commerce. Not
copyrightable in the United States.
Organizational Responsibilities
When managing security and privacy risks, the following are required by the organization:
y Well-defined security and privacy requirements for systems and organizations
y The use of trustworthy information system components based on state-of-the-practice
hardware, firmware, and software development and acquisition processes
y Rigorous security and privacy planning and system development life cycle management
y The application of system security and privacy engineering principles and practices to
securely develop and integrate system components into information systems
y The employment of security and privacy practices that are properly documented
and integrated into, and supportive of, the institutional and operational processes of
organizations
y Continuous monitoring of information systems and organizations to determine the
ongoing effectiveness of controls, changes in information systems and environments of
operation, and the state of security and privacy organization-wide
NIST SP 800-53 is subdivided into 20 different control families that cover organizational risk.
Those families are listed below with the organizational questions they seek to answer.
AC–Access Control: How does the organization manage application and resource access?
AT–Awareness and Training: How should the company deliver training on information
security risk?
AU–Audit and Accountability: How does the company evaluate information security
controls?
CA–Assessment, Authorization, and Monitoring: How does the organization collect
information security telemetry and use it to hunt for threats?
CM–Configuration Management: How are assets and software configured securely?
CP–Contingency Planning: How is the company prepared for downtime and outages?
IA–Identity and Authentication: How is identification and authentication managed?
IR–Incident Response: How is the organization prepared for information security and
events?
MA–Maintenance: How does the company ensure secure maintenance of infrastructure?
MP–Media Protection: How is information on physical media managed?
PE–Physical and Environmental Protection: How are facilities secured from intrusion or
harm?
PL–Planning: How does the organization manage information security planning?
PM–Program Management: How does the organization securely manage its information
security program?
PS–Personnel Security: How are employees evaluated for potential compromise?
PT–PII Processing and Transparency: How is personally identifiable information (PII)
managed (this family is new to NIST 800-53 Rev. 5)?
RA–Risk Assessment: How is environmental risk evaluated?
SA–System and Services Acquisition: How are systems securely evaluated and acquired?
SC– System and Communications Protection: How is data securely transmitted digitally?
SI–System and Information Integrity: How is the integrity of data in company systems
maintained and evaluated?
SR–Supply Chain Risk Management: How does the company secure its supply chain (new
to NIST 800-53 Rev. 5)?
The control families are subdivided into controls and control enhancements. Controls are the
objectives to be implemented for family conformance. Control enhancements are best practices,
some of which are recommended, while others are necessary for conformance to a baseline.
Controls and control objectives are written as statements for implementation. Some of
those statements for implementation include bracketed and italicized language, which is an
organization-defined parameter. Organizations are required to enter values or compliance
statements in lieu of the placeholder.
One key difference between NIST SP 800-53 Rev. 4 and NIST SP 800-53 Rev. 5 is that the latest
revision dropped priority and baseline allocation. In prior iterations, NIST categorized the NIST
SP 800-53 standards into low, moderate, and high control baselines. Those baselines informed
the sensitivity of federal systems to which the controls applied. As those are inapplicable and
potentially confusing in the private sector, the control baselines were dropped in favor of
comprehensive conformance.
With respect to implementation models, NIST SP 800-53 outlines three control implementation
approaches that are to be implemented on a per-control basis:
1. Common (Inheritable): Implement controls at the organizational level, which are adopted
by information systems.
2. System-Specific: Implement controls at the information system level.
3. Hybrid: Implement controls at the organization level where appropriate and the remainder
at the information system level.
1 Data Privacy
© Becker Professional Education Corporation. All rights reserved. Module 2 S1–15 Privacy
2 Privacy and Data Security Standards ISC 1
Loss of Business and Revenue: Revenue is temporarily lost during downtime caused by
data breaches, and this can ultimately lead to loss of customers, which creates a more
permanent loss of revenue.
For consumers, the impact is different and more personal. A data breach can mean exposure
of personal information, such as name, home address, Social Security number, and payment or
banking information. This exposure puts consumers at risk of identity theft and monetary theft.
HIPAA requires different safeguards for covered entities or business associates, including the
following:
Administrative Safeguards: Standards include security management processes, assigned
security responsibility, workforce security, information access management, security
awareness and training, security incident procedures, contingency plans, and evaluation.
Physical Safeguards: Standards include facility access controls, workstation use,
workstation security, and device and media controls.
Technical Safeguards: Standards include access control, audit controls, data integrity
controls, person or entity authentication, and transmission security.
2.1.1 Health Information Technology for Economic and Clinical Health (HITECH) Act
of 2009
HIPAA was amended by the Health Information Technology for Economic and Clinical Health
(HITECH) Act. HITECH was enacted in 2009 to promote health information technology and the
transition from paper to electronic records. HITECH amended HIPAA in a few ways. Namely,
it increased penalties for HIPAA violations, required that patients receive the option to obtain
records in electronic form, and added "business associates" as a covered entity. The U.S.
Department of Health and Human Services defines covered entities as individuals, organizations,
and agencies who must comply with the Rules' requirements to protect the privacy and security
of health information and must provide individuals with certain rights with respect to their
health information.
The most significant change resulting from HITECH, however, is the addition of breach
notification rules. HITECH requires that covered entities provide notice of a breach to impacted
individuals within 60 days after discovery of the breach.
© Becker Professional Education Corporation. All rights reserved. Module 2 S1–17 Privacy
2 Privacy and Data Security Standards ISC 1
Storage Limitation: Data must be stored only for as long as is necessary. Storing it for
longer periods is permitted for public interest archiving, scientific or historical research, or
statistical purposes.
Integrity and Confidentiality: Data must be processed securely and protected against
unauthorized or unlawful processing, accidental loss, destruction, or damage.
The following diagram outlines a typical card payment processing network in which these 12
requirements must be applied, which affects retailers, banks, and the card payment processors
themselves. The process starts when a customer makes a purchase at a business using either
a physical or virtual debit or credit card that is processed on a third-party payment processor's
network (also referred to as a card network). The transaction is sent to the business' bank
(acquiring bank) using an electronic gateway supplied by the card network. The acquiring
bank then submits a payment request to the card network, which routes payment from the
customer's bank (issuing bank) to the acquiring bank. Note that the sequence of these steps
may vary depending on the card network and payment processor, with variation in the method
of authorization, transmission of data and its encryption, tokenization to mask sensitive data,
transaction settlement, and compliance practices.
MERCHANT BANK
(ACQUIRING BANK)
Acquiring bank
submits payment
request to 3rd party
(card) network
Adhering to each of the twelve PCI DSS requirements in the above payment processing network
involves the following:
1. Monitoring transaction traffic as it is transmitting between all entities, beginning with the
retailer and ending with the acquiring bank.
2. Enforcing strict password and security settings so that default credentials are changed after
gateway installation, and ensuring complex passwords are used.
3. Using encryption for transaction data at rest, adopting access controls to permit only
authorized use on the gateway platform, and implementing proper backup measures.
4. Encrypting data in transit when transactions are submitted to the card network across the
internet and other public networks.
5. Implementing antivirus software to protect against malware for web-based interfaces that
capture cardholder data and any other setting in which malware can be installed.
6. Using intrusion detection and prevention systems to protect against unauthorized system
access and data breaches at the retailer, issuing bank, card network, and acquiring bank.
7. Applying strict requirements to grant access to cardholder data, periodically revoking access
when applicable.
© Becker Professional Education Corporation. All rights reserved. Module 2 S1–19 Privacy
2 Privacy and Data Security Standards ISC 1
8. Requiring multiple authentication methods at every access point or component within the
system, including the merchant gateway, banks, and payment processor.
9. Creating physical barriers to server rooms, switch closets, and other equipment that either
stores cardholder data or facilitates the processing of transactions.
10. Implementing network monitoring that provides audit trails and log activity that are
reviewed for malicious activity.
11. Identifying vulnerabilities in systems and processes by performing activities such as
penetration tests and auditing processes.
12. Creating, enforcing, and regularly updating written policy for each stage of the payment
process that outlines responsibilities and procedures to protect cardholder data, as it
applies to a given entity.
1.1 Overview
The Center for Internet Security (CIS) Controls are a recommended set of actions, processes,
and best practices that can be adopted and implemented by organizations to strengthen their
cybersecurity defenses. CIS Controls were first developed in 2008 by an international consortium
and have evolved over time. The controls are currently supported by the SANS Institute, which
provides training, administers certification, and performs research. However, each iteration
of control updates involves experts across industries, entity-type (government vs. public
companies), and job roles (from operators to policy makers).
The most recent update to the CIS Controls®, Version 8, modifies the controls so that they
are no longer organized by who manages a device. Rather, the controls are now task-focused
and organized by activities. This change decreased the number of CIS controls from 20 to 18
and positions the controls to accommodate shifts in the cybersecurity ecosystem to cloud
computing, remote work, and virtualization. Within the 18 controls are 153 subcategories called
Safeguards, down from the prior version's 171 subcategories in Version 7.1. Safeguards are the
recommendations prescribed to achieve each control objective.
IG1
IG2 IG3
Source: CIS Critical Security
Controls: Version 8
IG1
Essen�al Cyber Hygiene This group is for small or medium-sized organizations that have a limited
IG1 cybersecurity defense mechanism in place in terms of personnel or IT assets.
The main focus of this group is to keep the company operational because their
cybersecurity expertise is limited, the data being used is not sensitive, and the
company cannot sustain long periods of downtime.
Support
Asset Serial Warranty
Model User End-of-Life
Description Number Expiration
Date
Laptop N4300008A ProBook 500 Avery Greene 20X5 20X5
Scanner XCH00R DesignJet T830 Martin Glenn 20X6 20X7
Having a comprehensive view of company assets will also give visibility into how data flows
throughout an organization. Knowing which devices contain sensitive information can help IT
managers prioritize the security and maintenance for those devices (e.g., knowing servers and
laptops that store employee records should be closely monitored for needed updates, cyber
threats, and other irregularities so that unauthorized access is prevented).
Companies should also focus on the potential for external devices to connect to a company's
network through means such as guest networks, even if they are segregated from the core
network. Other scenarios in which external devices connect to a company's core network
include temporary access granted to auditors and permanent access given to managed service
providers (MSPs) to manage a company's IT operations.
One challenge organizations face is portable end-user devices that periodically connect to a
company's network and then disappear, making it difficult for organizations to have a holistic
view of its inventory when devices are off, paused, or otherwise disconnected from the
corporate network. Having a robust IT inventory system will mitigate these issues.
The following is a list of the Safeguards (recommendations) within Control 01, along with the
asset type associated with the Safeguard, security function, and whether the Safeguard is a
priority for an Implementation Group:
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
After sensitivity is defined, data mapping should be developed that identifies the various
software applications that access each of these sensitivity levels. This would allow devices and
software to be consolidated into one network so that more sensitive classifications are separate
from less sensitive forms of data. Retention requirements, access control lists, access logging
mechanisms, and data disposal plans can also be implemented in a tailored fashion once data
classification levels are assigned. Encryption can be strategically used to further secure data at
rest and in transit so that data compromise is avoided.
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
Many applications are sold preconfigured with default configuration settings that were designed
for ease of installation or usage. However, default configurations may present vulnerabilities
that can be exploited, allowing unauthorized users to gain access to an organization's core
network. This means organizations should implement control activities to assess preconfigured
devices at their baseline state, modify vulnerable configuration settings, and eventually move to
a continuous review phase.
Publicly available security standards, such as the CIS Benchmarks Program or NIST National
Checklist Program Repository, can be used by organizations as a starting point for asset
reconfiguration. Adhering to these standards will also assist in complying with any applicable
laws and regulations.
Security hardening, which is the process of making an organization less vulnerable to attacks,
can be incorporated into adjusting target security configurations so that they are continuously
"hardened" against new forms of attack. These improvements may include removing any
unused or unnecessary software, closing network ports that are openly exposed to the internet,
changing default passwords, and turning off nonessential services.
Security tools such as firewalls, intrusion detection/prevention systems, data loss prevention
(DLP) systems, and mobile device management (MDM) software can also be used to secure
networks and end-user devices. Organizations with multiple types of environments or data
classification levels may have several security baselines that should be addressed. Once target
configuration levels have been implemented, they should be continuously monitored for
deviations and necessary updates.
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
8.1 E
stablish and Maintain an Audit Log
NETWORK PROTECT
Management Process
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
NOTES
The Center for Internet Security (CIS) Controls are a recommended set of actions, processes,
and best practices that can be adopted and implemented by organizations to strengthen their
cybersecurity defenses. Within the 18 controls are 153 subcategories called Safeguards, which
are the recommendations prescribed to achieve each control objective.
Family Practice Medical Inc. (FPMI) is a national chain of health care clinics that offer
primary and emergent care services to more than 50,000 patients. Through their website,
a group of organized cybercriminals was able to identify an open port through which
they gained access to FPMI's network. Once they were in, one of the attackers was able
to open the company's Windows Management Instrumentation (WMI) interface, which
is the primary means the company uses to access credentials, manage security and
antivirus software, and manage file storage. Because the team of attackers was able to
turn off security flags and remove files using WMI, they successfully extracted hundreds of
thousands of medical records and payment information without being detected.
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
IT managers must consider whether best practices and safeguards are being followed, such as
secure design standards and secure code reviews, and security testing tools are integrated into
the software development life cycle (SDLC). It is recommended to introduce application security
as early in the SDLC as possible because coding changes as development processes becomes
more complex. Processes should also be in place to inventory third-party software components,
tools, and applications. Suggested activities include determining whether software is up-to-
date, configurations settings are reviewed, and compensating controls are in place for attack
mitigation.
One common blind spot modern organizations have is the lack of visibility into Software-as-
a-Service (SaaS) platforms. These platforms can be hosted anywhere across the globe and
their software development and review processes usually do not involve their clients. As
such, companies using SaaS should inquire about such practices and consider obtaining SOC
reports to obtain assurance as to whether they operate according to the terms of service-level
agreements, especially if the platform is a steward of sensitive employee or customer data.
Some larger organizations may consider implementing a bug bounty program in which
employees are paid for finding flaws in company-produced or company-used software. These
programs create camaraderie and healthy competition and are effective ways to find software
vulnerabilities.
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
Similar to penetration testing, "Red Team" exercises focus on specific tactics, techniques, and
procedures (TTPs) to see how an organization fares against certain types of attackers. Each
industry is exposed to a different mix of cybersecurity risks, with some bearing more risk simply
due to the nature of the business. For instance, health care companies and financial institutions
possess Social Security numbers, banking information, credit cards, and other personal
information that can be used to exploit one of their customers.
First Payment Network Inc. is a credit card processing company that has developed a new
technology that couples bio-recognition with payment transactions. First Payment wishes
to see how easy it would be to either forge a fingerprint on in-person scanners used for
transactions or to bypass the processing card network's code that requires the bio-metric
for validation. To test this technology prior to launching it, First Payment engages an MSP
that specializes in Red Team exercises and specifically, financial transactions.
SECURITY
CONTROL ASSET TYPE IG1 IG2 IG3
FUNCTION
NOTES
COBIT 2019
Framework ISC 1
1 Overview
COBIT 1
1996 Standards for IT Auditors were established
COBIT 2
1998 IT control guidance was added
COBIT 3
2000 COBIT was released as a management framework
COBIT 4
2005 COBIT was released as a comprehensive IT governance
framework
COBIT 5
2012 COBIT launched as a comprehensive global framework
mapping enterprise strategy to IT strategy
COBIT 2019
2018 COBIT was updated by adding a maturity model based on the
Capability Maturity Model Integration (CMMI) and a
governance implementation guide
Material from COBIT®, © 2019 ISACA. All rights reserved. Used with permission.
Management is responsible for the daily planning and administration of company operations,
generally consisting of a chief executive officer (CEO), chief financial officer (CFO), chief
operations officer (COO), and other executive leaders. Management is selected and guided by
the board of directors.
Stakeholders can be either internal or external, with the board of directors and management
considered internal. Other internal stakeholders include business managers, IT managers,
assurance providers, and risk managers. External stakeholders include regulators, investors,
business partners, and IT vendors, parties who are entitled to some information about
compliance and risk mitigation but are not entitled to the same information given to internal
stakeholders.
COBIT 5
6 Principles for a
Governance
System Design
Tailored Enterprise
Factors
Governance System
3 Principles for a for Information
Governance Technology
Framework Focus
Area
Other Standards,
Frameworks,
Regs
Community
Contribution COBIT 2019 COBIT 2019 COBIT 2019 COBIT 2019
Framework: Framework: Design Guide Implementation
Intro & Governance & Guide
Methodology Mgmt. Objectives
Material from COBIT®, © 2019 ISACA. All rights reserved. Used with permission.
1 2 3 4 5 6
Provide Stakeholder Value: Governance systems should create value for the company's
stakeholders by balancing benefits, risks, and resources. This should be accomplished
through a well-designed governance system with an actionable strategy.
Holistic Approach: Governance systems for IT can comprise diverse components,
collectively providing a holistic model.
Dynamic Governance System: When a change in one governance system occurs, the
impact on all others should be considered so that the system continues to meet the
demands of the organization. This means having a system that is dynamic enough that it
can continue to be relevant while adjusting as new challenges arise.
Governance Distinct From Management: Management activities and governance systems
should be clearly distinguished from each other because they have different functions.
Tailored to Enterprise Needs: Governance models should be customized to each
company, using design factors to prioritize and tailor the system.
End-to-End Governance System: More than just the IT function should be considered in a
governance system. All processes in the organization involving information and technology
should be factored into an end-to-end approach.
1 3
Aligned to
Based on
Major Standards
Conceptual
Model
MANAGEMENT OBJECTIVES
Align, Plan, and Organize (APO) Monitor,
Evaluate, and
AP001- AP002- AP003- AP004- AP005- AP006- AP007- Assess (MEA)
Managed I&T Managed Managed Managed Managed Managed Managed
Mgmt. Strategy Enterprise Innovation Portfolio Budget and Human
Framework Architecture Costs Resources MEA01-Managed
Performance and
AP008- AP009- AP010- AP011- AP012- AP013- AP014- Conformance
Managed Managed Managed Managed Managed Risk Managed Managed Data Monitoring
Relationships Service Vendors Quality Security
Agreements
MEA02-Managed
Build, Acquire, and Implement (BAI) System of Internal
Control
BAI01- BAI02- BAI03- BAI04- BAI05- BAI06- BAI07-Mgd. IT
Managed Managed Managed Managed Managed Managed IT Change
Programs Requirements Solutions ID & Availability and Organizational Changes Acceptance and
Definition Build Capacity Change Transitioning
Material from COBIT®, © 2019 ISACA. All rights reserved. Used with permission.
The Alliance Corp., a high-end furniture retailer and manufacturer, is interested in aligning
its information and technology processes with its strategic objectives. The CEO consults
with the CIO, who recommends they use the COBIT 2019 framework as a benchmark to
determine where the company currently stands relative to best practices. To accomplish
this, the executive team assesses the company using each of the 40 governance and
management objectives by first determining whether there is a gap and then gauging the
importance of that objective.
Below is an excerpt of the assessment for the EDM domain:
The executive team rates four out of five EDM processes as gaps, with the only objective
not considered a gap being that stakeholders are indeed supportive and communicate
effectively regarding existing IT strategy. EDM01 is rated as a gap because there is no
consistent approach that aligns IT governance with the company's objectives. Compliance
with legal is lacking, and processes are not effectively overseen. It rates EDM02 through
EDMO4 as gaps because IT services and personnel are not cost effectively delivered
throughout the organization. There is significant overlap in processes and wasted expenses
that could be avoided, which indicates that the company is operating at a much higher risk
level than its risk appetite and tolerance threshold.
As a result, the executive team decides to overhaul the IT function by eliminating
duplicative processes, placing a budget and better purchase approval process in place,
requiring employees to use the company's help desk for all tasks that can be resolved
remotely, and repurposing IT staff working on low-value-add tasks to activities that align
with the executive team's governance objectives.
NOTES
2
Information Systems and
Data Management
Module
1 IT Infrastructure 3
4 Change Management 51
IT Infrastructure ISC 2
1 IT Infrastructure
The supporting IT architecture within most modern companies has multiple, interconnected
technological components with the core infrastructure involving a combination of on-premises
and outsourced hardware, software, and specialized personnel. Some organizations manage this
infrastructure themselves, but many are increasingly relying on third-party providers to support
their IT operations, causing the focus on quality System and Organization Controls (SOC) 2®
engagements to grow aggressively in recent years. Therefore, the topics covered throughout
this module are applicable to both an organization’s internal employees and those individuals
auditing the organization.
SOC 2® engagements are examinations in which a third party evaluates and reports on a service
organization’s system controls as it relates to the AICPA’s five Trust Services Criteria: security,
availability, processing integrity, confidentiality, and privacy. Even though SOC 2® audits can
involve any third-party company that manages or has access to sensitive data, they typically
involve companies that manage the IT function of other organizations as their primary business.
These third-party reports give users reasonable assurance that the service organization’s
controls listed in its system description are accurately depicted and effective.
SOC 2® engagements emphasize auditors to not only have an advanced understanding of
information technology terminology, but also technical expertise in the way in which key
components of the modern IT landscape function. This includes being conversant in a variety of
operating systems, network infrastructure topologies, end-user devices, and the hardware used
across all these domains.
Mesh Topology: In a mesh topology, there are numerous connections between nodes, with
all nodes being connected in a full mesh topology and only some connected in a partial
mesh topology. This form of layout is commonly used in wireless networks. While the
number of pathways allows high levels of traffic and promotes network stability if a node is
damaged, it can be costly to implement and maintain over the network’s life span.
Ring Topology: Nodes are connected in a circular path in ring topologies. When data is
transferred to a destination device, it must first go through every other device between the
source and destination. There are unidirectional ring paths that allow data transmission
to move in one direction, and there are multidirectional paths that allow two-way data
transmission. An advantage of ring topologies is that data transmission collision is
minimized or eliminated, but this can result in very slow network performance.
Star Topology: In a star topology, data passes through a central hub that acts as a switch
or server, and then transmits to peripheral devices that act as clients. There can be multiple
hubs so that if one fails, only the nodes connected to that hub will stop functioning. Even
though the hub is a single point of failure for all connected nodes, this topology structure
makes it easier to identify damaged cables.
Application 7
Presentation 6
Session 5
Transport 4
Network 3
Data Link 2
Physical 1
Data flows through each layer using a process called encapsulation, which adds a header or a
footer to the data point received from the previous layer. It starts at the Application layer with a
message, which is then passed to the Presentation layer where a header or footer is added.
The data continues the encapsulation process through each layer down to the Physical layer,
which represents the actual networking device that is being used to transmit the message. At
the Physical layer, the message is transformed into electrical impulses that are then sent to the
receiving networking device. There, the decapsulation process begins, starting with the Physical
layer until it reaches the Application layer.
As the information moves through the OSI model layers from the sending network device to the
receiving network device, the header that was added by each specific layer is interpreted by the
same layer at the receiving device.
The following explains the purpose of each layer and the different protocols that operate
within them:
Application Layer (Layer 7): This layer serves as the interface between applications that a
person uses and the network protocol needed to transmit a message. It does not represent
that actual application being used. Some of the common and most well-known protocols
used at this layer include Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Simple Mail Transfer Protocol (SMTP), and Electronic Data Interchange (EDI).
Presentation Layer (Layer 6): This layer transforms data received from the Application
layer into a format that other devices using the OSI model can interpret, such as standard
formats for videos, images, and web pages. Encryption also occurs at this layer. Common
formats used are American Standard Code for Information Interchange (ASCII), Joint
Photographic Experts Group (JPEG), and Moving Picture Experts Group (MPEG).
Session Layer (Layer 5): Layer 5 allows sessions between communicating devices to be
established and maintained. Sessions allow networking devices to have dialogue with each
other. Common protocols at this layer are Remote Procedure Call (RPC), Structured Query
Language (SQL), and Network File System (NFS).
Transport Layer (Layer 4): The Transport layer supports and controls the communication
connections between devices. This involves setting the rules for how devices are referenced,
the amount of data that can be transmitted, validating the data’s integrity, and determining
whether data has been lost. Common protocols within this layer include Transmission
Control Protocol (TCP), User Datagram Protocol (UDP), Secure Sockets Layer (SSL), and
Transport Layer Security (TLS).
Network Layer (Layer 3): The Network layer adds routing and address headers or footers
to the data, such as source and destination IP addresses, so that the message reaches the
correct devices. This layer also detects errors. Common protocols include Internet Protocol
(IP), Internet Protocol Security (IPSec), Network Address Translation (NAT), and Internet
Group Management Protocol (IGMP).
Data Link Layer (Layer 2): In the Data Link layer, data packets are formatted for
transmission. This is determined by the hardware and networking technology, which is
usually Ethernet. This layer also adds Media Access Control (MAC) addresses, which are
device identifiers that act as source and destination reference numbers to route messages
to the correct device. Some of the protocols used are Integrated Services Digital Network
(ISDN), Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and
Address Resolution Protocol (ARP).
Physical Layer (Layer 1): This layer converts the message sent from the Data Link layer into
bits so it can be transmitted to other physical devices. It also receives messages from other
physical devices and converts those back from bits to a format that can be interpreted by
the Data Link layer. Protocols used in this layer include High-Speed Serial Interface (HSSI),
Synchronous Optical Networking (SONET), V.35, and X.21.
1.3 Software
Software consists of the applications, procedures, or programs that provide instructions for a
computer to execute. Software is controlled by a user interacting with the program, which in
turn gives instructions to the physical computer’s operating system. The term software spans a
variety of categories and can refer to programs that manage multiple applications such as an
operating system, can be a standalone program, or can be local to a component of a computer
or a peripheral device such as a printer.
1.3.2 Firmware
Software that is locally embedded in hardware instructs the hardware how to operate and
is commonly known as firmware. Firmware operates like software but exists locally on the
machine directing the function of the physical components, such as the motherboard and
microprocessor. Firmware is not updated frequently, or at all, which is very different from how
often a typical software program is updated on a frequent basis.
2 Cloud Computing
Because of its benefits, cloud computing and the variations of its use are becoming pervasive in
modern society. There are three primary cloud computing models, in addition to a fully on-site
or on-premises solution:
= Managed by organization
STRATEGY DEVELOPMENT
1. Governance and Culture: The governance component sets the company’s tone and
reinforces the importance of having oversight of enterprise risk management. Culture is
related to the company’s target behaviors and values and involves understanding risk.
2. Strategy and Objective-Setting: This component is considered with enterprise risk
management and strategy during the strategic planning process. A company’s risk appetite
should be aligned with its strategy, and business objectives should be put into place to help
achieve that level of appetite through identifying risk, assessing it, and responding to it.
3. Performance: This component requires that organizations prioritize their risks based
on risk appetite so that business objectives are assessed, met, and reported to key
stakeholders.
4. Review and Revision: This component involves reviewing a company’s performance over
time and making revisions to functions when needed.
5. Information, Communication, and Reporting: This component recommends that a
continual process be in place that supports sharing both internal and external information
throughout the organization.
The set of 20 principles were designed to be practical and customizable so that organizations of
any industry, size, or type can implement them. They were also designed with the thought that
management and a company’s board of directors could use these as a standard for reasonable
expectations when managing risks associated with business objectives and strategy.
Material from Enterprise Risk Management—Integrating with Strategy and Performance Framework, © 2017
Committee of Sponsoring Organizations of the Treadway Commission (COSO). Used with permission.
PaaS
IaaS
More Risk
NOTES
1.1 Overview
Enterprise resource planning (ERP) systems are cross-functional systems that support
different business functions and facilitate integration of information across departments such
as accounting, customer management, finance, human resources, inventory management,
manufacturing, marketing, and vendor management.
An ERP solution facilitates real-time communication between systems and typically operates
under a centralized database and user interface. This interface may offer multiple modules that
function independently or as an integrated system that allows data to be shared across different
departments or divisions of an organization.
An accounting information system (AIS) is more specific in nature than an ERP and offers the
particular accounting functions an organization may need. An ERP may include AIS capabilities
while being more robust than a standalone AIS and integrated with other departments.
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–19 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
Input Output
Source
Financial
document Trial
Journal Ledger statements
(invoice, balance
reports
time card)
Store file
File original
source
document
Audit trails are also useful for service auditors in a SOC 2® engagement, particularly if the service
organization is an outsourced accounting firm providing bookkeeping, payroll, or other financial
services. In that case, the service auditor would need a way to track transaction origination to
the final output, such as a payroll check register report or financial statements.
INTERNAL EXTERNAL
Pays
employees
Manages
cash and Human Resources
working and Payroll Cycles
capital
Managers /
Employees
Revenue and
Cash Collections
Submits PO & Cycles
invoices Customers
General Ledger
and Reporting Records
Supplies Cycles sales
product transactions Remits
Records payment
transactions
Record cash,
interest,
investment
Purchasing &
activity
Disbursement
Bank
Cycles
Transacts
with bank
Remits
payment Treasury
Cycles
Vendor
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–21 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
AIS concurrently records sales invoices in the database, digitally transmits inventory release
orders to the warehouse, and digitally sends packing slips to the shipping department.
AIS has a terminal for the shipping department to digitally input shipping notices upon
shipment. The input triggers the system to update the customer's credit record, reduce
inventory subsidiary ledger records, insert the shipping date in sales invoice records, update
general ledger accounts, and distribute management reports (e.g., inventory summary, sales
summary).
AIS has a terminal for the cash receipts clerk to access the cash receipt system and record
the remittance.
AIS closes the sales invoice, posts to the general ledger accounts, updates the customer's
payment record, and distributes management reports (e.g., as transaction listings,
discrepancy reports, and general ledger change reports).
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–23 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
The key AIS functions of the fixed asset cycle include the following:
AIS has a terminal for fixed asset groups to create a record of the asset subsidiary ledger
that includes each asset's useful life, salvage value, depreciation methodology, and location.
AIS automatically updates the general ledger, prepares journal entries, and creates a
depreciation schedule.
AIS automatically calculates depreciation, accumulated depreciation, and book value at
the end of the period. The system then creates a journal entry file and updates the general
ledger accounts accordingly.
When an asset is disposed of, the clerk records the disposal, prompting the system to
calculate gains or losses of the disposal, prepare journal entries, and post adjusting entries
to the general ledger.
2.1.1 Automation
Business process automation is a general term for the automation of business processes using
computer programs designed to perform repetitive tasks. Automation allows the company to
deploy human resources to tasks better suited to human skills.
To implement automation, an organization must first examine an existing business process
to describe the steps taken, the exchange of information, the governance of policies for each
transaction, and the knowledge needed to complete each task. The goal of this analysis is to
understand the process thoroughly enough to replace it with business process automation
facilitated by IT systems.
Financial Group Inc. is a financial services company with three distinct lines of business
including accounting, tax, and consulting. Currently, each division operates as a separate
company with its own human resources, payroll, and legal departments. In order to more
effectively manage the organization and reduce costs, the new CEO implements a shared
services plan whereby all human resources, payroll, and legal department services will
be consolidated into one centralized function. The CEO thinks that this shared services
approach will eliminate redundant back-office functions and will reduce annual operating
costs by $750,000.
2.1.3 Outsourcing
Outsourcing is defined as the contracting of services to an external provider. Examples
include a payroll service or a call center that provide support or back-office services for a fee.
A contractual relationship exists between the business and its service provider. With proper
controls in place, cloud-based systems can allow external service providers to work seamlessly
with an organization.
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–25 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
Outsourcing can provide for efficiencies, but there are also risks associated with quality of service,
reduced productivity, and information security.
These risks include:
Quality Risk: An outsourced product or service might be defective. Suppliers might provide
substandard products or services.
Quality of Service: Poorly designed service agreements may impede the quality of service.
Productivity: Real productivity may be reduced even though service provider employees are
paid less.
Staff Turnover: Experienced and valued staff whose functions have been outsourced may leave
the organization.
Language Skills: Outsourced services may go offshore. Language barriers may reduce the
quality of service.
Security: Security of information with a third party might be compromised.
Qualifications of Outsourcers: Credentials of service providers may be flawed. Offshore
degrees may not include the same level of training as domestic degrees.
Labor Insecurity: Labor insecurity increases when jobs move to an external service provider or,
as a result of globalization, out of the country.
Another application of RPA is the use of lidar (light detection and ranging), which is one of the
technologies being used in self-driving vehicles. This technology is combined with advanced software
to perform nearly the same function as a human. This technology will presumably be applied to
various other human job roles as it is refined, becomes cheaper, and becomes more widely available
to businesses.
A company is interested in formulating an RPA to collect the data from various inventory
invoices, payment orders, and reconciling documents used in its logistics system (part
of the enterprise resource planning system [ERP]), because it would be more efficient to
have software collect and format this existing information than to train every employee on
using existing or new systems. Because there are a limited number of forms, the company
constructs a library of forms for reference by the RPA. Once the RPA has been trained to
recognize each form, the company directs all forms to the RPA, which scans each form,
applies the parameters set in the program, and sends the appropriate data into the ERP
application database.
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–27 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
1 Security
Identify transaction processing methods that compromise confidentiality, privacy, and
availability, and that can be circumvented to allow unauthorized access.
2 Availability
Search for bottlenecks in the flow of data across the organization and identify
other processes that prevent data from being available when needed.
Processing
3 Integrity
Survey processing methods and transactions that do not complete timely or
at all, yield faulty results, or do not meet the company’s objectives.
Evaluate employees and processes that handle transactions with confidential data
4 Confidentiality to identify potential data leakage, mishandling, or other practices that expose
confidential information.
5 Privacy
Analyze methods used to collect, store, use, and dispose of personal data that
are being processed to identify the potential for data breaches or leakage.
Another way to identify deficiencies is by using the AICPA’s Description Criteria for a Description
of a Service Organization’s System in a SOC 2® Report to compare with an organization’s system
design documentation. The set of benchmarks in this implementation guide serves as a strong
tool for evaluating system descriptions of service organizations and can specifically be used for
detecting deficiencies in the suitability or design of controls related to an information system’s
processing integrity.
Two items the guide recommends to review are the principle service commitment and the
principle system requirements, which are required to be disclosed by management to support
the understanding of the system, the services provided, and the design of the controls.
Understanding how and why management disclosed certain attributes of its system within these
descriptions, particularly related to processing integrity, will help assess the suitability of system
control design.
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–29 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
Spinal Surgery Clinic (SSC) P.A., a large group of physicians focusing on spinal surgery,
recently had an outside firm perform an IT audit as recommended by SSC's board of
directors. The findings resulted in recommendations that followed the COSO Internal
Control—Integrated Framework principles 11, 13, and 14. As such, SSC invested in new
technology that required user identities to be verified by multiple points of validation
other than just a password in order to access patient accounts (in line with principle 11).
Additionally, SSC adopted a state-of-the-art data cleansing system in an effort to acquire
and use error‑free data to enhance patient outcomes, which aligned with principle 13.
Lastly, to address principle 14, SSC began performing regular reviews of key IT functions
and started issuing monthly reports of internal control to the board of directors.
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–31 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
Likewise, blockchain has no centralized management overseeing its activity. That means no
particular entity can be held accountable or responsible if things go wrong. An organization
cannot simply engage a SOC auditor to assess controls. This decentralization is a unique
challenge with blockchain. Organizations must find alternative ways to gain assurance over
blockchain controls.
For financial reporting, blockchain’s attributes increase the visibility of transactions and the
availability of data:
Blockchain’s attributes allow management to support its financial records.
Blockchain’s attributes make audits of blockchain transactions easier because of automatic
audit trails.
Management can provide financial information to stakeholders faster and more effectively.
In the event of a SOC 2® engagement, a service auditor should consider the trust services criteria
(security, availability, processing integrity, confidentiality, and privacy) as it relates to each of the
COSO’s five control components.
For example, the engagement team should determine whether the processing integrity of
transactions processed on the blockchain’s ledger meets standards required in the COSO’s
control environment, such as principle 4’s requirement to demonstrate commitment to
competence.
However, it should be noted that due to the nature of most decentralized blockchains,
certain control components might not be met in the traditional sense, including component 2
concerning oversight responsibility or component 5 covering accountability. This is because
decentralization distributes accountability and oversight so that there is not one individual or
a small group that dictates policies and procedures for the entire blockchain. Service auditors
may need to adjust their perspective on how a control is met or restrict SOC 2® engagements to
organizations with a centralized blockchain.
The following table shows how the COSO’s five control components and 17 principles help
evaluate risks related to blockchain.
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–33 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
When implementing the COSO’s controls to a blockchain setting, organizations should consider
the following:
Focus on preventative controls due to volume and speed of transactions being processed.
Increase the frequency of detective controls, also due to the volume of transactions.
Develop controls that use other analytic technology like artificial intelligence tools, such as
large language models (LLM), which are good at quickly identifying bugs in code.
Develop a code of conduct and establish policies that comply with KYC (Know-Your-
Customer) regulations and AML (Anti-Money Laundering) policies.
Create cross-disciplinary teams with segregation of duties in mind and with clear reporting
lines that identify all users participating in the blockchain’s creation and maintenance.
© Becker Professional Education Corporation. All rights reserved. Module 2 S2–35 Enterprise and Acc
2 Enterprise and Accounting Information Systems ISC 2
NOTES
Availability, Resiliency,
and Disaster Recovery ISC 2
1 System Availability
System Availability
Strategic ability to rebound
© Becker Professional Education Corporation. All rights reserved. Module 3 S2–37 Availability, Res
3 Availability, Resiliency, and Disaster Recovery ISC 2
Moderately
Warm Site Off-site Yes/No Yes/No 0–3 days
expensive
© Becker Professional Education Corporation. All rights reserved. Module 3 S2–39 Availability, Res
3 Availability, Resiliency, and Disaster Recovery ISC 2
Health One Inc., a health insurance company serving members nationwide, reviews its
business continuity plan annually. The company’s main office is located in a region where
hurricanes threaten business operations each year. Although most of the company’s
employees work remotely, many lose internet access during natural disasters, making them
unable to work from their homes.
As part of Health One’s business continuity plan, the company relocates a core team of
employees to a safe, operational facility. The facility is secure and has internet access and
telephone services. Additionally, the company moved all critical applications and systems
to the cloud several years ago as part of its business continuity plan. By using the cloud, the
company can determine whether, in the event of a disaster, the relocated core team can
resume necessary business operations on behalf of the company.
© Becker Professional Education Corporation. All rights reserved. Module 3 S2–41 Availability, Res
3 Availability, Resiliency, and Disaster Recovery ISC 2
Pass Key
© Becker Professional Education Corporation. All rights reserved. Module 3 S2–43 Availability, Res
3 Availability, Resiliency, and Disaster Recovery ISC 2
1.2.1 Mirroring
Data backups, for example, help avoid complete data loss. Mirroring, a process that applies to
data storage and backup, entails copying a database onto a different machine for the purpose of
data redundancy in the event the primary database fails.
1.2.2 Replication
Replication involves copying and transferring data between different databases located in
different sites, such as a geographically different data center or the cloud. Replication allows
operations to resume quickly using data in the secondary site after a system failure.
© Becker Professional Education Corporation. All rights reserved. Module 3 S2–45 Availability, Res
3 Availability, Resiliency, and Disaster Recovery ISC 2
System availability controls include activities to prevent system disruptions and loss of
information as well as procedures to continue operations or provide quick recovery from
an incident. Crisis management, disaster recovery, and business continuity plans are all
components of system availability controls. In addition to these plans, system availability
controls include the following.
2.4 Redundancy
Organizations may choose to have redundant hardware, software, and storage as a normal part
of their operations. This allows them to easily switch from a failed unit, such as a malfunctioning
router or switch, to another unit already in operation. Having redundant IT assets can also apply
to data storage and backup. Redundant arrays of independent drives (RAID) allow organizations
to record data on multiple disk drives at one time for the purpose of data redundancy in the
event one disk drive fails.
© Becker Professional Education Corporation. All rights reserved. Module 3 S2–47 Availability, Res
3 Availability, Resiliency, and Disaster Recovery ISC 2
INCREMENTAL BACKUP
First Full Backup First Incremental Second Incremental Third Incremental Second Full Backup
Backup Backup Backup
DIFFERENTIAL BACKUP
First Full Backup First Differential Second Differential Third Differential Second Full Backup
Backup Backup Backup
FULL BACKUP
First Full Backup Second Full Backup Third Full Backup Fourth Full Backup Fifth Full Backup
The IT director at a university manages the organization’s system backups to help avoid
complete data loss. The university has a significant amount of data requiring backup, so
the IT director, with management approval, decided to implement full backups twice a
month. These backups take several hours to complete. On a daily basis, the IT department
performs incremental backups. In the event of a system failure, the university will have
access to all data through both its full backup files and incremental files.
© Becker Professional Education Corporation. All rights reserved. Module 3 S2–49 Availability, Res
3 Availability, Resiliency, and Disaster Recovery ISC 2
NOTES
A key component of change management is to identify the potential risks that could occur
as a result of the change. These risks are present in all steps of change from acquisition to
implementation and can affect existing systems, processes, and employees. When assessing
change management risks in a SOC 2® engagement, service auditors should refer to the AICPA’s
trust services criterion CC8.1. This criterion recommends service organizations have policies and
practices in place that properly authorize, design, develop or purchase, configure, document,
test, approve, and implement changes to the company’s infrastructure, data, and applications to
meet corporate objectives.
Separation of Duties: Properly separating job roles will help protect assets or information
from being utilized improperly. This would include, for example, distinguishing team
members who develop and design specific components from employees responsible for
placing those components into production.
Conversion Controls: When migrating from an existing system or process to the new ones,
conversion controls help minimize data conversion errors related to the impacted IT assets
and resources.
Reversion Access: Some changes may cause unexpected complications; therefore, it is
important to have the ability to revert to the prior system or process that existed before
the change.
This can be accomplished through parallel implementation in which the organization
maintains two environments at the initial onset of the change, one with the change
implemented (development environment) and one without the change implemented
(production environment).
Pre-implementation Testing: Before moving the change into production, testing will help
determine if the change is functioning properly and there are no irregularities.
Post-implementation Testing: After the change is moved into production, reconciling
transactions processed in the new environment against the same transactions that were
processed in the previous environment will validate whether the change was implemented
properly.
Ongoing Monitoring: Continuous periodic reviews after implementation will promote long-
term success. This may commence at shorter intervals (weekly) but can move to greater
intervals (monthly/quarterly/annually) as the change proves successful over time.
3.3.2 Logging
Analyzing logs is also a critical part of testing and implementing change control policies. Logging
is the process of recording events into logs or databases so that an organization can track
activities that occur on a system. By capturing communications and changes, companies can
determine whether change control policies are being followed and investigate known violations
of policy. Frequently used log types include the following:
Application Logs: These logs record application data such as when an employee accesses
or views a table or executes a certain function, or when an error occurs that causes the
program to stop functioning.
Change Logs: This type of log tracks changes that were requested, approved, and
implemented and may be a part of a disaster recovery program. Having a snapshot of these
changes will allow IT administrators to restore a system back to a given point in time prior to
a change.
Event Logs: This broad category of logs records various events that occur on a system
including directory logs, DNS (domain name system) server logs, endpoint logs, security
event logs, and basic system logs.
y Directory logs provide data on events involving Active Directory (AD), which is related
to authenticating users, governing privileges for users and groups, and the devices that
access AD.
y DNS server logs contain information on source and destination IP addresses, query and
response details, time stamps, and errors.
y Endpoint logs record events at the device level such as what devices connect to a
laptop, the files or programs installed on that device, and the networks to which it
connects.
y Security event logs track access to system resources such as shared folders, printers,
and files.
y System logs record events like when a system is started, rebooted, or updated.
Firewall Logs: These logs record all traffic that flows through a firewall such as packet
information containing ports used, IP addresses, protocol used, action taken by the firewall,
the reason for the action, and the time and date the packet was transmitted.
Network Logs: Also referred to as perimeter logs, these provide intelligence from devices
that guard a network’s perimeter such as virtual private networks, firewalls, and intrusion
detection systems. By monitoring this activity, organizations can detect attacks, identify
misconfigured devices, and find other potentially threatening behavior.
Proxy Logs: Proxy servers can control internet access and enhance performance for users.
The logs for proxy servers show details such as which sites a user visits, the time, and how
long the user viewed certain pages.
The following proxy log shows that a user, John Doe, visited cnn.com at 4:35 p.m. on
October 11, 2026, and stayed on that page for approximately two minutes before visiting
the business news section. John’s IP address is also given, as is shown below.
10/11/2026 4:35:55 PM User-JDoe 192.178.10.10 GET https://cnn.com/
10/11/2026 4:37:32 PM User-JDoe 192.178.10.10 GET https://www.cnn.com/business
Confirm that all necessary authorizations were obtained throughout the project.
Review the change requests made and determine whether the requests were made using a
company’s standardized form.
Request evidence showing which employees or teams performed which duties during the
project to determine whether there was proper separation of duties.
Execute testing of change controls and evaluate the results of those tests.
Perform monitoring activities to review results of all testing performed throughout the
project and post-implementation and confirm that all necessary changes or updates were
made.
3.3.4 Monitoring
Monitoring in the context of testing and implementing change control policies provides
accountability, the ability to troubleshoot, and tools for identifying and solving problems.
Regarding accountability, employees are held responsible for their actions through
authenticating a unique user ID, audit trails, and other methods of surveillance. These are
monitored and reviewed for any violation of policy or breach, with unacceptable occurrences
resulting in disciplinary action or termination.
Monitoring techniques, such as reviewing audit trails and performing log analyses, help
administrators evaluate system events so they can identify, diagnose, and troubleshoot
problems. Log analysis is a form of monitoring that involves analyzing logs to search for
anomalies, patterns, trends, or unauthorized behavior. One difficulty in performing log analysis
is that the volume of data an analyst must sort through is immense. This makes automated tools
critical for this type of analysis.
Two of the most common IT change management methodologies are the waterfall model and
the Agile model. While both of these models have historically been used to manage software
development and other technical IT projects, their principles are flexible enough to be applied
more generally to modern change management practices across different organizational
functions. This means the waterfall and Agile methodologies can be implemented in disciplines
such as finance or logistics to optimize managing change. Since the primary difference between
the models is flexibility, some cross-disciplinary change management projects may gravitate
toward one or the other.
2 Ana
teams of employees performing separate tasks
Plan
1
in sequence, with each team beginning work
from the pre-written authoritative agreement of
the preceding team and then ending work when
7 Maintain
ly
the business requirements for the team have
ze
been met. The project then passes to the next
3
team. Examples of challenges associated with the
waterfall model include:
Design
Waterfall Model
It requires a great deal of time to complete.
ploy
4D
6
There is no customer input and change can be ev
difficult to manage. 5 elo
p
Test
Some employees may be idle before beginning
or after completing their step in the process.
Dev
elo
pm
e
ng nce
pt and
design Im
plem
nt
Co en
ni
tat
ing ion
an
ul
ed T
Pl
es
Sc
tin
g
on
ati
Do
ritiz
cum
Prio
entat
B acklo g
nts
reme
qui
ion
Agile Software
Estimation
Re Development Cycle
atio n
n str
mo
Bu
Rec
De
gf
ixi
w
ord
al
ng
ov
vie
pr
ap
or
an
re
Ad
jus ck
d ba
nc tm en Fee
d
er
ts
or om Re
i
po st le a
rat
e ch Cu se
anges
5 Patch Management
Organizations have various options when converting their computer systems, such as software,
hardware, and data, from one information system to another. The choice will vary for each
company depending on its own unique needs, with smaller companies more likely to select a
more aggressive approach such as the direct changeover method, and larger companies more
likely to take a more cautious path, choosing a parallel or phased approach.
CONVERSION
METHOD TIME
NEW SYSTEM
PARALLEL
OLD SYSTEM
(Gradual)
PHASED
(Modular)
OLD SYSTEM
PILOT PILOT
NEW SYSTEM
Every system within an organization should be subject to ongoing change management testing
to determine whether newly installed systems and updates to existing systems do not lead to
functional issues or security vulnerabilities. This testing should be subject to review and have
mechanisms in place to reverse change, should it be necessary.
A large electronic health care billing software provider, Lasso Co., develops, sells, and
supports applications that allow health care companies to bill insurance payors directly
using electronic data interchange (EDI). Health care companies perform services, document
those services in the electronic health record (EHR) system, and then submit those claims
for reimbursement.
Lasso has a separate development environment of its software with a replica of customer
data for its largest clients. This allows Lasso to troubleshoot issues with data that
mirrors its clients’ data so that solutions are quick and client specific. After hiring a new
developer, Lasso temporarily turns off the control that prevents test data from actually
being submitted to insurance companies for payment. As a result, actual claims that were
already sent by the client were unintentionally resubmitted for payment by the new Lasso
developer using the mirrored test claims. Many claims were paid twice, which required the
client to spend hours identifying duplicate claims and it triggered an audit by several of its
payors. Most importantly, this change was not caught by Lasso. Rather, it was identified by
the client after an extended period of time.
If a CAB was established, controls would have been in place so that this would not have
been possible, or at the least a CAB would have alerted Lasso managers of the change. A
CAB would have also alerted users of the change immediately so that productivity could be
saved and then efforts could begin to restore the organization to a pre-event state.
7.4 Rollback
Upon discovery of unwanted changes, an organization’s CAB or IT team should notify users prior
to reversing or rolling back those changes to prevent loss of productivity. Rollbacks require a
complete inventory of system configurations for applications and operating systems so that
systems can be restored to a state that existed prior to the change.
There should also be post-implementation reviews to determine whether a change or rollback
was correctly installed or uninstalled. Depending on the extent of the implementation, this can
either be done through testing each change on all devices or applications, or through validation
sampling in which only a small subset is tested.
Integration Testing: Also referred to as thread testing or string testing, this assessment is
usually performed after unit testing to enhance the likelihood that different components or
modules within an application will work cohesively once all units are integrated. Integration
testing also helps plan for future system maintenance and updates, allowing managers
the opportunity to identify weaknesses or security vulnerabilities that may require future
patching.
System Testing: This verifies that all combined modules of a completed application work
as designed in totality. System testing focuses on the overall functionality of the program
and may be evaluated by a quality assurance team to discover any material defects prior to
releasing the final product.
Acceptance Testing: In this quality assurance phase, developers assess an application to
determine whether it meets end-user requirements. Acceptance testing may involve beta
testing in which a sample of the target customers tries the application, or it could involve
end-user testing in which employees test the unfinished product.
5
MODULE
Data is an essential element for decision making, auditing, and analysis. Data is constantly being
created through transactional systems, artificial intelligence, the Internet of Things, and even
manually. It is critical for companies to understand what data they have access to and how to
use it responsibly to make business decisions. The data life cycle aids in that process.
The data life cycle describes the sequential steps all business data must go through from
creation, through its use, storage, and final disposal. This process can be summarized in
eight steps:
1. Definition
2. Capture
3. Preparation
4. Synthesis
5. Analytics and usage
6. Publication
7. Archival
8. Purging
Analytics
Definition Capture Preparation Synthesis Publication Archival Purging
and Usage
1.1 Definition
The first step in the data life cycle is defining what data a business needs and where to capture
or retrieve such data. Determining what data a business needs and where such data would be
retrieved from helps enhance the likelihood that selected data is relevant to the goals of data
collection for the business.
1.2 Capture/Creation
Following the definition stage of the data life cycle, the next step is to obtain the data, either by
creating data internally or capturing data from where it has been created externally.
Internal data is a type of digital asset created by the company manually (e.g., keying
in a sales order), automatically (e.g., system logs, electronic data interchange, etc.), or
semiautomatically (e.g., an employee-reviewed sales order record created through optical
character recognition of a customer’s purchase-order PDF, etc.).
When data is obtained from an external source, there is added complexity such as integrity,
safety, and copyrights. Companies may need to sign contracts regarding usage and privacy
to obtain external data, and/or there may be a cost associated with obtaining external data.
1.3 Preparation
Once the data has been obtained, there are two steps in the life cycle that must be completed
before the data is ready for analysis or use: preparation and synthesis. The purpose of the
preparation step is to determine whether the data is complete, clean, current, encrypted, and
user-friendly.
Enhancing Completeness and Integrity of Data: Any time data is moved from one
location to another (whether that’s from an internal database to a different internal
database or obtaining external data), it is possible that some of the required data could
have been lost during the capture process.
y It is critical to determine whether the data is complete and that the integrity of the data
remains (that none of the data have been manipulated, tampered with, or duplicated
during the extraction).
y The following four steps should be completed to validate captured data:
1. Compare the number of records that you intended to capture to the number of
records in the source database to check for potential missing rows of data.
2. Compare descriptive statistics for numeric fields if you are privy to checksums from
the original data source. Comparing those statistics helps to check for potential
missing data or incorrectly formatted fields.
3. Validate that field formats (e.g., string/text, date, time, double/numbers) are
consistent with the source to ensure that the formatting transferred appropriately.
4. Compare character limits for the attributes in the source file to the new file to
ensure data was not lost due to mismatched character limits.
Data Integration: When data is sourced externally (e.g., foreign exchange rates), it is critical
to design the data architecture to ensure that the data pipeline is integrated with the target
location/database and ensure any ongoing updates of the external source are timely and
accurately loaded in the target location/database.
Cleaning Data: After validating the completeness and integrity of captured data, the data
need to be assessed for quality in preparation for analysis. The following five steps should
be completed to clean captured data:
1. Remove unnecessary headings or subtotals that would otherwise obstruct data
synthesis or analysis.
2. Clean leading zeroes and nonprintable characters to ensure consistency across data
values.
3. Format negative numbers to ensure consistency across numerical values.
4. Identify and correct inconsistencies across data in general. These inconsistencies will
need to be replaced with a common value before analysis if the analysis will require
grouping data based on that attribute.
— For example, if there is a state field, California could be formatted as “CA,” “Cal,” “Ca.,”
and so on.
5. Address inconsistent data types (e.g., datetime, doubles, string, integer, etc.).
Data Encryption: The sensitivity of data and the consideration of integrity would generally
require encryptions both in data transit and data storage.
1.4 Synthesis
The synthesis step is a bridge between preparation and usage—once you have determined how
you intend to use the captured data, you can create calculated fields to prepare that data for
quicker usage and analysis. While synthesis is not always a necessary stage, if there is data that
can be synthesized, this is the step in which such field creation would occur.
An example of data that can be synthesized would include the creation of a calculation for net
sales based on existing gross sales and sales returns, allowances, and discounts fields.
1.6 Publication
After data is prepared for internal use, the data may also be shared with external users.
Examples of sharing data externally are sending monthly statements to clients, publishing
financial statements, and sending quotes to customers. When data is shared externally, the data
is considered published and the internal company no longer has sole control of how that data
will be used, further shared, archived, or purged. For those reasons, it is critical for companies to
take care regarding what data they share with external users.
1.7 Archival
Following the decline in need of specific data sets (e.g., financial data past the relevant analytical
period set by the company or data sets not accessed/utilized for an extended period of time),
data sets are moved from active systems to passive systems for archiving to free up storage
resources for the active systems, enhance active system performance, and reduce security risks.
Optimally, archived data will be tested for accuracy and completeness prior to removal from
active systems.
1.8 Purging
The end of the data life cycle occurs when the data is completely removed (purged) from the
company’s storage systems (archived and otherwise). It is critical to ensure that the data has
truly reached the end of its use and there is no requirement (legal or otherwise) to maintain the
archived data, and once it is time to purge the data, it is critical to ensure the data is completely
purged.
Creating or capturing data is the first step in the data life cycle, and data can be collected
through a variety of methods. Three such methods are:
Extract, transform, and load (ETL)
Active data collection
Passive data collection
Data storage is a type of technology specifically designed for retention of information and help
with accessibility for authorized users to perform business activities effectively and efficiently.
Common types of data storage include the following:
Operational Data Store (ODS): An ODS is a repository of transactional data from multiple
sources and is often an interim area between a data source and data warehouses.
y Captured transactional data could be related to operational activities such as customer
orders, sales, or vendor payments. It could also be system-related, measuring available
storage, system latency, or the number of records processed by a given system.
y ODS data sets are smaller and are frequently overwritten as transactions are modified,
processed, and reported.
Data Warehouse: Data warehouses are very large data repositories that are centralized
and used for reporting and analysis rather than for transactional purposes.
y A data warehouse pulls data either directly from enterprise systems with transactional
data or from an ODS.
y This data is then combined into a single repository that can be used for reporting, to
create data marts, or for a variety of other purposes.
Data Mart: A data mart is much like a data warehouse but is more focused on a specific
purpose such as marketing or logistics and is often a subset of a data warehouse.
y Different departments within a company may need tailored data marts to operate more
effectively, so they select highly relevant data points from a data warehouse to create
their own data mart.
Data Lake: A data lake is a repository similar to a data warehouse, but it contains both
structured and unstructured data, with data mostly being in its natural or raw format.
y A data lake is different from data warehouses because it does not have a predefined
data structure or schema. Alternatively, the data stored in the data lake is not indexed
or prepped and can be access by a user in its original form.
y This contrasts with a data warehouse, which has a predefined schema that is in place to
enable quick processing and analysis.
© Becker Professional Education Corporation. All rights reserved. Module 6 S2–71 Data
6 Data Storage and Database Design ISC 2
Data Lake
End Users
Data Source
1000110001010100000101010100000111000111000010
10001100010101000001010101000001110001110000
10001100010101000001010101000001110001110000 Marketing Data Mart
10001100010101000001010101000001110001110000
10001100010101000001010101000001110001110000
2.1.1 Tables
The existence of more than one table in a relational database is the first differentiator between
flat files and relational databases; relational databases are made up of at least two tables that
are related. Tables are organizational structures that establish columns and rows to store
specific types of data records. Tables in relational databases are also referred to as entities,
particularly while the database is being designed.
Each table represents an object in the database; for instance, a database that contains data
relevant to a sales process would contain a table dedicated to the customers, the employees,
the sales orders, and the inventory. The customers table would store the data relevant to each
customer in the company's customer list, along with their descriptive information such as their
names, addresses, and phone numbers.
2.1.2 Attributes
Columns in relational database tables are also referred to as attributes. Attributes describe the
characteristics or properties desired to be known about each entity. For example, an attribute
(column) in the customers table may be "Last Name."
Attributes in a table must be unique to that table and relevant to the purpose of the table. There
are three types of columns: primary keys, foreign keys, and descriptive attributes.
© Becker Professional Education Corporation. All rights reserved. Module 6 S2–73 Data
6 Data Storage and Database Design ISC 2
2.1.3 Records
Rows in relational database tables are also referred to as records. Each record contains
information about one entity within the table. For example, a record in the customers table
would provide certain information about a single customer.
2.1.4 Fields
A field is space created at the intersection of a column and row in a table in which data is
entered. The information placed inside the field is a "data value."
Customers
Sales Orders
Customer ID
Sales Order ID
Customer First Name
Sales Order Date
Customer Last Name
Customer ID
Customer Street Address
Employee ID
Customer State
SKU
Customer ZIP
Products Quantity_Sold
Customer Phone
SKU
Product Description Customer DOB
Sales Price
Cost
Employees
Employee ID
Department ID
Employee First Name
Department
Department ID Employee Last Name
Employee State
Employee ZIP
= PK
Employee Phone
= FK Employee DOB
© Becker Professional Education Corporation. All rights reserved. Module 6 S2–75 Data
6 Data Storage and Database Design ISC 2
2.3.1 Normalization
First Normal Form (1NF): The first step to normalizing data is to determine whether the
data conforms to the first normal form, which will make sorting and filtering data easier.
First normal form has two criteria:
1. Each cell (field) in a table must contain only one piece of information. In other words,
only one value may be in a column.
2. Each record in every table must be uniquely identified. This can be accomplished with
a primary key (PK), which can be either single-valued or multivalued. Recall that a
multivalued primary key is a composite primary key.
Second Normal Form (2NF): Once a table is in 1NF, the next normalization step is to
conform the data to 2NF, which requires all non-key attributes in a table to depend on the
entire primary key. 2NF is particularly meaningful for tables that have composite primary
keys. If a table has a composite primary key, every non-key attribute needs to describe each
component of the PK, not just one piece of it.
y For example: in a Sales_Order_Detail table that has a composite primary key of SO_ID
and Inventory_ID, every additional (non-key) attribute must depend on both the sales
order and the inventory item.
y An attribute such as Quantity_Ordered would pass the 2NF test. However, an attribute
such as Inventory_Name would not pass the 2NF test, because Inventory_Name only
describes Inventory_ID—it is unnecessary to understand anything about the SO_ID to
gather what the Inventory_Name is based on Inventory_ID.
Third Normal Form (3NF): Finally, once a table is in both 1NF and 2NF, the next
normalization step is to ascertain that each column in a table describes only the PK. This is
subtly different from 2NF, which requires every attribute to depend on the entire PK. In this
instance, 3NF wants to establish that none of the non-key attributes depend on other non-
key attributes (also known as transitive attributes).
y For example: a SalesOrder table that has a primary key of SO_ID and a foreign key
of EmployeeID is permissible—the EmployeeID fields indicate which employee was
responsible for each sale.
y If the Sales Order table also had an attribute labeled EmployeeName, that would violate
3NF, because EmployeeName depends on the foreign key of EmployeeID, but not on
the primary key of SO_ID.
y Attributes that violate 3NF are referred to as transitively dependent columns, which
means that the attribute depends on not just the PK but on another non-key attribute,
as well.
A common way to describe normalization is to take the quote from A Few Good Men, "the
truth, the whole truth, and nothing but the truth," and adjust it to describe tables in a relational
database and the attributes within a given table—"the key, the whole key, and nothing but
the key."
The first part of that phrase—"the key"—refers to having a primary key in the first place,
which is established by 1NF.
The second part of the phrase, "the whole key" refers to the necessity of every attribute
relying on the entire composite primary key (2NF).
The third part of the phrase, "nothing but the key," refers to the necessity for every attribute
to rely only on the primary key, not any other non-key (transitive) attributes.
Pass Key
Remember, the forms are progressive, meaning that to qualify for 3NF, a table must first
satisfy the rules for 2NF, and the 2NF form must adhere to those for 1NF.
Relational databases must be designed with normalization in mind, and databases are supported
by data models and database schemas. Data models are conceptual representations of the data
structures in an information system and are not restricted to relational databases only.
A database schema is a set of instructions to tell the database engine how to organize data to be
in compliance with the data models. It defines the actual structure of the database, including the
tables, columns, and relationships between the data entities. A database schema specifies how
the data will be stored and ultimately accessed in the database.
While a data model and a database schema may be related, they are not the same thing. A data
model is a high-level design of the data structures in an information system, while a database
schema is the actual implementation and execution of that design in a specific relational
database.
© Becker Professional Education Corporation. All rights reserved. Module 6 S2–77 Data
6 Data Storage and Database Design ISC 2
3.1.1 Conceptual
A conceptual data model is a high-level, big-picture representation of the data structures in an
information system. It defines the main entities and relationships of the data, without going into
the details of the attributes or the physical implementation of the database. A conceptual data
model is used to understand the overall structure and meaning of the data in an information
system, and it is useful for communicating the design of a data model to stakeholders.
It is possible for conceptual data models to have additional detail, up to and including attribute
values, but conceptual data models are typically kept to a minimal level of detail. The simplest
version of what a conceptual data model could be is showcased in the below graph. This model
contains five entities. The sales orders entity is related to four tables—customers, employees,
and products—and the products table has one additional relationship to the department entity.
This model provides a high-level overview of how five entities may be stored in a relational
database to support a sales process.
A conceptual data model is an excellent place for discussion to begin with stakeholders and
potential system users to determine that what needs to be stored in the system has been
captured without providing overwhelming or unnecessary details.
Conceptual models are relatively easy to create without requiring advanced software—
or any software at all, for that matter. Simple paper and pencil can be used to create
conceptual models, which can then be easily modified.
Once the conceptual model has been approved, additional details can be added in through
the logical and physical models.
Customers
Sales Orders
Products Employees
Department
3.1.2 Logical
A logical data model is a more detailed representation of the data structures in an information
system at the level of the data itself, thus providing more detail than a conceptual data model.
It defines not only the entities and relationships for the data that will ultimately be built into an
information system, but also the attributes of each entity. Logical data models are useful for
data-oriented projects, such as designing a data warehouse or system development.
If the initial conceptual data model is more detailed to include attributes (as mentioned above),
then the two key differences between the logical and the conceptual models will include:
the logical model will identify the primary and foreign keys in each entity; and
the logical model adjusts any entity-relationship issues related to first normal form or
second normal form.
In this model, the difference is showcased between the conceptual model of entities and
relationships and the logical model adjustment to include attributes, including primary key and
foreign key designations (similar to the database keys model). In the graph below, the same five
entities and relationships from the conceptual model are showcased. However, each entity has
not only attributes but also a primary key designated in the logical model.
The relationships between the entities also exhibit more details to show the connection between
related foreign keys and primary keys. This provides more detail about how normalization
works—for example, in the sales orders table, the product description is not included (even
though it may be meaningful in data analysis to know the names of the products that have sold
the most or least, etc.).
It is not necessary to list the descriptive attribute of product description in the sales orders table
based on the relationship between Products.SKU Sales_Orders.SKU. A user of the system
could look up the corresponding SKU from the sales orders table in the products table to identify
the descriptive attribute of product description (also, the sales price, cost, and department ID).
While a logical data model provides additional information as compared to a conceptual data
model, it is still not detailed enough to inform how to build a complete, normalized database.
3.1.3 Physical
A physical data model is the most detailed representation of data structures compared to
conceptual or logical data models. Physical data models specify how the data will be stored in
the database. In a physical data model, entities can be referred to as tables and attributes can
be referred to as columns because this model should be complete enough that the database can
be built based on the description in this model.
In addition to including entities (tables), relationships, and attributes (columns—including
primary and foreign key identification), the details often included in a data dictionary for each
attribute can be included in this data model—most specifically the data type of each attribute.
The character limit (if applicable) can be included, as well as if the field is required and any
default values for fields.
The increased level of detail provided in physical data models makes these models useful as a
guide for database implementation and system performance improvements once the database
is implemented.
The relationships and five entities from the conceptual and logical data models are exhibited
in this model, along with the attributes and the primary and foreign key designations where
applicable, but in this physical model the data type can also be seen. The character limit can be
seen in this physical model in places where it is meaningful.
© Becker Professional Education Corporation. All rights reserved. Module 6 S2–79 Data
6 Data Storage and Database Design ISC 2
There are many data types, but the data types represented in the model below are detailed in
the following table:
Customers
Sales Orders
Customer ID int
Sales Order ID int
Customer First Name text
Sales Order Date Date/time
Customer Last Name text
Customer ID int
Customer Street Address text
Employee ID int
Customer State char(2)
SKU Int
Customer ZIP char(5)
Products Quantity_Sold int
int Customer Phone char(7)
SKU
Product Description text Customer DOB char(8)
The following table provides a summary of how conceptual, logical, and physical models differ.
It is worth noting how each data model builds on the previous model—so an effective logical
model that lacks any characteristics of the conceptual model will not be seen, and an effective
physical model that lacks any characteristics of the logical model will also not be seen.
© Becker Professional Education Corporation. All rights reserved. Module 6 S2–81 Data
6 Data Storage and Database Design ISC 2
Structured query language (SQL) is a computer language to interact with data (tables, records,
and attributes) in a relational database. Through SQL statements, records and entire tables
can be created, updated, deleted, and viewed (and ultimately extracted). For data analytics, the
focus should be on viewing and extracting data that match the criteria of our analysis goals. SQL
statements used to view and extract data are called SQL queries, which can be thought of as asking
the database a question and receiving an answer based on the criteria placed in the SQL query.
Using SQL, data can be retrieved from one or more tables and organized in a way that is
more intuitive and useful for data analysis and reporting than the way the data are stored in a
relational database. It is critical to understand the data the user has access to in a database—the
tables, how they are related, and their respective primary and foreign keys—in order to write SQL
queries. This is why understanding data dictionaries and data models is integral to data analysis.
SQL queries are written to indicate which subset of data is intended for extraction—including the
intention to filter results based on any criteria (such as filtering by a particular date, customer, or
location) or aggregate existing data (such as sum total sales or sum quantity sold). SQL queries
are made up of SQL commands and database elements, which make up SQL clauses.
SQL Commands: SQL commands are language-specific words, such as SELECT, FROM, JOIN,
GROUP BY, HAVING, WHERE, and ORDER BY. Case does not matter for SQL commands;
however, uppercase is commonly used for SQL commands to differentiate them from
database elements.
Database Elements: Database elements are references to table names, attribute names, or
criteria. Database elements must be spelled exactly the same as the table names or record
names in the database, however case does not matter. It is common to use proper case for
database elements to improve readability and to differentiate the database elements from
the SQL commands.
Customers
Customer ID int
Sales Orders Customer First Name text
Sales Order ID int
Customer Last Name text
Sales Order Date Date/time
Customer Street Address text
Customer ID int
Customer State char(2)
Employee ID int
Customer ZIP char(5)
SKU Int
Customer Phone char(7)
Quantity_Sold int
Customer DOB char(8)
= PK
= FK
By reviewing an excerpt of the above database schema, the Sales Orders and Customers
tables are related by the common keys of Customer ID. In order to retrieve data from more
than one table, use SQL JOINs. The two most common join types are INNER JOINs and
LEFT JOINs.
The template for using an INNER JOIN is:
FROM table1
INNER JOIN table2
ON table1.matching_key = table2.matching_key
y In an INNER JOIN, the order of the tables does not matter; the user could place the
Customers table in either the FROM or the INNER JOIN clause, and the order of the
tables does not matter in the ON clause. What matters is that both tables are indicated
when intending to retrieve data, and that the two different tables are indicated with
their matching keys in the ON clause.
y To select all of the matching data from the Customers table and the Sales_Orders table,
the following query can be run:
SELECT *
FROM Customers
INNER JOIN Sales_Orders
ON Customers.CustomerID = Sales_Orders.CustomerID
y INNER JOINs not only work to retrieve data from two tables but, more specifically, an
INNER JOIN will retrieve only the data for which there is a match in both tables. That is, if
there is a Sales_Order recorded without CustomerID information, the INNER JOIN query
would not return that sales order—it would only return sales orders that have verified
customers recorded. The same goes for the other table in an INNER JOIN; if there are
any customers in the Customers table that have not yet participated on a Sales Order,
the INNER JOIN query would not provide any data on those customers. It will only
provide data on customers who have a CustomerID listed in the Sales Order table.
Unlike INNER JOINs, a LEFT JOIN will provide data for which there is not a match. If it is
important to see all of the data from the Customers table, even if there isn't a match in the
Sales_Orders table, then instead of running an INNER JOIN, replace the word INNER with the
word LEFT. The template for a LEFT JOIN is:
FROM table1
LEFT JOIN table2
ON table1.matching_key = table2.matching_key
y In a LEFT JOIN, the order of tables listed in the FROM and LEFT JOIN clauses does matter.
The table listed in the FROM clause is the "left" table; data that does not have a match
will be returned from this table.
2 Data Integration
Data stored in relational databases are stored across many different tables, but often reports
and decisions need to be made based on data stored across several different tables; and
sometimes reports and decisions require data not just across different tables in the same
database but even from different data sources altogether.
Most popular data analysis and data visualization tools such as Excel, Microsoft Power BI,
Tableau Desktop, and Alteryx have built-in integrations with an abundance of common
applications, data warehouse tools, and databases. When retrieving data from a large data
source such as a database or data warehouse, it can be useful to couple SQL with the built-in
integrations in order to limit the data required to only the data that is necessary.
Organizations are made up of many complex processes, and those complex processes are
supported by an abundance of data. Visualizing the steps of processes across roles in an
organization and the flow of data that supports processes can explain how a business works and
help users understand when data is created and how it is used.
Flowcharts are common tools for depicting process or data flows that help analysts understand
processes and analyze those processes for improvement—whether that improvement is based
on effectiveness, efficiency, or improved internal controls. There are a variety of templates for
flowcharts, including the Business Process Modeling Notation (BPMN), which is used to create
flowcharts referred to as activity models and data flow diagrams (DFD), which are used to
describe the flow of the data through a process.
Swim Lanes: Swim lanes are more granular than pools. Swim lanes indicate the segregation
of duties within an organization. If there are different roles within one organization involved
in a process, then the pool will be separated into separate pools to indicate which role is
responsible for which step in the process. For example, in the selling (internal) organization,
there might be a sales representative role that is separate from a cashier role. In the
following model, the pool for the internal organization has now been split into two lanes—
one for the sales representative and another for the cashier, while the pool for the customer
remains one pool (without separate lanes).
Representative
Selling (Internal) Organization
Sales
Cashier
Customer (External)
Organization
3.1.2 Events
Events describe how a process begins or ends. Events are not actions; they simply indicate when
a process kicks off (think of it as a trigger) and when a process is complete. Events are circles.
The thickness of the circle depends on whether the event is a start, intermediate, or end event.
Start Events: Every pool within a BPMN model must begin with one and only one start
event. Remember: start events are based on pools, not swim lanes—regardless of how many
swim lanes there are in a pool, there should only be one start event per pool. Start events
are smooth circles:
End Events: Every pool must end with at least one end event. However: end events are not
based on swim lanes—regardless of how many swim lanes there are in a pool, a process may
still end with only one end event. Additional end events only indicate the potential that a
process is cut short early or has multiple ways to end. End events are bold circles:
Intermediate Events: Intermediate events are not a required element of every BPMN
diagram, but they exist to indicate when something changes the course of a process, such
as a time delay or an error. Intermediate events are two-lined circles.
3.1.3 Tasks
Every action in a process is documented as a task, which is a rectangle with rounded edges.
Consider every step a person or a system must take to complete a task, and each of those
steps must exist as its own task. For example, in a sales process, the first task might be "Input
Customer Name," followed by "Select Product," then "Select Quantity."
It is worth revisiting the model shared previously with the two separate pools for the selling
and customer organizations. To simplify the new objects, the tasks will be kept in the selling
organization to three tasks, all of which are completed by only one role (so there are not
separate swim lanes). At this point, the BPMN activity model (including only the internal
organization) would appear as follows:
Selling (Internal)
Organization
Other than recognizing that the sales process is not complete (and lacking segregation of duties
or separate organizations marked by lanes or pools), it can be noted that the BPMN objects are
not yet connected to one another. The next step is to connect them.
Input Customer
Select Product Select Quantity
Name
Message Flows: When a BPMN model requires more than one pool (for instance, in the
previously examined sales process in which there is also a customer, or when there is a
purchasing process where there is also a supplier/vendor/manufacturer), there will be
occasional required communication between the internal and external organizations. In this
case, the communication will not be indicated by a sequence flow but by a message flow.
Message flows look similar to sequence flows, shown as dashed arrows, but they only
function to indicate communication between two separate pools—they should never be
used within one pool to indicate communication between lanes in the same pool. The
direction of the message flow should indicate the direction of communication; whoever
is answering a question and/or providing information should "send" information to the
other pool.
Selling (Internal)
Organization
Provide Indicate
Indicate Product
Information Quantity
3.1.5 Gateways
So far, the models have been simple and have easily flowed from the start event—through
tasks—and ultimately to an end event. An important step in process analysis is to question
the drafts continuously during the analysis phase of a project to determine that all of the
requirements have been documented and expectations have been discussed.
For this example, each task should be questioned and analyzed to determine if the tasks
can move from start event to end event effectively, and that nothing could go wrong in any
of the steps (be it error, fraud, etc.). Gateways help provide analysis opportunities for when
a task shouldn't result in only one possible sequence flow but rather more than one—be it
two, three, or more.
A task (such as "indicate product" and "indicate quantity") can occur mundanely enough, but
then as soon as the system recognizes that it is possible that there is not sufficient inventory
for the product and quantity mix that the customer ordered, there needs to be a gateway to
provide all of the possible directions a sales representative might go in.
The gateway (shaped like a diamond) is a question, not a task. There should not be any
active verbs in the annotation of the text of a gateway, only a question. In this instance,
the gateway label could read, "Is there sufficient quantity of this product?" (or, if that is too
wordy, simply "Sufficient quantity?").
There is an abundance of rules that relate to gateways, but the most important regard
sequence flows exiting a task object. Task objects should always have one and only one
sequence flow "exiting" the task, so if there are two potential exits or flows away from a
sequence flow, then an opportunity is identified to use a gateway.
3.2.1 Process
A process indicates any action that results in data changing and producing a new output. The
labels for processes are similar to the labels in BPMN activity model tasks; they are formatted
as a short sentence such as "Input Customer Information." The shape of a process object is
depicted as either a rectangle with rounded corners or a circle.
Customer
Relationship System
Customer Details
Process
Customer Customer Details Cash Receipt
Orders Payment Details Database
Process
Payment
Payment Deposit
Bank
NOTES
3
Security and Confidentiality
Module
3 Security Testing 39
5 Incident Response 61
NOTES
2 Cyberattacks
A cyberattack is any kind of malicious activity that targets computer information systems,
infrastructures, computer networks, or personal computer devices, and attempts to collect,
disrupt, deny, degrade, or destroy information system resources or the information itself.
The impacts of such attacks can directly or indirectly affect the organization, its customers, its
vendors, or potentially its partner organizations. The method of execution of an attack can be
grouped into one of the following categories: network-based attacks, host-based attacks, social
engineering attacks, application-based attacks, physical attacks, and supply chain attacks.
Types of Cyberattacks
Network-based Attacks Application-based Attacks Host-based Attacks Social Engineering Attacks Physical Attacks Supply Chain Attacks
Insiders: Insiders are employees that either organically developed into a person with
malicious intentions or intentionally infiltrated an organization to achieve nefarious
objectives. These individuals represent a significant internal threat to any organization's
cybersecurity because of the amount of access they have working from within a
company's safeguards.
External Threats: Threats that occur from outside of the organization, entity, or individual
that is the target of the cyberattack.
y Port Scanning Attacks: Scanning networks for open ports is frequently done by
attackers to find vulnerabilities that can be exploited so that they can gain unauthorized
access to a company's network.
—While ports can be physical (e.g., HDMI, USB, Ethernet ports), this attack focuses on
logical ports that are used for protocols such as TCP (Transmission Control Protocol)
port 80, which is one of the most common ports used on the internet.
—It is normal for companies to have open ports, but misconfigured open ports with
vulnerabilities create weaknesses that allow unauthorized access.
—Common vulnerabilities include unsecured protocols, unpatched protocols, poor
login credentials, and poorly configured firewalls.
y Ransomware Attacks: These are attacks that typically come in the form of malware
that locks a user or a company's operating systems, applications, and the ability to
access data unless a ransom is paid.
y Reverse Shell Attacks: Also referred to as "connect-back shells." A victim initiates
communication with an attacker from behind a company's firewall so that the attacker
can bypass the firewall and any other network safeguards and remotely control the
victim's machine. Since the original contact is not established from outside of the
company's network, normal filtering and firewall protection are bypassed.
Firewall
X
Database Server
Contains:
SQL Injection - Usernames
- Passwords
- Credit Card Numbers
- Bank Account Numbers
Attacker Web Database
Server Server
y Cross-Site Scripting (XSS): Similar to an SQL injection, but these attacks inject code to
a company's website that attacks users visiting the company's website. When a user
visits the site, the user's browser executes the malicious code and performs the attack,
which may compromise the user's data, such as usernames, passwords, and other
sensitive information.
Supply Chain Attacks: These attacks use cyber tactics to target the production and
distribution of goods within a supply chain so that there are larger disruptions in the normal
operations of a company, government, or other entity.
y Embedded Software Code: This form of attack involves inserting code into
prepackaged software or firmware being sold to a company that later installs the
software after purchase.
y Foreign-sourced Attacks: In many countries, governments have deep and widespread
control of companies in the private sector. Those governments may use products sold
to other countries to conduct surveillance or deliver malicious code.
y Pre-Installed Malware on Hardware: This method of attack involves installing
malware on devices that will be used by companies in a supply chain, such as USB
drives, cameras, or phones. Once the company acquiring the devices connects them to
the company's network, the malware executes.
y Vendor Attacks: This attack is perpetrated upon key vendors of a target company so
that the normal production of goods or business operations is disrupted.
y Watering Hole Attacks: In this method of attack, fraudsters identify websites of
suppliers, customers, or regulatory entities that are known to be used by several
companies or even entire industries. The attackers then look for weaknesses
at that third party that can be used to deliver malware, steal data, or obtain
unauthorized access.
Given the interconnections of organizations with their customers, vendors, and partner
organizations, the impact of a cyberattack upon one organization could have a profound
impact on other organizations. Below are examples of how these attacks could impact
stakeholders outside the organization.
Partner
Customer Organization's
Example Attack Impact Vendor Impact Impact
Ransomware Attack: The Unable to deliver Vendors are unable Financial losses due
attacker encrypted the products to to communicate to ransom payment to
company's servers and customers, causing with the company support the victim of
databases, preventing the interruption of through electronic the attack
company from accessing the company's data interchange
customer data and customers' channels to fulfill
processing orders fulfillments purchase orders
Mobile Code: The attacker The customer's The vendor's The partner must
infected the company with ordering systems systems were reallocate resources to
a virus that deletes critical are infected by infected, causing support the company
contact data and spreads the virus causing the vendor to under attack, causing
the virus through the data loss lose critical disruptions in its
business network production data main operations
Malware: The attacker Confidential Vendor banking Reputation loss
infected the company's customer data information and potential
servers and exposed is exposed to is exposed to class‑action lawsuit
confidential customer data the attacker the attacker
Cloud computing is a way for organizations to store, use, process, and share data, software,
and applications without the need to own or manage the resources required to perform those
functions on company premises. Companies access the needed computing power using the
internet. The data and software applications used in a cloud computing environment are often
stored and managed by third-party providers, which causes a significant amount of sensitive
information and user applications to be at risk.
Despite this risk, most cloud providers are seen as being more secure than a company managing
its own IT infrastructure on its own premises (referred to as on-premises). This is because most
cloud providers are required to maintain high levels of security protocols and procedures, and
upgrade to the latest versions with security patches and internal controls due to regulations
such as GDPR and HIPAA.
It is also common for third-party cloud providers to have SOC 2® engagements, which are
independent audits of management's attestation regarding the cloud service provider's controls
and other claims made by management regarding security over their customer's data, privacy,
and confidentiality. Information to be included within the SOC 2® engagement report may
include how controls at the service organization address the Cloud Security Alliance's Cloud
Controls Matrix, whereas the engagement team would consider relevant established criteria
related to the security of a system.
Below are some risks specific to cloud computing for which a firm should be aware:
Additional Industry Exposure: By nature of design, organizations subscribing to a cloud
provider may be exposed to other subscribing organizations and their unique industry
risks. Cyber threats that one company might not be exposed to become a risk to the other
companies that share the same cloud computing provider.
Cloud Malware Injection Attacks: An attack specific to cloud computing-based systems in
which an attacker gains access to the cloud environment and then injects malware so that
data can be stolen, services disrupted, or further access gained.
Compliance Violations: Cloud computing relies on third-party hosts, and there is the
compliance risk that these hosts or service providers do not have the security protocols and
procedures in place to meet regulations on privacy and confidentiality (i.e., HIPPA and GDPR
regulations).
Loss of Control: Not having physical or logical access to computing equipment means
an organization using cloud computing services will relinquish some control over its
infrastructure. As a result, changes or upgrades to the cybersecurity measures may not be
timely or up to the standard that the subscribing company prefers.
Loss of Data: The third-party cloud computing services provider is susceptible, albeit less
likely than most businesses, to data breaches, losing data, or exposing data.
Loss of Visibility: Loss of full visibility of the company's IT infrastructure comes with a
loss of control. The only entity that has full visibility is the cloud provider, which means the
subscribing organization does not know all of its risks.
Multi-Cloud and Hybrid Management Issues: A company subscribes to various
cloud‑based solutions and/or maintains some on-premises IT infrastructure. While having
a hybrid or multi-cloud setup can be part of a good cybersecurity diversification plan, it
may prove challenging to integrate and monitor multiple environments, which could make
detecting a cyberattack difficult.
Theft or Loss of Intellectual Property: Cloud applications store various types of data
for companies, including proprietary information, and there is the risk that the service
provider lacks sufficient controls over the data, which results in theft or loss of intellectual
property (IP).
Mobile devices such as smartphones, tablets, and wearables that can access the internet all have
risks for both users and their employers. While these devices have evolved to become a regular
part of corporate life and enhance productivity, their mobility and lack of oversight introduce
cybersecurity risks that should be addressed.
Most mobile devices are similar to computers in terms of functionality and the type of
information they access. As such, they face similar security threats as an organization.
However, some of their differences are at the root of mobile device cybersecurity issues, such as
the fact that mobile device operating systems are different than their computer counterparts.
A separate set of patches and updates must be maintained so that operating systems can be
updated. Another difference is that immobile desktop computers are not constantly exposed to
public networks like mobile devices are. As a result, companies must install software on every
mobile device to monitor and protect users from potential attacks. If protective software is not
used, policies should be in place that provide guidelines for safe usage.
Other risks and cybersecurity threats specific to mobile devices include the following:
Application Malware: This threat occurs when a user downloads an application that
appears to be legitimate but gives an unauthorized user access to the device. For example,
when a user visits a site, malware could be installed that steals private information without
the user's knowledge.
Lack of Updates: There could be uninstalled patches and security fixes that have yet to
be installed at a given point in time that leave the device vulnerable. Devices that go long
periods of time without updates are at risk.
Lack of Encryption: Many mobile devices are not encrypted and only rely on a passcode
for secure access. Once access is gained, passwords can be reset on the web by using the
victim's email on the mobile device.
Physical Threats: Examples of physical threats include loss or theft of a mobile device. If
the device does not have sufficient access controls, theft could lead to an unauthorized user
gaining the ability to access sensitive information and applications.
Unsecured Wi-Fi Networks: Users of mobile devices often connect to public unsecured
networks which means anyone on the same network could potentially access that device,
steal sensitive information, or infect the device with malware.
Location Tracking: Unauthorized tracking is a risk that involves a threat actor using Global
Positioning System (GPS) technology to locate people, devices, or other assets. With this
knowledge, attackers can devise plans that use the victim's location to perpetrate an attack.
Threat actors can also use mobile storage devices such as USB drives, memory cards, or optical
discs to infect other devices. For instance, USB drives can be easily plugged into a laptop or
desktop and quickly install software that can compromise the device.
Mobile devices can also be monitored or surveilled for the purpose of eavesdropping.
Equipment such as cell-site simulators, Bluetooth scanners, and international mobile subscriber
identity (IMSI) catchers can be used to intercept calls or text messages within a specific radius.
The Internet of Things (IoT) is a class of smart devices connected to the internet that provide
automation and remote control for other devices in a home or office setting such as cameras,
tablets, wearable devices, phones, and alarm systems. Organizations continue to integrate
IoT devices into normal business operations. As such, companies must consider cybersecurity
implications that this technology introduces.
Relevant cyber threats specific to IoT technology include:
Device Mismanagement: Insufficient password controls and device mismanagement can
increase the risk of a cyberattack. This can lead to the loss of critical information or access to
the devices on the IoT network.
Device Spoofing: This is when an attacker creates an illegitimate or phony device and
introduces it to a company's network, posing as an actual device, to gain information or
access to that network.
Escalated Cyberattacks: IoT devices can be used as an attack base to infect more
machines, or as an entry point for access into a connected network.
Expanded Footprint: IoT devices paired with other devices that are directly connected to a
company's core network expand the footprint of total devices under a company's purview,
thus increasing the number of points subjected to attack.
Information Theft: Since IoT devices are connected to the internet, they have the potential
for sensitive data to be stolen or exploited because that data is either stored in the cloud or
on other devices that can be accessed
Outdated Firmware: Attackers can intercept IoT firmware updates or manipulate firmware
with known weaknesses to gain access and control a device. Firmware is software that is
pre-installed on a device that controls its local functions, much like the software that comes
installed on a printer or scanner. Since employees often wear IoT devices or bring their own
into a company's office without alerting IT personnel, they are often missed as a part of the
organization's cybersecurity defenses.
Malware: IoT networks and devices are susceptible to cyberattacks due to the often-limited
computing power among the individual devices connected to the network. A common
example of malware attacks for IoT technology is ransomware, where the malware code
denies access to the devices without a financial consideration paid by the user.
Network Attacks: Threat actors can launch DoS attacks on IoT networks and devices just as
they can with traditional networks. These types of attacks overburden a network with traffic
via IoT devices and render it useless.
Threat modeling is the process of identifying, analyzing, and mitigating threats to a network,
system, or application. The goal is to understand all risks a system could face and develop
controls and countermeasures to minimize the impact of a risk or to try and prevent it
from happening. Developing a threat model forces companies to identify weaknesses and
vulnerabilities that need to be addressed.
Part of threat modeling involves evaluating the threat landscape, which is the total range of
potential threats that an organization and its IT infrastructure may face. Organizations should
regularly assess the threat landscape because new threats are continuously evolving. One way
to do this is by using threat intelligence platforms, which help organizations get information on
the latest threats and vulnerabilities so companies can prioritize their cybersecurity efforts.
Elements that should be considered when evaluating the threat landscape include different
attack vectors or methods, the magnitude of impact of a threat, existing vulnerabilities, and the
types of threats (social engineering attacks, insider threats, network attacks, etc.).
Mitigation of Threats
and Attacks ISC 3
Function
that was created in 1992 and became an Control Environment
Operating Unit
industry-wide benchmark for internal control
Division
practices. The most recent version of the Risk Assessment
Entity Level
framework, titled COSO 2013, often refers to
the COSO cube, a three-dimensional diagram Control Activities
showing how the various elements of an
internal control system work together.
Information & Communication
COSO has also published a companion
framework to COSO 2013 for enterprise risk Monitoring Activities
management. This framework, titled COSO
2017 Enterprise Risk Management, can be
Internal Control—Integrated Framework, © 2013
used as a reference for organizations to assess Committee of Sponsoring Organizations of the
risks and to develop strategies around risk and Treadway Commission (COSO). Used with permission.
business performance.
The COSO framework classifies internal control objectives into three groups: operations,
reporting, and compliance. These groups are applicable to cybersecurity as follows:
Operational Objectives: These include performance measures and safeguards that
can help increase the likelihood that an organization’s IT assets are protected against
cybersecurity threats and fraud. They focus on the effectiveness and efficiency of
business operations.
Reporting Objectives: These objectives are related to increasing the likelihood that
cybersecurity controls are in place so that they do not affect internal and external financial
and nonfinancial reporting. The objectives have a focus on transparency, reliability,
timeliness, and trustworthiness as determined by standard-setting bodies, regulators,
and an organization’s own policies.
Compliance Objectives: These are based on adherence to governmental laws and
compliance regulations. As it relates to cybersecurity, this includes compliance with industry
standards such as those issued by NIST, U.S. regulations like the Health Insurance Portability
and Accountability Act (HIPAA), and international laws like the General Data Protection
Regulation (GDPR).
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–17 Mit
2 Mitigation of Threats and Attacks ISC 3
There are also five components of the COSO internal control framework. These can be applied
to cybersecurity efforts to prevent, detect, and respond to cyber threats as follows:
Control Environment: The control environment is often referred to as the tone at the top
and sets ethical values for an organization by creating a top-down approach to push forward
the COSO framework throughout the organization.
y Senior management and those charged with governance should act as champions to
raise awareness of cyber threats; guide the development of key IT policies, processes,
and procedures; provide guidance on incident response management; and educate the
workforce regarding the roles of safeguarding a company’s digital assets and resources.
Risk Assessment: This component involves performing risk assessments to evaluate
internal and external factors. It can be applied to cyber threats by tailoring the organization’s
risk assessment procedures to analyze cyber risks, their likelihood of occurrence, and the
magnitude of their impact. Assessments provide reasonable assurance that organizations
are managing their cyber risks to an acceptable risk tolerance.
Control Activities: Control activities are the policies and procedures put in place to help
determine whether the tone at the top set by the control environment is being implemented
at all levels of the organization.
Information and Communication: This component focuses on using consistent and
relevant language, following best practices for sharing information, and communicating
internally and externally with the right stakeholders all to support internal controls. Sharing
information about company policies on cyber threats, how to detect potential cyber threats,
and how to respond to cybersecurity events is critical for any organization. Examples of
effective communication include:
y Business impact analysis reports reviewed by management that outline the impact of
interrupting key business functions
y Employee meetings on policies regarding cybersecurity
y Periodic emails addressing cybersecurity internal controls to the entire company
y Mandatory annual training of cyber threats and company policies
Monitoring Activities: Monitoring internal controls is the component that should be
practiced on an ongoing basis to identify areas of risk vulnerability and to determine
effectiveness and efficiencies. This is especially important for cybersecurity threats because
attacks are always evolving. Examples of monitoring practices and controls that should be in
place, evaluated, and adjusted include:
y Penetration testing
y Vulnerability scanning and assessments
y Periodic phishing reports
Looking at cyber risk through a COSO lens can allow management to better communicate
their risk tolerance levels and objectives for the business. If clear priorities are established by
management, then the employees tasked with cybersecurity can focus on assessing the risk
associated with systems most likely to be attacked, and the points of potential vulnerability in
the IT system.
To enhance cybersecurity defenses and enhance IT infrastructure resiliency, security rules must
be carefully coupled with technology at multiple levels of an organization. At the uppermost
level is a collection of security policies, which serves as an overview of an organization’s security
needs and strategic plan for what should be implemented.
At the next level is a set of standards that organizations use as a benchmark to accomplish
the goals defined by the security policies. At the bottom level, there are standard operating
procedures that are typically detailed documents that specifically outline how to perform
business processes. Security policies, standards, and procedures are subject to review by service
auditors in a SOC 2® engagement when the organization is a service organization.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–19 Mit
2 Mitigation of Threats and Attacks ISC 3
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–21 Mit
2 Mitigation of Threats and Attacks ISC 3
Mobile Phones and Tablets: Devices that are another primary means through which users
connect to a network.
Modems: Devices that modulate between digital information and an analog signal to
support networks. They are most commonly used to connect computers to the internet.
Proxies: A form of gateway that does not translate protocols but rather acts as a mediator
that performs functions on behalf of another network using the same protocol instead of
just connecting the networks.
Routers: Devices that control data flow on a network using the same protocol by
receiving incoming data packets and forwarding those to the correct destination based on
IP addresses.
Servers: Devices that support computers and networks by performing different core
functions such as running applications with application servers, storing files with a file
server, or storing data using a database server.
Signal Modifiers: Devices such as amplifiers, concentrators, and repeaters receive signals
and then modify them by increasing the signal strength, combining multiple signals, or
simply regenerating the signal. The types of signals could be electrical, radio frequency,
audio, or optical.
Switches: Similar to hubs, but instead of broadcasting received signals to every other
networked device, switches only route traffic to target destinations, connecting various
devices within a network for most modern organizations.
Wi-Fi Protected Access (WPA): A security protocol that encrypts traffic between a wireless
access point, such as a switch, and a mobile device. However, it does not encrypt traffic that
travels through a wired connection once it is out of the wireless access point.
y WPA’s first successor, WPA2, is a similar protocol that provides an additional layer of
data encryption using the Advanced Encryption Standard (AES) to provide even more
security for a network.
y WPA3 provides even stronger security through more sophisticated encryption, secure
handshakes (the process of establishing a connection between computers or devices),
and stronger password protections.
Endpoint Security: The notion that every device, also called hosts, connected to a network
should have some form of local security that is separate from any other security measure in
place on the network or communications channel. The following safeguards are examples of
endpoint security that should be implemented on local hosts:
y Antivirus and malware screening software
y Authentication and authorization mechanisms
y Auditing software
y Local host firewalls
y Host-based intrusion detection
y Prevention systems
System Hardening: System hardening is a multipronged comprehensive security approach
that reduces risk by minimizing the number of access points through which a company can
be attacked. These access points are referred to as attack vectors and include all aspects
of IT infrastructure, including applications, databases, operating systems, servers, and
networking equipment. This gives attackers fewer opportunities to access and infiltrate an
IT system.
y Examples of system hardening in the context of potential recommendations after a
vulnerability scan by an IT consulting agency may include:
—Database Hardening: Create different privilege levels so that there is a clear
delineation between admin users and users that have tiered need-to-know access.
Also, data at rest needs to be encrypted.
—Endpoint Hardening: Remove administrative rights for users on local devices so
that endpoint users can only perform authorized functions. Restrict users from
downloading certain files from the internet or email. Implement local firewalls and
malware screening on all laptops. These hardening adjustments make it harder for
users to inadvertently compromise the network.
—Network Hardening: Revise the rules for the firewall so that it is configured to
remove unused ports and block unnecessary protocols. This provides attackers with
fewer options to infiltrate the network.
—Server Hardening: Physically segregate servers in a secure facility, further separating
backup servers geographically. If one server or group is attacked, not all will be
compromised. Develop test procedures for servers connecting to the network for the
first time, to increase the likelihood that administrative rights are set up properly.
Perform tests on servers in operation after business hours to minimize functionality
and service disruption.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–23 Mit
2 Mitigation of Threats and Attacks ISC 3
Media Access Control (MAC) Filtering: This is a form of filtering in which an access point
blocks access to unauthorized devices using a list of approved MAC addresses. A MAC
address, also referred to as a physical or hardware address, is a unique identifier found on
devices in a network that is used as an address for communicating with other devices on
that network.
4.1.3 Need-to-Know
The need-to-know principle follows the idea that employees are only given what they must know
to perform their job. The difference between need-to-know and least privilege is that need-
to-know focuses on the data itself that is needed to perform the job, whereas least privilege
focuses on the access needed to perform the job.
4.1.4 Whitelisting
Whitelisting is the process of identifying a list of applications that are authorized to run on an
organization’s systems and only allowing those programs to execute. Similarly, blacklisting is
identifying a list of applications not authorized on a network and preventing those from running.
These rules are enforced by automated software programs designed to prevent applications
from executing unless they are on the whitelist.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–25 Mit
2 Mitigation of Threats and Attacks ISC 3
Token: These are devices that generate fixed-digit passcodes that are carried with users as
a form of multifactor or secondary authentication mechanism. The passcodes generated
by the token are also stored on an authentication server so that when a passcode is
entered for validation, it is confirmed against the server. Tokens may be synchronous
or asynchronous.
y Synchronous tokens are time-based and require the token and server to be
synchronized so that they register with the same number at the time of validation.
y Asynchronous tokens do not use clocks, but rather they create passcodes based on the
same algorithm.
Biometrics: This is an authentication technique that uses human physical characteristics or
impressions to verify identity.
y Common physical characteristics used for validation include facial recognition,
fingerprint or palm scans, hand dimensions, voice recognition, iris or retina scans, heart
or pulse patters, keystroke patterns, and handwriting or signature dynamics.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–27 Mit
2 Mitigation of Threats and Attacks ISC 3
5.4 Provisioning
Provisioning is the process in identity management when an organization creates a user’s
account and provisions it with privileges based on their job role. This is often an automated yet
protected process but it is critical in creating a valid identification that can be authenticated. It
may be part of the employee onboarding process when other identification and background
checks are performed, and no rights should be provisioned to individuals that do not meet
company standards.
Prior to issuing system credentials and granting system access, the organization may register
and authorize new internal and external users whose access is administered by the organization.
For those users whose access is administered by the organization, user system credentials need
to be removed when user access is no longer authorized.
In the context of a SOC 2® engagement, service auditors may inspect access request forms
for a sample of new employees who received access to in-scope system components during a
specified period. This procedure would be performed to determine that an access provisioning
request was approved prior to access being provisioned.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–29 Mit
2 Mitigation of Threats and Attacks ISC 3
The purpose of layered security is to protect an organization by using a diversified set of security
tactics so that a single cyberattack or security vulnerability does not compromise an entire
system. Layered approaches typically combine physical access controls, logical and technical
controls, and administrative controls to provide control redundancy. These redundancies
are implemented to offset possible security defects that could arise in the event of a
multipronged breach.
7.1 Defense-in-Depth
One of the most common layered security solutions is the defense-in-depth cybersecurity
strategy. It focuses on a multilayered security approach that does not rely on technology alone,
but rather it combines people, policies, technology, as well as both physical and logical access
controls. These layers contribute to the defense-in-depth strategy as follows:
Personnel: Organizations must have experts that can operate security functions and tools
effectively to attempt to make sure multilayered defenses are effectively implemented.
In some cases, only specific IT professionals will have the expertise to understand how all
layers interact holistically.
Policies: While technology is critical, policies governing how that technology should be used
must also be created, implemented, and monitored over time to determine whether tools in
place are working as designed.
Technology: Technical controls applied in a defense-in-depth strategy include security
solutions like intrusion detection and prevention systems, antivirus software, firewalls, and
endpoint security.
Physical Access Controls: This includes security measures like cameras, gates, locks,
fences, badge-controlled access, and restricted access to climate-controlled devices.
Logical Access Controls: These are rule-based controls that are carried out by software
and hardware designed to prevent unauthorized access. Such controls are embedded
in user authentication systems and software that require validation of identity through
login credentials, multifactor authentication, and different permission-based logical
access methods.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–31 Mit
2 Mitigation of Threats and Attacks ISC 3
Well-designed cybersecurity controls include policies, procedures, and technology that mitigate
threats at all points of discovery and all stages of a counterattack. These controls can be
grouped into the following categories: preventive controls, detective controls, and corrective
controls. Authorization is defined by SOC 2® engagement guidance as the process of granting
access privileges to a user, program, or process by a person who has authority to grant
such access.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–33 Mit
2 Mitigation of Threats and Attacks ISC 3
Physical Barriers: Tangible barriers, or physical obstructions, are controls that are
designed to both deter and prevent unauthorized physical access to an organization’s IT
infrastructure. Examples include locked doors and cabinets, access controls such as a badge
entry system, security guards, fences, gates, and surveillance systems.
Device and Software Hardening: Hardening refers to implementing security tools so
that the totality of vulnerable points, or the surfaces that can be attacked, are reduced.
Minimizing the number of vulnerabilities across hardware devices and software applications
prevents some attacks from occurring.
Intrusion Prevention Systems (IPS): An IPS is a network security solution that is intended
to detect and stop a cyberattack before it reaches the targeted systems. It does this by
receiving a direct feed of traffic so that all data coming into a network pass through the IPS,
similar to a firewall.
A policy-based access control (PBAC) uses a combination of user roles and policies consisting
of rules to maintain and evaluate user access dynamically. PBAC is more like a framework to
evaluate a user’s access based on what is known about that user, such as their identity, role,
clearance, operational need, and risk.
Policy-based controls are generally more flexible than rule-based controls because they allow
for the analysis of theoretical privileges based on actual privileges. As organizations grow and
policies change, PBACs can better accommodate the needs of a wider range of access control.
Smaller organizations may be better suited to apply rule-based controls if there are only a few
simple and fixed rules that need to be applied.
Risk-based access controls apply controls based on the risk level of the asset being accessed,
the identity of the user, the intentions of accessing the asset, and the security risk that
exists between the user and the system or asset being accessed. If high-risk systems are
being accessed, they usually will have stricter security measures in place such as multifactor
authentication, whereas lower-risk scenarios may only require a password.
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–35 Mit
2 Mitigation of Threats and Attacks ISC 3
© Becker Professional Education Corporation. All rights reserved. Module 2 S3–37 Mit
2 Mitigation of Threats and Attacks ISC 3
NOTES
1 Security Assessments
Protecting the organization against cyberattacks is a critical part in achieving the goals of internal
control. To effectively manage cyber risks, it is critical to follow the established risk management
framework and assess and respond to threats on a continuous basis.
Monitor Risk: The purpose of this component is to evaluate and monitor risk over time by:
y Determining the ongoing effectiveness of risk responses
y Identifying risk-impacting changes to organizational information systems and the
environments in which the systems operate
y Verifying that planned risk responses are implemented and that information security
requirements derived from, and traceable to, organizational missions/business
functions, federal legislation, directives, regulations, policies, standards, and guidelines
are satisfied
Reference: IA-XXX1
Risk Level: (Risk Level is High, Moderate, or Low)
Moderate
Ease-of-Fix: (Ease-of-Fix is Easy, Moderately Difficult, Very Difficult, or No Known Fix)
Easy
Estimated Work Effort: (Estimated Work Effort is Minimal, Moderate, Substantial, or
Unknown; or a time estimate based on level of commitment and an adequate skill set)
Moderate
(continued)
(continued)
Description
ABC Co.’s “Identify and Access Management Policy,” specifically Appendix A, establishes
password management standards for authenticating ABC’s system users based on level
of assurance, system interface type, and impact to the company.
Scope
Operating systems
Microsoft 365 Suite
Accounts payable automation
Enterprise resource planning
Human resources information system
Project management
Billing system
Aurora databases
Findings: Other than satisfied (O)
The assessment team continued to identify multiple password management
vulnerabilities. For example, we continued to find a significant number of weak
passwords on major databases, applications, and networking devices at most of ABC’s
facilities.
Additionally, password parameter settings for network domains, databases, key financial
applications, and servers were not consistently configured to enforce the company’s
password policy standards. Even though some improvements have been made, we
continue to identify security weaknesses that were not remediated from prior years.
Many of these weaknesses can be attributed to ABC’s ineffective enforcement of
its company-wide information security risk management program and ineffective
communication from senior management to the individual offices. The use of weak
passwords is a well-known security vulnerability that allows malicious users to easily gain
unauthorized access to mission-critical systems.
Recommended Corrective Action(s):
The assessment team recommended the chief information manager implement
mechanisms to enforce company password policies and standards on all operating
systems, databases, applications, and network devices.
Status: Corrective action needs to be executed
All employees play an important role in protecting a company’s digital and physical assets, not
just the IT department. As such, the need for educating and training programs is critical as the
sophistication, scope, and number of cyberattacks increase each year. Organizations must
prioritize and invest in these security awareness programs to minimize the cyber risk and the
damages that cyberattacks can inflict upon an organization.
Conducting regularly scheduled security awareness training is encouraged or mandated by
various information security frameworks and regulations. For instance, the information security
standard-setting body, NIST, as well as GDPR, HIPAA, and SOC2®, emphasize the need for
conducting regular security awareness and training programs for employees.
Confidentiality
and Privacy ISC 3
While both confidentiality and privacy are terms that are often used interchangeably, the two
terms are independent when it comes to cybersecurity.
Privacy protects the rights of an individual and gives the individual control over what
information they are willing to share with others.
Confidentiality protects unauthorized access to information gathered by the company.
Alternatively, privacy requirements dictate the types of authorization granted to information.
After the information is gathered adhering to the privacy requirements, confidentiality
is required so that the information is only accessed by systems or individuals with the
appropriate authority.
1.1 Confidentiality
The National Institute of Standards and Technology (NIST) defines confidentiality as preserving
authorized restrictions on access and disclosure of data, including means for protecting personal
privacy and proprietary information.
In addition to proprietary information, confidentiality requires organizations to protect all
personal information that it collects or maintains during the course of normal business. To
accomplish this, organizations must define and identify information that is deemed to contain
personal information.
Personal identifiable information (PII) is defined as all data that can be used to identify an
individual, including the following:
Name, such as full legal name, maiden name, mother's maiden name, or alias
Personal identification numbers, such as Social Security number (SSN), passport number,
driver's license number, taxpayer identification number, or financial account or credit
card number
Address, such as street address or email address
Personal characteristics, including photographic images, fingerprints, handwriting, or other
biometric data
Well-designed cybersecurity programs typically attempt to minimize the amount of personal
information used, collected, and stored. Only information that is critical to operations should
be stored. Also, an organization should regularly review its storage of collected personal
information to determine whether that information is still relevant and necessary for meeting
critical business functions.
1.2 Privacy
The NIST defines privacy as the right of a party to maintain control and confidentiality of
information about itself. Privacy is the process of protecting human autonomy and dignity. The
NIST Privacy Framework is a tool for improving privacy through risk management procedures
and communication methods employed throughout the organization.
The Privacy Framework's purpose is to help organizations manage privacy risks by:
Considering privacy best practices as they design and deploy systems, products, and
services that affect individuals.
Communicating privacy practices to the rest of the organization.
Encouraging cross-organizational workforce collaboration relating to user privacy and
IT security.
The Privacy Framework approach to managing privacy risk requires the consideration of privacy
events as potential problems individuals could experience at some stage during the life cycle
of a data point. This could range from the collection to the disposal of data as it flows through
systems and processes related to delivering products or services.
—incident response;
—privacy in the development cycle;
—sharing rules; and
—consequences of violations.
y Conducting Training: Organizations should reduce the possibility that PII will be
accessed, used, or disclosed inappropriately by requiring that all individuals receive
appropriate training to understand the relevant guidelines and the repercussions of
violating these guidelines.
Data Processing
y De-identifying Personal Information: Organizations should de-identify records by
removing enough personal information such that the remaining information does not
identify an individual.
—For example, pseudonymization is a form of de-identification that would replace
the name of a person visiting the doctor with a pseudonym, such as Patient 565
or Client AM.
—Other types of de-identification, like anonymization, remove the ability to trace
identifying data points to a person when full records are not necessary, such as for
research studies or determining correlations and trends.
Data Storage
y Using Access Enforcement: Organizations should control access to personal
information through access control policies and access enforcement mechanisms (e.g.,
access control lists).
y Implementing Access Control for Mobile Devices: Organizations should prohibit or
strictly limit access to personal information from portable and mobile devices, such as
laptops, cell phones, and personal digital assistants.
y Auditing Events: Organizations can monitor events that affect the confidentiality of
personal information, such as inappropriate access to PII.
Data Transmission
Organizations should protect the confidentiality of information transmitted. This is
commonly accomplished through encrypting the communications (i.e., VPN) or by
encrypting the information before it is transmitted.
Data Deletion/Purging
Organizations should set up the policies to determine the data sets subject to be archived
or purged.
John Smith
Jason Paul SSN 555-01-4444
Masking SSN 925-01-8264 Mask OR
John Smith
SSN ***-**-8264
Example application:
Healthcare settings or
research studies.
3 Data Encryption
SENDER RECEIVER
Asymmetric Encryption: This data encryption method uses two keys, a public and private
key. The public key is used to encrypt the message and the private key to decrypt it, or vice
versa. Only the two opposite keys can be used in tandem for this form of encryption to
work. Popular applications of asymmetric encryption include digital signing and blockchain.
The primary weakness of asymmetric encryption is its speed of operation. They keys are
generally longer, one is needed for both encryption and decryption, and the encryption
algorithm is typically more complex. All of these factors require more computing power,
which is time-consuming and could also lead to an increase in technology expense.
SENDER RECEIVER
Hashing is often confused with encryption because it converts a message with variable lengths
to a fixed-length message or code called a message digest or hash value. However, the effect
of hashing is one-way, meaning it scrambles a message into code that cannot be unscrambled.
Encryption is two-way because it can both be encrypted and decrypted.
One primary difference between encryption and hashing is their intended use. Encryption is
intended for the secure transfer of data to maintain confidentiality, whereas hashing is intended
to maintain the integrity of the data transmitting, validating that the message sent is from the
true sender. Comparing two hash values will tell users that the message is legitimate.
Since hash values cannot be decrypted, hashing is often combined with encryption to securely
transfer the message using encryption and then validate the authenticity of that message
using hashing. The message is decrypted using either a public or private key, and the hash
value received by the receiver can be compared to the hash value from the sender to ensure it
is identical.
Pass Key
The term "private" can be used to refer to both a private key that is one of two keys used
in asymmetric encryption or it can be used to refer to a shared private key, which is
symmetric encryption. A shared private key among a group is symmetric encryption, but a
single private key paired with a public key is asymmetric encryption.
3 2 4 1
E E T M
T T W A
V L E E
Using the key to reorder the ciphertext in numerical sequence reveals the message
"Meet at twelve."
1 2 3 4
M E E T
A T T W
E L V E
There are various other types of ciphers, such as running key ciphers, which encrypt messages
that are as long as the messages themselves; and block ciphers, which operate on chunks of a
message and then apply encryption. The messages may also stream ciphers which operate on
a single character, or a few, known as a stream. When used in combination with other ciphers,
these forms of encryption can be difficult to decode.
Data loss prevention (DLP) systems enable organizations to detect and prevent attempts by
employees or unauthorized users to transfer sensitive information out of the organization
electronically across multiple protocols, ports, and communication methods. DLP systems often
use pattern-matching methods or word recognition technology to scan files for certain patterns,
such as the way in which data is formatted or sequenced.
For example, systems designed to comply with regulatory standards, such as HIPAA, PCI-DSS,
and GDPR, may deploy pattern-matching technology that searches for strings of 9-character
numbers with dashes after the third number and fifth number to identify potential Social
Security numbers. The software may then either prevent the message from being sent or
encrypt it.
The main objectives and best practices of DLP are to develop a program to:
Implement a centralized DLP program, with collaboration from various departments, which
oversees data for the entire organization.
Define and create enterprise data usage policies, report data loss incidents, and establish
incident response capability to enable corrective actions to remediate violations.
Evaluate the different forms of data, define the different levels of sensitivity, create
an inventory of sensitive data, identify where sensitive data is stored, and manage
data cleanup.
Monitor the use of sensitive data, understand sensitive data usage patterns, and gain
enterprise visibility.
Enforce security policies to proactively secure data and prevent sensitive data from leaving
an enterprise.
Implement employee education programs.
Two common types of DLP systems include network-based DLP systems and endpoint-based
DLP systems:
Network-based DLP: These types of DLP systems scan outgoing data that meet specific
criteria and are transmitted using means such as email, file transfer protocols (ftp sites that
facilitate file transfer), and direct messaging. Records of DLP policy violations are typically
archived in a database that identifies the data moved and where it went on the network.
y Cloud-based DLP: These DLP systems apply the same protection as a network-based
DLP but apply it to a cloud environment. Many organizations are migrating some
functions, if not all computing functions, to a cloud-based (web-based) environment.
y Data loss is prevented when transferring sensitive data across virtual machines and
platforms rather than an organization's private on-premise network.
Endpoint-based DLP: These types of DLP systems scan files stored or sent to devices that
might be outside of a network, such as a printer, USB drive, or any other device to which
data can be transferred. Transferring data to such devices can be prevented by scanning for
specific keywords, patterns, or file types, such as MP4 files.
Alice is the director of provider credentialing for North Pointe Hospital's billing department.
She regularly sends records to insurance companies and other health care providers, which
include sensitive data, such as Social Security numbers, dates of birth, and other personally
identifying information. She typically encrypts emails that contain such information, but in
a rush to meet a deadline, Alice forgets to encrypt an email containing dozens of provider
records to an insurance company.
North Pointe recently purchased a subscription to an email DLP solution from the
cybersecurity provider Clix Corp. This is a network-based DLP solution that auto-encrypts
emails that an algorithm detects using pattern recognition applied to all emails that have
North Pointe's domain, @northpointehospital.com. Operating as designed, this DLP
solution automatically encrypted the email Alice forgot to send securely, minimizing the
likelihood that these records would be exploited if intercepted.
Corporate Training and Education: This may not be an individual department, but rather
a function performed by multiple individuals from different departments. Walk-throughs
should include:
y viewing the security, confidentiality, and privacy content being delivered to employees
and determining whether they are appropriate to their job roles;
y employee acknowledgement of the policies and procedures;
y attending courses delivered by trainers;
y reviewing materials and assessments given to trainees; and
y interviewing the training staff regarding plans for making revisions and updates to the
training program.
Human Resources: This department is considered the gatekeeper for onboarding newly
hired employees and ultimately has access to an organization's systems.
y For confidentiality and privacy, walk-throughs should focus on how human resources
follow the policies and procedures to identify and collect PII, manage access to PIIs, and
the process of handling violations.
y For security, walk-throughs should focus on practices regarding background checks,
defining security roles for both contractors and full-time employees, communicating
security policies, monitoring employee activity, and processes for revoking access
privileges as employees transfer positions or are terminated.
IT Risk Management: This department is focused on identifying current and potential
confidentiality and privacy risks so they can be eliminated, minimized, or transferred.
y For confidentiality and privacy, walk-throughs should focus on identifying ways
the department monitors the confidentiality and privacy controls, identifying and
communicating potential violations.
y For security, walk-throughs should focus on identifying ways the department tracks
assets and systems that should be protected, identifies potential vulnerabilities and
threats, assesses the operational and financial impact of risks, develops risk mitigation
strategies, and periodically reviews risk management plans.
In relation to security, service auditors will perform procedures to understand how an entity
communicates information through a security awareness training program. Procedures the
service auditor may perform to obtain an understanding of the organization's communications
may include reviewing documents related to the following:
The service organization's security awareness and training programs
The communication of the entity's code of conduct
Employee handbooks
Information security policies
Incident notification procedures
Other available documentation to understand the service organization's process for
communicating to personnel their responsibilities for system security and other matters
Security, confidentiality, and privacy testing will take place with service organizations that are
subject to System and Organization Controls (SOC) audits. During SOC 2® engagements, a service
auditor evaluates the results of all procedures performed and conducts both a quantitative
and qualitative analysis of whether identified description misstatements, deficiencies in the
suitability of design, and, in a type 2 examination, the operating effectiveness of controls result
in a description that is not presented in accordance with the description criteria or in controls
that are not suitably designed or operating effectively.
Service auditors in a SOC 2® engagement will also perform a walk-through of the service
organization's IT security, confidentiality, and privacy policies. General walk-through procedures
to be performed by SOC 2® engagement service auditors include:
Following a transaction, event, or activity from origination until final disposition
through the service organization's system using the same documents used by service
organization personnel.
When considering confidentiality and privacy, the objective is to understand how PIIs and
proprietary information are handled throughout the life cycle.
Inquiry, observation, inspection of relevant documentation, and flowcharts, questionnaires,
or decision tables to facilitate understanding the design of the controls.
Inquiry about instances during the period in which controls did not operate as described
or designed.
Questioning variations in the process for different types of events or transactions.
An appropriately performed walk-through provides an opportunity to verify the service auditor's
understanding of the flow of transactions and the design of the controls in relation to an
organization's security, confidentiality, and privacy service commitments.
When performed properly, walk-throughs often provide evidence about whether controls
included in the description were suitably designed and implemented and, in a type 2
examination, operated effectively.
When evaluating the results of procedures, the service auditor investigates the nature and cause
of any identified description misstatements and deficiencies or deviations in the effectiveness of
controls and determines the following:
If the identified description misstatements result in either the failure to meet one
or more of the description criteria or in a presentation that could be misunderstood
by users if the service auditor's opinion was not modified to reflect the identified
description misstatements.
Whether identified deviations are within the expected rate of deviation and are acceptable
or whether they constitute a deficiency.
Whether the procedures that have been performed provide an appropriate basis for
concluding that the control operated effectively throughout the specified period.
Whether identified deficiencies are likely to have a pervasive effect on the achievement of
the service organization's service commitments and system requirements based on the
applicable trust services criteria.
The magnitude of the effect of such deficiencies on the achievement of the service
organization's service commitments and system requirements based on the applicable trust
services criteria.
Whether report users could be misled if the service auditor's opinion were not modified to
reflect the identified deficiencies.
Factors that may be considered when determining whether the identified deviations may have a
pervasive effect on other controls include the following:
The effect that entity-level controls have on the operation of other controls. Deviations in
entity-level controls often have a pervasive effect on other controls.
The extent of the use of segmentation, a technique that enhances security by dividing
networks or systems into multiple segments, across the service organization.
The extent to which deficiencies in certain key controls have a pervasive effect on
other controls.
If the service auditor identifies material description misstatements, material deficiencies in
the suitability of design of controls, or, in a type 2 examination, deviations in the operating
effectiveness of controls, the service auditor should modify the opinion. When modifying
the opinion, the service auditor's understanding of the nature and cause of the description
misstatements and deficiencies enables the service auditor to determine how to appropriately
modify the opinion.
When incidents of fraud or suspected fraud are identified during the examination, the service
auditor is expected to respond appropriately. Appropriate responses include the following:
Discussing the matter with service organization senior management (and the engaging
party, and other appropriate parties, unless senior management is suspected to have
committed the fraud).
For potential fraud involving senior management, communicating to those charged
with governance and discussing with them the nature, extent, and timing of procedures
necessary to complete the examination.
Requesting that senior management consult with an appropriately qualified third party.
Considering the implications of the matter in relation to other aspects of the engagement,
including the service auditor's risk assessment and the reliability of written representations
from service organization management.
Obtaining legal advice about the consequences of different courses of action.
Communicating with third parties.
Withdrawing from the engagement.
REPORT
Ongoing
While the main focus of an incident response team is intrusion detection, it is common for
teams to perform additional duties to raise awareness of cybersecurity across the organization.
They may include:
Education and Awareness: The more employees outside of the IT team know about
detecting, reporting, and responding to incidents, the less of a burden it will be on the
incident response team. This information can be delivered using various mediums including
workshops, company intranet sites, newsletters, posters, and other paraphernalia with
security tips or reminders.
Advisory Distribution: Issue cyber briefings or newsletters to inform the rest of the
organization regarding new vulnerabilities and threats identified by the teams.
Information Sharing: Incident response teams may participate in information sharing groups
and manage the organization's incident information sharing efforts in the broader cybersecurity
community. This may include sharing information related to past incidents, the response
selected, the results of that response, as well as any company changes that resulted.
Cybersecurity involves the safety of computer systems which includes the technology
infrastructure supporting the computer systems (network, computers, etc.) and the digital data
contained within.
1. Preparation: The initial phase of incident response planning involves assembling key
personnel, tools, and processes so the organization will be prepared to handle many
scenarios. Tools and methods adopted in preparation typically include vulnerability
assessment software, intrusion detection and prevention applications (vulnerability
scanners), anti-malware software, and training for both end users and specialists directly
involved in the response.
2. Detection and Analysis/Identification: The second phase concentrates on recognizing
deviations from normal operations, evaluating those deviations, and correctly classifying
them as either an acceptable event or a problematic cybersecurity incident.
3. Containment: Once a threat is correctly identified, the organization must contain it so that
further damage is not incurred. This also allows the cybersecurity response team time to
determine the best approach to eliminate the threat.
y Containing a threat may include technical measures such as isolating a segment of a
network, taking an exposed group of workstations out of use, or removing infected
servers from production and rerouting those to backup or failover equipment.
y Containment may also include nontechnical measures like informing employees so that
certain routine operations still in progress might stop, preventing further proliferation
of the incident.
4. Eradication: This phase targets the extraction of the threat and restoration of affected
systems, which may be as simple as restoring infected files with clean backup copies or
as complex as using specialized software and forensic analysis to help decrypt or remove
infected files. System logging or network monitoring may also be performed company-
wide to determine whether the breadth and depth of eradication efforts are adequate.
A significant incident may require a system to be entirely rebuilt, resulting in the loss of
critical data.
Post-Incident Review: Reviewing the chain of events post-incident with high scrutiny
by senior management and security experts can evaluate how effective an IRP was and
whether personnel and technology complied with the plan. This may involve analyzing
logbooks, evaluating system configurations, interviewing employees involved, and
performing further vulnerability testing.
Periodic Audits: Performing regularly scheduled and unscheduled audits of incident
response policies and reviews of those policies helps determine whether organizations are
positioned to respond appropriately to incidents as they occur.
Continuous Monitoring: Employing automated tools that constantly analyze system logs,
network traffic, and unusual user behavior helps promote timely and adequate responses
to incidents.
Cyber insurance policies are a relatively new form of insurance protection that help
organizations hedge against cyberattacks by providing financial relief in the event of a successful
attack. This relief can help with the cost of restoring data, the temporary disruption in business
operations, lost revenues, and even managing public relations needs. As cyber threats evolve,
insurance companies are carefully defining both their insurable losses and their requirements
for issuing coverage.
Litigation and Attorney Fees: Cyberattacks often result in the need for consultations with
attorneys to address lawsuits (especially class-action lawsuits) that arise from the attack
or just to get legal advice on how to proceed after the initial attack in a way that minimizes
future liability.
Reputational Damage: Costs related to public relations, crisis management, and marketing
to customers regarding a data breach may be covered by the policy. However, harm to
a company's brand or the long-term impact that it may experience are unlikely to be
covered costs.
Information or Identity Theft: Insurance may cover the cost of losses related to an
attacker using an employee's identity that stemmed from the attack.
4
System and Organization
Controls (SOC) Engagements
Module
SOC Engagement
Categories and Types ISC 4
Organizations often engage in business relationships with other entities to outsource key
services and business operations. The organization utilizing the outsourced services is
considered the user entity, and the outside organization providing services is known as the
service organization. A service organization provides the user entity with the benefits of its
personnel, expertise, equipment, and technology to operate tasks and functions that the user
entity wishes to outsource.
Examples of the types of services provided by service organizations:
Outsourced Payroll Processors: Service organizations that provide payroll services to
user entities.
Cloud Service Providers: Third-party organizations offering a cloud-based platform,
infrastructure, application, or storage services.
Credit Card Processing Organizations: Companies that process payments for merchants
by offering an infrastructure that routes payment from customer banks or financial
institutions to retailers.
Enterprise IT Outsourcing Services: IT-managed service providers that manage, operate,
and maintain user entities’ IT data centers, infrastructure, and application systems.
Financial Technology (FinTech) Services: Financial institutions that provide IT-based
transaction processing services such as servicing loans, payment processing, and
asset management.
Customer Support: Organizations that provide customers of user entities online or
telephonic customer support and service management.
User entities and business partners, entities with which another commercial entity has some
form of alliance such as their external auditor, usually need information about the design,
operation, and effectiveness of controls within the service organization’s system. To support risk
assessment procedures, user entities may request a System and Organizational Controls (SOC)
report from the service organization. An independent CPA, referred to as the service auditor,
performs a SOC examination in accordance with attestation standards issued by the American
Institute of Certified Public Accountants (AICPA).
© Becker Professional Education Corporation. All rights reserved. Module 1 S4–3 SOC Enga
1 SOC Engagement Categories and Types ISC 4
There are three main types of SOC engagements including SOC 1®, SOC 2®, and SOC 3®:
SOC 1® for Service Organizations: Internal Control over Financial Reporting (SOC 1®
engagement). The examination and reporting on controls at a service organization that are
likely to be relevant to user entities’ internal control over financial reporting.
SOC 1® reports are restricted to management of the service organization, user entities of the
service organization’s system, and the independent auditors of such user entities. It does
not include potential users of the service organization.
SOC 2® for Service Organizations: Trust Services Criteria (SOC 2® engagement). The
examination and reporting on the security, availability, or processing integrity of a system,
or the confidentiality or privacy of the information processed by the system (the AICPA’s five
trust services categories).
SOC 2® reports are intended for use by those who have sufficient knowledge and
understanding of the service organization, the services it provides, and the system used to
provide those services, among other matters. Management and the service auditor should
agree on the intended users of the report (specified parties).
The expected knowledge of specified parties ordinarily includes the following:
y The nature of the service provided by the user organization
y Service organization’s system interactions with user entities, subservice organizations,
and other parties
y Internal control and its limitations
y Complementary user entity controls
y Complementary subservice organizational controls
y User entity responsibilities and their impact to effectively use the service
organization’s services
y The applicable trust services criteria
y The risks that may impact the service organization’s service commitments and system
requirements, and how controls address those risks
SOC 3® for Service Organizations: Trust Services Criteria for General Use Report
(SOC 3® engagement). Similar to the requirements and guidance for performing a SOC
2® engagement, the service auditor reports on whether controls within the system
were effective to provide reasonable assurance that the service organization’s service
commitments and system requirements were achieved based on the applicable trust
services criteria. The reporting requirements are different from a SOC 2® report; a SOC 3®
report does not include a description of the system (detailed controls within the system are
not disclosed), a description of the service auditor’s tests of controls, and the results thereof.
A SOC 3® report is ordinarily for general users who need assurance about the controls at a
service organization relevant to security, availability, processing integrity, confidentiality, or
privacy, but lack the knowledge and understanding for a SOC 2® report.
Other SOC engagements include the following:
SOC for Cybersecurity Engagement: Examine and report on a description of the entity’s
cybersecurity risk management program and the effectiveness of controls with that program.
SOC for Supply Chain Engagement: Examine and report on an entity’s controls over the
security, availability, processing integrity, confidentiality, or privacy of a system used to
produce, manufacture, or distribute products.
Wyatt Co., a financial advising company, utilizes a third-party service provider named
Database Inc. to process its sales contracts and store information about its clients. Wyatt
Co.'s auditors want to ensure that the controls in place at Database Inc. are designed and
operating effectively because control deficiencies at Database Inc. would negatively affect
Wyatt Co. and its clients. Wyatt Co.'s auditors gain comfort by obtaining and reviewing
the attestation to fairness of the controls and their operations within the System and
Organization Controls (SOC 1®) Type 2 report because it gives them assurance that this has
been in place over the last six months.
© Becker Professional Education Corporation. All rights reserved. Module 1 S4–5 SOC Enga
1 SOC Engagement Categories and Types ISC 4
Pass Key
© Becker Professional Education Corporation. All rights reserved. Module 1 S4–7 SOC Enga
1 SOC Engagement Categories and Types ISC 4
SOC 2® engagement:
Type 1: Same subject matter as a Type 2 SOC 2® engagement; however, a Type 1 SOC
2® report does not contain an opinion on the operating effectiveness of controls nor a
detailed description of tests of controls performed by the service auditor and the results of
those tests.
Type 2: The suitability of design and operating effectiveness of controls included in
management’s description of a service organization’s system relevant to one or more of
the trust services criteria over security, availability, processing integrity, confidentiality,
or privacy throughout a specified period to achieve the entity’s objectives based on those
criteria. A Type 2 SOC report includes an opinion on the operating effectiveness of controls,
and a detailed description of tests of controls performed by the service auditor and the
results of those tests.
SOC 3® engagement—the design and operating effectiveness of a service organization’s
controls over a system relevant to one or more of the trust services criteria over security,
availability, processing integrity, confidentiality, and privacy. A SOC 3® report contains
an opinion on the operating effectiveness of controls but does not include a detailed
description of tests of controls performed by the service auditor and the results of
those tests.
The suitability of design and operating effectiveness of controls of an entity, other than a
service organization, over one or more systems relevant to one or more of the trust services
categories of security, availability, processing integrity, confidentiality, or privacy (e.g., a SOC
for supply chain engagement).
The suitability of the design of an entity’s controls over security, availability, processing
integrity, confidentiality, or privacy to achieve the entity’s objectives based on the related
trust services criteria.
© Becker Professional Education Corporation. All rights reserved. Module 1 S4–9 SOC Enga
1 SOC Engagement Categories and Types ISC 4
15. The entity communicates with external parties regarding matters affecting the functioning
of internal control.
3.2 Alignment of the Trust Services Criteria and the COSO Principles
The trust services criteria consist of:
criteria common to all five of the trust services categories (common criteria); and
additional specific criteria for the availability, processing integrity, confidentiality, and
privacy categories.
3.2.1 Overview
Trust Services Common Additional Category-
Category Criteria Specific Criteria
N/A, common criteria is suitable
Security
with no additional criteria
Availability A series
Processing
PI series
Integrity
Confidentiality C series
Privacy P series
© Becker Professional Education Corporation. All rights reserved. Module 1 S4–11 SOC Enga
1 SOC Engagement Categories and Types ISC 4
NOTES
Reporting on SOC
Engagements: Part 1 ISC 4
The service auditor should form an opinion about the subject matter of the engagement. When
forming the opinion, the service auditor should evaluate:
the sufficiency and appropriateness of the evidence obtained; and
whether uncorrected misstatements, individually or in the aggregate, are material.
In a SOC engagement, the service auditor forms an opinion about whether the subject matter
is in accordance with (or based on) the criteria, in all material respects, or the assertion is fairly
stated in all material respects. The opinion of the service auditor focuses on:
Fair presentation of management’s description of the service organization’s system.
The suitability of the design of the controls related to the control objectives stated in
management’s description.
The effective operation of the controls stated in management’s description (Type 2 only).
The overall objectives of a SOC 1® and SOC 2® engagement are consistent, however, the subject
matter for which an opinion is being formed is different. In a SOC 1® engagement, the service
auditor forms an opinion regarding the controls at a service organization relevant to the user
entities’ internal control over financial reporting. In a SOC 2® engagement, the service auditor
forms an opinion regarding the controls at a service organization relevant to one or more of the
five trust services criteria, which include security, availability, processing integrity, confidentiality,
and privacy.
When a service auditor concludes a SOC 1® or SOC 2® engagement, the report will contain the
service auditor’s opinion pertaining to the controls examined. The service auditor reaches his or
her opinion by determining whether:
The description of the controls is presented fairly by management.
The controls are designed effectively.
The controls operate as intended over a specified period of time (Type 2 only).
The opinions of the service auditor in a SOC engagement depend on the facts and circumstances
of the evidence gathered throughout the engagement and may include an:
unmodified (unqualified) opinion;
qualified opinion;
adverse opinion; or
disclaimer of an opinion.
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–13 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
The service auditor’s opinion should be modified, and the service auditor’s report should include
a description of the matter or matters giving rise to the modification, if the service auditor
concludes any of the following:
SOC 1® engagement:
y Management’s description of the service organization’s system is not fairly presented, in
all material respects.
y The controls are not suitably designed to provide reasonable assurance that the control
objectives stated in management’s description of the service organization’s system
would be achieved if the controls operated effectively, in all material respects.
y The controls did not operate effectively throughout the specified period to achieve
the related control objectives stated in management’s description of the service
organization’s system, in all material respects (Type 2 only).
y The service auditor is unable to obtain sufficient and appropriate evidence.
SOC 2® engagement:
y Management’s description of the service organization’s system does not present the
system designed and implemented throughout the period in accordance with the
description criteria, in all material respects.
y The controls are not suitably designed to provide reasonable assurance that the service
organization’s service commitments and system requirements would be achieved
based on the applicable trust services criteria if the controls operated effectively, in all
material respects.
y The controls did not operate effectively throughout the specified period to provide
reasonable assurance that the service organization’s service commitments and system
requirements were achieved based on the applicable trust services criteria, in all
material respects (Type 2 only).
y The service auditor is unable to obtain sufficient and appropriate evidence.
The service auditor determines whether a qualified opinion, an adverse opinion, or a disclaimer
of opinion is appropriate depending on the following:
The nature of the matter giving rise to the modification (that is, whether the subject matter
of the engagement is presented in accordance with [or based on] the criteria, in all material
respects, or, in the case of an inability to obtain sufficient appropriate evidence, may be
materially misstated).
The service auditor’s professional judgment about the pervasiveness of the effects, or
possible effects, of the matter on the subject matter of the engagement.
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–15 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–17 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–19 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–21 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–23 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
Inherent A description of the inherent limitations of controls, including that projecting to the
Limitations future any evaluation of the fairness of the presentation of management’s description
of the service organization’s system or conclusions about the suitability of the design or
operating effectiveness (Type 2) of the controls to achieve the related control objectives
is subject to the risk that controls at a service organization may become ineffective.
Description of A reference to a description of the service auditor’s tests of controls and the results,
Tests of Controls including:
(Type 2 only) The controls that were tested.
Whether the items tested represent all or a selection of items in the population.
The nature of the tests in sufficient detail for user auditors to determine the effect of
such tests on their risk assessment.
Any identified deviations in the operation of controls included in the description,
the extent of testing performed by the service auditor that identified deviations
(including the number of items tested), and the number and nature of deviations
noted (even if, on the basis of tests performed, the service auditor concludes that
the related control objective was achieved).
Description of When applicable, if the work of the internal audit function has been used in a test
Tests of Controls of controls to obtain evidence, a description of the internal auditor’s work and the
(Type 2 only) service auditor’s procedures with respect to that work.
(continued)
Other Matter A statement that the service auditor did not perform any procedures regarding the
(Type 1 only) operating effectiveness of controls and, therefore, expresses no opinion thereon.
Opinion The service auditor’s opinion on whether, in all material respects, based on the criteria
described in management’s assertion:
Management’s description of the service organization’s system fairly presents
the service organization’s system that was designed and implemented as of the
specified date (Type 1) or throughout the specified period (Type 2).
The controls related to the control objectives stated in management’s description
of the service organization’s system were suitably designed to provide reasonable
assurance that the control objectives would be achieved if the controls operated
effectively as of the specified date (Type 1) or throughout the specified period
(Type 2).
The controls operated effectively to provide reasonable assurance that the control
objectives stated in management’s description of the service organization’s system
were achieved throughout the specified period (Type 2 only).
If the application of complementary user entity controls is necessary to achieve
the related control objectives stated in management’s description of the service
organization’s system, a statement to that effect.
If the application of complementary subservice organization controls is necessary
to achieve the related control objectives stated in management’s description of the
service organization’s system, a statement to that effect.
Restricted Use An alert, in a separate paragraph, that restricts the use of the report. The alert should
state:
The report, including the description of tests of controls and results (Type 2),
is intended solely for the information and use of management of the service
organization, user entities of the service organization’s system as of the specified
date (Type 1) or during some or all of the period covered by the report (Type 2), and
the auditors who audit and report on such user entities’ financial statements or
internal control over financial reporting.
The report is not intended to be, and should not be, used by anyone other than the
specified parties.
Service Auditor’s The manual or printed signature of the service auditor’s firm.
Signature
Service Auditor’s The city and state where the service auditor practices.
City and State
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–25 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
Pass Key
(continued)
(continued)
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–27 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
(continued)
Other Matter
We did not perform any procedures regarding the operating effectiveness of
controls stated in the description and, accordingly, do not express an opinion
thereon.
Opinion
In our opinion, in all material respects, based on the criteria described in XYZ
Service Organization’s assertion:
a. The description fairly presents the [type or name of] system that was designed
and implemented as of [date].
b. The controls related to the control objectives stated in the description were
suitably designed to provide reasonable assurance that the control objectives
would be achieved if the controls operated effectively as of [date].
Restricted Use
This report is intended solely for the information and use of management of XYZ
Service Organization, user entities of XYZ Service Organization’s [type or name
of] system as of [date], and their auditors who audit and report on such user
entities’ financial statements or internal control over financial reporting and have
a sufficient understanding to consider it, along with other information, including
information about controls implemented by user entities themselves, when
assessing the risks of material misstatement of user entities’ financial statements.
This report is not intended to be, and should not be, used by anyone other than
the specified parties.
[Service auditor’s signature]
[Service auditor’s city and state]
[Date of the service auditor’s report]
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–29 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
(continued)
(continued)
(continued)
Opinion
In our opinion, in all material respects, based on the criteria described in XYZ
Service Organization’s assertion:
a. The description fairly presents the [type or name of] system that was designed
and implemented throughout the period [date] to [date].
b. The controls related to the control objectives stated in the description were
suitably designed to provide reasonable assurance that the control objectives
would be achieved if the controls operated effectively throughout the period
[date] to [date].
c. The controls operated effectively to provide reasonable assurance that the
control objectives stated in the description were achieved throughout the
period [date] to [date].
Restricted Use
This report, including the description of tests of controls and results thereof in
[section number where the description of tests of controls is presented], is intended
solely for the information and use of management of XYZ Service Organization,
user entities of XYZ Service Organization’s [type or name of] system during some
or all of the period [date] to [date], and their auditors who audit and report on
such user entities’ financial statements or internal control over financial reporting
and have a sufficient understanding to consider it, along with other information,
including information about controls implemented by user entities themselves,
when assessing the risks of material misstatement of user entities’ financial
statements. This report is not intended to be, and should not be, used by anyone
other than the specified parties.
[Service auditor’s signature]
[Service auditor’s city and state]
[Date of the service auditor’s report]
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–31 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
Scope An identification or description of the subject matter or assertion being reported on,
including the point in time or period of time (Type 2) to which the measurement or
evaluation of the subject matter or assertion relates.
Any services provided by, along with controls at, a subservice organization and
whether the carve-out method or the inclusive method was used in relation to them.
An identification of the criteria against which the subject matter was measured or
evaluated:
In a SOC 2® engagement, the description is evaluated against the description criteria
and the suitability of design and operating effectiveness of controls (Type 2) is
evaluated against the trust services criteria relevant to the categories addressed by
the engagement (applicable trust services criteria).
A reference to both sets of criteria should be included in the scope paragraph of the
service auditor’s report.
Service A statement that identifies the responsible party and its responsibility for the subject
Organization’s matter in accordance with (or based on) the criteria or for its assertion.
Responsibilities
Service Auditor’s A statement that the service auditor’s responsibility is to express an opinion on the
Responsibilities subject matter or assertion, based on the service auditor’s examination.
A statement that:
The service auditor’s examination was conducted in accordance with attestation
standards established by the AICPA.
Those standards require that the service auditor plan and perform the examination
to obtain reasonable assurance about whether the subject matter is in accordance
with the criteria, in all material respects.
The service auditor believes the evidence the service auditor obtained is sufficient
and appropriate to provide a reasonable basis for the service auditor’s opinion.
A description of the nature of an examination engagement.
Inherent A statement that describes significant inherent limitations, if any, associated with the
Limitations measurement or evaluation of the subject matter against the criteria.
Description of Tests A description of the procedures performed by the service auditor and the results of
of Controls (Type 2 those procedures.
only)
Other Matter A statement that the service auditor did not perform any procedures regarding the
(Type 1 only) operating effectiveness of controls stated in the description and, accordingly, does not
express an opinion thereon.
Opinion The service auditor’s opinion about whether the subject matter is in accordance with
(or based on) the criteria, in all material respects.
Restricted Use An alert, in a separate paragraph, that restricts the use of the report and should:
State that the service auditor’s report is intended solely for the information and use
of the specified parties.
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–33 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
Restricted Use Identify the specified parties for whom use is intended.
(continued) State that the report is not intended to be, and should not be, used by anyone other
than the specified parties.
Service auditor’s The manual or printed signature of the service auditor’s firm.
signature
Service auditor’s The city and state where the service auditor practices.
city and state
Pass Key
5.1.3 Sample Report: Service Auditor’s Report for a SOC 2® Type 1 Engagement
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–35 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
(continued)
(continued)
(continued)
Restricted Use
This report is intended solely for the information and use of XYZ, user entities
of XYZ’s [type or name] system as of [date], business partners of XYZ subject
to risks arising from interactions with the [type or name] system, practitioners
providing services to such user entities and business partners, prospective user
entities and business partners, and regulators who have sufficient knowledge and
understanding of the following:
The nature of the service provided by the service organization
How the service organization’s system interacts with user entities, business
partners, subservice organizations, and other parties
Internal control and its limitations
User entity responsibilities and how they may affect the user entity’s ability to
effectively use the service organization’s services
The applicable trust services criteria
The risks that may threaten the achievement of the service organization’s
service commitments and system requirements and how controls address
those risks
This report is not intended to be, and should not be, used by anyone other than
these specified parties.
[Service auditor’s signature]
[Service auditor’s city and state]
[Date of the service auditor’s report]
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–37 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
5.1.4 Sample Report: Service Auditor’s Report for a SOC 2® Type 2 Engagement
(continued)
(continued)
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 2 S4–39 Reporting
2 Reporting on SOC Engagements: Part 1 ISC 4
(continued)
Opinion
In our opinion, in all material respects,
a. The description presents XYZ’s [name or type] system that was designed and
implemented throughout the period [date] to [date] in accordance with the
description criteria.
b. The controls stated in the description were suitably designed throughout
the period [date] to [date] to provide reasonable assurance that XYZ’s service
commitments and system requirements would be achieved based on the
applicable trust services criteria if its controls operated effectively throughout
that period.
c. The controls stated in the description operated effectively throughout the
period [date] to [date] to provide reasonable assurance that XYZ’s service
commitments and system requirements were achieved based on the
applicable trust services criteria.
Restricted Use
This report, including the description of tests of controls and results thereof in
section XX, is intended solely for the information and use of XYZ, user entities
of XYZ’s [type or name] system during some or all of the period [date] to [date],
business partners of XYZ subject to risks arising from interactions with the [type or
name] system, practitioners providing services to such user entities and business
partners, prospective user entities and business partners, and regulators who
have sufficient knowledge and understanding of the following:
The nature of the service provided by the service organization
How the service organization’s system interacts with user entities, business
partners, subservice organizations, and other parties
Internal control and its limitations
User entity responsibilities and how they may affect the user entity’s ability to
effectively use the service organization’s services
The applicable trust services criteria
The risks that may threaten the achievement of the service organization’s
service commitments and system requirements and how controls address
those risks
This report is not intended to be, and should not be, used by anyone other than
these specified parties.
[Service auditor’s signature]
[Service auditor’s city and state]
[Date of the service auditor’s report]
Reporting on SOC
Engagements: Part 2 ISC 4
When conducting a SOC engagement, the service auditor may need to consider outsourced
functions that are performed for the service organization by other organizations. For SOC 1®
engagements, a vendor used by a service organization is considered a subservice organization if:
The services provided by the vendor are likely relevant to user entities' internal control over
financial reporting.
Controls implemented at the subservice organization are necessary to achieve the control
objectives stated in management's description of the service organization's system. These
controls are referred to as complementary subservice organization controls (CSOCs).
For SOC 2® and SOC 3® engagements, a vendor used by a service organization is considered a
subservice organization only if:
The services provided by the vendor are relevant to report users’ understanding of the
service organization’s system as it relates to the applicable trust services criteria.
Controls at the subservice organization are necessary, in combination with the service
organization’s controls, to provide reasonable assurance that the service commitments and
system requirements are achieved. These controls are referred to as CSOCs.
A subservice organization may be a separate entity that is external to the service organization
or may be a related entity, such as a subsidiary of the parent company that owns the service
organization. Service organization management is responsible for determining whether it uses a
subservice organization.
If the service organization uses a subservice organization, management is responsible for
determining whether to carve out or include the subservice organization’s controls within the
scope of the engagement. The two methods are defined as follows:
Carve-out Method: Method of addressing the services provided by a subservice
organization in which the CSOCs of the subservice organization are excluded from the
description of the service organization’s system and from the scope of the engagement.
This method identifies:
1. The nature of the services performed by the subservice organization.
2. The types of controls expected to be performed at the subservice organization that
are necessary, in combination with controls at the service organization, to provide
reasonable assurance that the control objectives stated in management's description
of the service organization's system (SOC 1®) or the service organization's service
commitments and system requirements (SOC 2®) were achieved. These may include
logical access controls, controls relevant to the completeness and accuracy of
processing transactions, or controls relevant to accurate and complete reporting.
3. The controls at the service organization used to monitor the effectiveness of the
subservice organization’s controls.
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–41 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
The ability of the intended users of the report to obtain sufficient appropriate
evidence about the design and, in a Type 2 engagement, the operating effectiveness
of controls at the subservice organization (e.g., the availability of a SOC report for the
subservice organization).
When the subservice organization’s services and controls have a pervasive effect on the service
organization’s system, management would not be able to use the carve-out method.
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–43 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
A service organization’s controls are usually able to provide reasonable assurance that the
service organization’s service commitments or system requirements were achieved without the
implementation of CUECs because the service organization restricts its service commitments
and system requirements to those matters that are its responsibility and that it can reasonably
perform.
Example 1 CUEC
For SOC 1® reports, any relevant CUECs that ensure control objectives are met should be
described in the system description. It is recommended that a statement be made, if applicable,
that a service organization’s controls could only be achieved if CUECs are designed and
operating effectively.
For SOC 2® reports, a service organization’s system descriptions should also include relevant
CUECs and a statement that user entities are responsible for those controls. The report should
also state that the engagement did not include an evaluation of whether the CUECs were
evaluated for design suitability or operating effectiveness.
SOC 2® reports should also include language about how CUECs interact with the service
organization’s controls. In some cases, separate SOC 2® reports may exist for subservice
organizations that outline relevant CUECs and potentially fall within the scope of the service
entity’s controls.
Pass Key
1.1.3 Sample Report: SOC 1® Type 2 Report (Service Organization Uses Carve-
out Method for Subservice Organization, Service Organization Requires
Complementary User Entity Controls and Complementary Subservice
Organization Controls)
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–45 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
(continued)
1.1.4 Sample Report: SOC 1® Type 2 Report (Using the Inclusive Method,
Complementary User Entity Controls Are Required)
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–47 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
(continued)
(continued)
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–49 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
1.1.5 Sample Report: Service Auditor’s SOC 2® Report for a Type 2 Engagement
(Carved-out Controls of a Subservice Organization and Complementary
Subservice Organization and Complementary User Entity Controls)
(continued)
(continued)
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–51 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
(continued)
1.1.6 Sample Report: Service Auditor’s SOC 2® Report for a Type 2 Engagement
(Subservice Organization Presented Using the Inclusive Method and
Complementary User Entity Controls)
(continued)
(continued)
(continued)
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–53 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
(continued)
The service auditor’s report will need to be modified accordingly when a modified opinion is
necessary based on the professional judgment of the service auditor.
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–55 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
When the service auditor has determined that a qualified opinion is appropriate because of
material misstatements or deficiencies, the service auditor’s SOC 2® report will include:
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–57 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
When the service auditor has determined that an adverse opinion is appropriate, the service
auditor’s SOC 1® report will include:
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–59 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
Adverse Opinion The controls tested, which were those necessary to provide reasonable
assurance that the control objectives stated in the description were
(continued)
achieved, did not operate effectively throughout the period from [date]
to [date].
Restricted Use Same as standard SOC 1® report.
Service Auditor’s Same as standard SOC 1® report.
Signature
Service Auditor’s Same as standard SOC 1® report.
City and State
Date of the Same as standard SOC 1® report.
Service Auditor’s
Report
When the service auditor has determined that an adverse opinion is appropriate, the service
auditor’s SOC 2® report will include:
Adverse Opinion A separate paragraph, before the opinion paragraph, that provides a clear
explanation of the matters giving rise to the modification.
In addition, the service auditor’s opinion paragraph should be amended
as follows:
In our opinion, because of the significance of the matter(s) referred to in
the preceding paragraph, in all material respects:
a. The description of the [name or type] system does not present the
system that was designed and implemented throughout the period
[date] to [date] in accordance with the description criteria.
b. The controls stated in the description were not suitably designed
throughout the period [date] to [date] to provide reasonable
assurance that the service organization’s service commitments and
system requirements would be achieved based on the applicable
trust services criteria.
c. The controls stated in the description did not operate effectively
throughout the period [date] to [date] to provide reasonable
assurance that the service organization’s service commitments and
system requirements were achieved based on the applicable trust
services criteria.
Restricted Use Same as standard SOC 2® report.
Service Auditor’s Same as standard SOC 2® report.
Signature
Service Auditor’s Same as standard SOC 2® report.
City and State
Date of the Same as standard SOC 2® report.
Service Auditor’s
Report
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–61 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
2.4.1 The Description Includes Controls That Have Not Been Implemented
The below language is an example of a separate paragraph that would be added when the
description includes controls that have not been implemented:
The accompanying description of the XYZ System states that Example Service Organization
uses operator identification numbers and passwords to prevent unauthorized access to its
system. Our testing determined that operator identification numbers and passwords are
used in applications A and B, but are not used in applications C and D.
The accompanying description of ABC Service Organization’s system states on page 8 that
ABC Service Organization’s system supervisor makes changes to the systems only if the
changes are authorized, tested, and documented. The procedures, however, do not include
a requirement for approval of the change before the change is placed into operation. As a
result, controls were not suitably designed or operating effectively throughout the period
[date] to [date] to provide reasonable assurance that the service organization’s service
commitments and system requirements were achieved based on trust services criterion
CC8.1, The entity authorizes, designs, develops or acquires, configures, documents, tests,
approves, and implements changes to infrastructure, data, software, and procedures to
meet its objectives.
© Becker Professional Education Corporation. All rights reserved. Module 3 S4–63 Reporting
3 Reporting on SOC Engagements: Part 2 ISC 4
NOTES
4
MODULE
Assessment in a SOC
Engagement ISC 4
The service auditor, when auditing the service organization, is required to establish, prior to
acceptance of the SOC engagement, an understanding with service organization management
about its responsibilities and the responsibilities of the service auditor. The decisions a service
organization’s management makes prior to engaging the service auditor can affect the nature,
extent, and timing of procedures the service auditor performs.
The service auditor should also establish communication with management of the service
organization. The service auditor should determine the appropriate person(s) within the service
organization’s management or governance structure with whom to interact. This should include
the service auditor’s consideration of which person(s) has the appropriate responsibilities for,
and knowledge of, the relevant matters.
Selecting the criteria to be used, stating them in the assertion, and determining that the
criteria are appropriate for management’s purposes.
Specifying and stating the control objectives, whether any control objectives are specified by
law, regulation, or another party, including the party specifying the control objectives.
Identifying the risks that threaten the achievement of the stated control objectives and
designing, implementing, and documenting controls that are suitably designed and
operating effectively to provide reasonable assurance that stated control objectives will
be met.
Preparing a written assertion that accompanies management’s description of the service
organization’s system and providing both to the user entities.
Providing the service auditor with access to all relevant information (records,
documentation, service-level agreements, internal audit, or other reports), additional
information that the service auditor may request, and personnel to obtain relevant
evidence.
Providing the service auditor with written representations at the conclusion of
the engagement.
If the service auditor plans to use internal auditors to provide direct assistance, providing
the service auditor with written acknowledgment that internal auditors providing direct
assistance to the service auditor will be allowed to follow the service auditor’s instructions
and that the service organization will not intervene in the work the internal auditor performs
for the service auditor.
Disclosing to the service auditor:
y Incidents of noncompliance with laws and regulations, fraud, or uncorrected
misstatements that are clearly not trivial and that may affect one or more user entities
and whether such incidents have been communicated appropriately to affected
user entities.
y Knowledge of any actual, suspected, or alleged intentional acts that could adversely
affect the presentation of the description of the service organization’s system, or the
completeness or achievement of the control objectives stated in the description.
y Any deficiencies in the design of controls of which management is aware.
y All instances in which controls have not operated as described.
y Any events subsequent to the period covered by the description of the service
organization’s system, up to the date of the service auditor’s report, that could have a
significant effect on management’s assertion.
During planning of SOC 2® and SOC 3® engagements, the service auditor is also responsible for:
Establishing an overall strategy for the engagement.
Sets the scope, timing, and direction of the engagement and guides the development of the
engagement plan, including the consideration of materiality and the identification of the
risks of material misstatement (SOC 2®).
Performing risk assessment procedures.
Includes understanding of the service organization’s system and how the system controls
were designed, implemented, and operated to provide reasonable assurance that the
service organization’s service commitments and system requirements are achieved based
on the applicable trust services criteria (SOC 2®).
The service organization is responsible for implementing general IT controls. The service
organization’s application controls cannot function without the underlying general IT
controls; therefore, the general IT controls would be considered material to the description
of the service organization’s system and would be included in the service organization’s
description of its system.
Brown Corp., a service organization that provides server hosting for the user entity’s emails,
included the following controls in its description:
Secured room with locks and a security system where email data is stored
and maintained
Backup power system for when power outages occur
Daily file backups to external servers in another state
It was determined that the security system included in the description was never
implemented by the service organization, which would compromise the operating
effectiveness of the organization’s controls to ensure that the email data is safely stored.
This control that was not implemented may affect the relevance of design controls, as
unauthorized personnel may have access to email data since the security system was
not implemented.
CompuGain Inc. is a payment processing company that allows its clients to process
payments using credit cards, debit cards, and mobile phones over its payment network.
Retail Xtra Co. signs up with CompuGain because of the payment processor’s ability to
maintain consumer privacy when processing transactions over its network. Due to the
focus on the trust services criterion of Privacy, Retail Xtra ensures that the following
stipulations (service requirements) are outlined in its service-level agreement:
CompuGain will obtain a customer’s consent before processing a payment and
transferring information.
CompuGain will provide a brief privacy notice to customers prior to completing a
transaction at the time of purchase.
CompuGain will respond to requests from Retail Xtra’s customers regarding past
transactions within 10 days of receiving the request.
Service auditors may accomplish risk assessment procedures through the performance of a
walk-through. Additionally, risk assessment procedures may be performed concurrently with
procedures performed to obtain information about whether the system description is presented
in accordance with the description criteria and whether the controls were suitably designed and
operated effectively to meet the control objectives.
The service auditor should also perform risk assessment procedures to identify any fraud risk
or risk of noncompliance with laws or regulations. Risks could include management override
of controls, misappropriation of assets, or the creation of false or misleading documents
or records.
Performing SOC
Engagements ISC 4
1 Overview
Once the service auditor has accepted the engagement and completed the initial planning and
risk assessment, the next phase of the engagement involves obtaining an understanding of the
system defined by the service organization, performing tests of controls and obtaining evidence,
and the consideration of subsequent events.
Key areas of engagement performance once initial risk assessment procedures are complete:
1. Respond to the assessed risks.
2. Evaluate whether management’s description of the service organization’s system is fairly
presented in accordance with the description criteria.
3. Obtain and evaluate evidence regarding the suitability of the design of controls.
4. Obtain and evaluate evidence regarding the operating effectiveness of controls
(Type 2 only).
5. Evaluate the results of the procedures.
6. Form the opinion.
The service auditor is required to obtain sufficient audit evidence to reduce attestation risk to an
acceptably low level. This evidence enables the service auditor to obtain reasonable assurance
and to draw conclusions on which to base the service auditor’s opinion.
When performing a SOC engagement, the service auditor is required to design and implement
overall responses to address the assessed risks of material misstatement for the subject matter;
and design and perform further procedures whose nature, extent, and timing are based on, and
responsive to, the assessed risks of material misstatement.
Assessment of the risks of material misstatement is impacted by several factors, including:
materiality considerations;
the service auditor’s understanding of the effectiveness of the control environment; or
other components of internal control related to the service provided to user entities and
business partners.
The control environment or other components of the system of internal control may impact
the effectiveness of specific system controls. Ineffective aspects of the control environment or
other components of the service organization’s system of internal control may cause the service
auditor to design and perform further procedures whose nature, extent, and timing are based
on, and responsive to, the higher assessed risks related to the ineffective aspects of the control
environment or other components of internal control.
The service auditor observes a business process that rewards employees with a
compensation incentive for reaching targeted outcomes. If the service auditor assesses
a high risk of manipulation of controls to misstate the actual outcomes, due to the
employees’ desire to reach the incentive, it is likely that the service auditor will increase the
testing of controls, the sample population used for testing, or both.
Overall responses by the service auditor to address the assessed risks of material misstatement
may include:
Maintaining a culture of professional skepticism with the engagement team.
Assigning more experienced staff or using specialists as needed.
Providing additional supervision over audit procedures.
Incorporating elements of unpredictability in the selection of procedures to be performed.
Making changes to the nature, extent, or timing of procedures (e.g., selecting different types
of procedures, or changing the extent and timing of those procedures).
y The procedures, within both automated and manual systems, by which services
are provided.
y The information used in the performance of the procedures, including, if applicable,
related accounting records and supporting information involved in initiating,
authorizing, recording, processing, and reporting transactions.
y How the service organization’s system captures and addresses significant events and
conditions other than transactions.
y The process used to prepare reports and other information for user entities.
y Services performed by a subservice organization.
y The specified control objectives and controls designed to achieve those objectives.
y Other aspects of the service organization’s control environment, risk assessment
process, information and communications, control activities, and monitoring activities
that are relevant to the services provided.
Whether management’s description of the service organization’s system includes relevant
details of changes to the service organization’s system during the period covered by the
description (Type 2 only).
Whether management’s description of the service organization’s system does not omit
or provide misleading information relevant to the service organization’s system, while
acknowledging that management’s description of the service organization’s system is
prepared to meet the common needs of a broad range of user entities and their auditors,
and may not include every aspect of the service organization’s system that each individual
user entity may consider important in its own particular environment.
The service auditor should also consider and assess the adequacy of the level of detail of the
description, the nature of the user entities, and available documentation from the service
organization such as a policy and procedures manual, legal contracts, and any process narratives.
Through inquiries and other procedures, the service auditor should also determine whether the
service organization’s system has been implemented.
3.2 SOC 2®: Evaluating Whether the Description Presents the System
That Was Designed and Implemented in Accordance With the
Description Criteria
The service auditor should obtain and read the description of the service organization’s system
and perform procedures to determine whether the description is presented in accordance
with the description criteria. Determining whether the description of a service organization’s
system is presented in accordance with the description criteria involves comparing the service
auditor’s understanding of the service provided to user entities to the system through which
service is provided based on the trust services category or categories included in the scope of
the engagement.
A description of a service organization’s system in a SOC 2® engagement is presented in
accordance with the description criteria when it does the following:
Describes the system that the service organization has implemented.
Includes information about each description criterion, to the extent it is relevant to the
system being described.
Does not inadvertently or intentionally omit or distort information that is likely to be
relevant to report users’ decisions.
A description is not presented in accordance with the description criteria if:
the description states or implies that certain IT components exist when they do not;
the description states or implies that certain processes and controls have been
implemented when they are not being performed; or
the description contains statements that cannot be objectively evaluated.
Determining whether the description is presented in accordance with the description criteria
also involves evaluating whether each stated control has been implemented. A control has been
implemented when it has been placed into operation. If a service auditor concludes that certain
controls stated in the description have not been implemented, the service auditor may request
that the service organization delete those controls from the description. If management does
not modify the description accordingly, the service auditor should consider the impact on his or
her conclusion about the description and on the presentation of the service auditor’s report.
Reading documents to understand the service organization’s risk governance structure and
processes (board minutes, organization charts, communications).
Reading documents to understand the organization’s process for communicating
responsibilities for system security to service organization personnel (employee handbooks,
code of conduct).
Reading internal audit reports, third-party assessments, audit committee presentations, and
other documentation related to the service organization’s monitoring activities.
Reading sample contracts with subservice organizations and vendors.
Reading incident response and recovery plan documentation to understand the service
organization’s processes for recovering from identified system events.
In addition to obtaining evidence that the description presents the system that was designed
and implemented in accordance with the description criteria, the service auditor must also
obtain evidence that the controls were suitably designed and operated effectively during the
specified period (Type 2).
If a service organization uses the inclusive method to present the services and controls of a
subservice organization, the service auditor also applies tests of controls to the controls at
the subservice organization.
The service auditor is responsible for determining the nature, extent, and timing of procedures
necessary to obtain sufficient and appropriate evidence about the operating effectiveness of
controls throughout the engagement period.
Nature: How controls are tested.
Extent: The number of procedures performed and the size of the sample.
Timing: When the controls are tested and the frequency of testing.
A combination of controls is necessary when more than one control is required to address
a risk that would prevent the service organization from achieving one or more of its service
commitments and system requirements.
y The significance of the control to the achievement of the service organization’s service
commitments and system requirements based on the applicable trust services criteria
y The extent to which audit evidence is obtained from tests of other controls that support
the achievement of those service commitments and system requirements based on the
applicable trust services criteria
Sufficient evidence is necessary to support the service auditor’s opinion and report. The service
auditor must consider all information and evidence obtained during the engagement. This
should include evidence from all sources (both internal and external) as well as evidence that
both corroborates or contradicts management’s assertions.
The absence of information should be considered by the service auditor as evidence.
If the evidence is not sufficient and appropriate based on the professional judgment of the
service auditor, additional procedures should be performed to gather additional evidence.
If the service auditor is unable to obtain necessary further evidence, the service auditor should
consider the implications for the service auditor’s opinion.
The service auditor must evaluate the results of all procedures performed and must conduct
both quantitative and qualitative analyses. Analysis must also be performed on deviations in the
operating effectiveness of controls resulting in a description that is not presented in accordance
with the description criteria or in controls that are not suitably designed or operating effectively
(Type 2 only).
When evaluating the results of procedures, the service auditor investigates the nature and cause
of any identified description misstatements and deficiencies or deviations in the effectiveness of
controls and determines the following:
Whether the identified description misstatements result in either the failure to meet
one or more of the description criteria or in a presentation that could be misunderstood
by users if the service auditor’s opinion were not modified to reflect the identified
description misstatements.
Whether identified deviations are within the expected rate of deviation and are acceptable
or whether they constitute a deficiency.
If deviations are within the expected rate of deviation, whether the procedures that have
been performed provide an appropriate basis for concluding that the control operated
effectively throughout the specified period.
Whether identified deficiencies are likely to have a pervasive effect on the achievement of
the service organization’s service commitments and system requirements based on the
applicable trust services criteria or whether they are likely to affect only one of them.
Whether:
y a previously tested control (or combination of controls) provides sufficient appropriate
evidence about whether controls operated effectively; or
y additional testing of the control or other controls is necessary to determine whether the
controls were effective throughout the period.
If the service auditor is unable to apply additional procedures to the selected items, the
service auditor should consider the reasons for this limitation and conclude on whether
those selected items are deviations from the prescribed policy or result in a limitation of
the scope of the engagement.
The magnitude of the effect of such deficiencies on the achievement of the service
organization’s service commitments and system requirements based on the applicable trust
services criteria.
Whether report users could be misled if the service auditor’s opinion were not modified to
reflect the identified deficiencies.
Considerations of any known or suspected fraud or noncompliance with laws or regulations.
If the service auditor identifies material description misstatements, material deficiencies in the
suitability of design of controls, or deviations in the operating effectiveness of controls (Type 2),
the service auditor should modify the opinion. When modifying the opinion, the service auditor’s
understanding of the nature and cause of the description misstatements and deficiencies
enables the service auditor to determine how to appropriately modify the opinion.
The service auditor should, using professional judgment, determine whether the subsequently
discovered facts, had they been known as of the report date, may have caused the service
auditor to revise the report.
The service auditor determines whether the facts existed at the date of the report and, if so,
whether persons who would attach importance to these facts are currently using, or likely to
use, the report.
The service auditor may do this through discussions with management and other appropriate
parties and through the performance of additional procedures that the service auditor
considers necessary to determine whether the description, assertion, and service auditor’s
report need revision or whether the previously issued report continues to be appropriate.
The service auditor may determine it is necessary to notify persons currently using or likely
to use the service auditor’s report depending on factors such as the time elapsed since the
date of the report and when the issuance of a subsequent report is imminent.
The service auditor is required to obtain written representations from the management
of the service organization. Such representations are intended to confirm explicit or
implicit representations given to the service auditor, indicate and document the continuing
appropriateness of those representations, and reduce the possibility of a misunderstanding
between the service auditor and management. The service auditor should determine the
appropriate individuals within the service organization’s management or governance structure
based on their responsibilities and knowledge of the subject matter of the engagement.
The written representations should be as of the date of the issued SOC report and should
address the subject matter and periods covered by the service auditor’s opinion. The service
auditor would not ordinarily be able to issue the report until the service auditor had received the
representation letter. If a subservice organization is used and the inclusive method is used for
management’s description of the system, written representations should be obtained from the
subservice organization as well.
State that any known subsequent events related to the subject matters of the report that
would have a material effect on the subject matter or assertion have been disclosed to the
service auditor.
State that management has provided the service auditor with all relevant access
and information.
State that management believes the effects of uncorrected misstatements (description
misstatements and deficiencies) are immaterial, individually and in the aggregate, to the
subject matter.
State that management has disclosed to the service auditor:
y All deficiencies in internal control relevant to the engagement of which it is aware.
y Its knowledge of any actual, suspected, or alleged fraud or noncompliance with laws or
regulations affecting the subject matter.
y All other matters deemed appropriate by the service auditor (e.g., changes to the
service organization’s controls).
y Instances of noncompliance with laws and regulations or uncorrected misstatements
attributable to the service organization (SOC 2®), including those that may affect one or
more user entities (SOC 1®).
y Knowledge of any actual, suspected, or alleged fraud by management or the service
organization’s employees that could adversely affect:
—The fairness of the presentation of management’s description of the service
organization’s system or the completeness or achievement of the control objectives
stated in the description (SOC 1®).
—The description of the service organization’s system or the achievement of the service
organization’s service commitments or system requirements (SOC 2®).
y Identified system incidents that resulted in a significant impairment of the service
organization’s achievement of its service commitments and system requirements as
of the date of the description (Type 1) or during the period of time covered by the
description (Type 2) (SOC 2®).
State that significant assumptions used in making any material estimates are reasonable
(SOC 1®).
NOTES