Trust Service Principles
SOC 2 reports focus on controls addressed by five semi-overlapping categories called ''Trust Service Principles'' which also support the CIA triad of information security: #Security #*Firewalls #*Intrusion detection #*Multi-factor authentication #Availability #*Performance monitoring #*Disaster recovery #*Incident handling #Confidentiality #*Encryption #*Access controls #*Firewalls #Processing Integrity #*Quality assurance #*Process monitoring #*Adherence to principle #Privacy #*Access control #*Multi-factor authentication #*EncryptionReporting
Levels
There are two levels of SOC reports which are also specified by SSAE 18: *Type I, which describes a service organization's systems and whether the design of specified controls meet the relevant trust principles. (Are the design and documentation likely to accomplish the goals defined in the report?) *Type II, which also addresses the operational effectiveness of the specified controls over a period of time (usually 9 to 12 months). (Is the implementation appropriate?)Types
There are three types of SOC reports. *SOC 1 – Internal Control over Financial Reporting (ICFR) *SOC 2 – Trust Services Criteria *SOC 3 – Trust Services Criteria for General Use Report Additionally, there are specialized SOC reports for Cybersecurity and Supply Chain. SOC 1 and SOC 2 reports are intended for a limited audience – specifically, users with an adequate understanding of the system in question. SOC 3 reports contain less specific information and can be distributed to the general public.References
{{reflist Understanding the SOC 2 Process in detailExternal links