What Are SOC Reports – The Basics

Introduction

System and Organization Controls (SOC) reports have become one of the most common methods for organizations to demonstrate their services and provide stakeholders assurance over their internal control environments. SOC reports can seem like a very daunting and complex endeavor for organizations to undergo. Often organizations are under pressure and tight timelines to obtain a SOC report from a customer, potential customer, investor, oversight body, etc., but they do not have personnel with SOC specific expertise or understand the benefits of obtaining one. Our goal with this article is to help inform you, generally, of the SOC report basics and the types of SOC reports an organization can obtain.

 

SOC Report in a Nutshell

A SOC report consists of a centralized description of an organization’s internal control environment that is examined and opined upon by an independent certified public accountant (CPA). Depending on the type of report, a CPA provides an opinion on the fairness of the presentation of the description, the suitability of the design of the controls included, and/or the operating effectiveness of the controls over a predetermined period. SOC reports are often referred to as SSAE 18 reports. This refers to the 18th publication of Statements on Standards for Attestation Engagements (SSAE 18) issued by the Association of International Certified Professional Accountants (AICPA) which includes governing standards for CPAs performing SOC examinations and other types of attestation engagements. However, this does not truly convey the type of report being referenced. The AICPA has established a suite of different types of SOC reports, each governed by SSAE 18, to address specific needs of varying types of organizations and their stakeholders.

 

Types of SOC reports

SOC 1 – SOC for Service Organizations: ICFR.

SOC 1 reports are obtained by service organizations who provide services likely relevant to their customers’ internal control over financial reporting (ICFR). Because of the relevance to customers’ ICFR, a service organization’s own internal controls may be required to be evaluated by their customer or their customers’ financial statement auditors. The use of SOC 1 reports is restricted to management of the service organization, its customers (users), and the financial statement auditors of its customers.

For more detailed information on SOC 1 reports please see our blog What is a SOC 1 and Do You Need One? or contact us here.

 

SOC 2 – SOC for Service Organizations: Trust Services Criteria.

SOC 2 reports are obtained by service organizations who want to demonstrate the security, availability, processing integrity, confidentiality, and/or privacy of their services. SOC 2 reports differ from SOC 1 reports in that there are preestablished sets of criteria, called Trust Services Criteria, which the service organization bases its internal controls upon, and the independent CPA evaluates the controls against. The control criteria are segregated into five categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy. The Security Category contains a base set of common criteria and is generally required to be included in any SOC 2 report. Each other category and its associated criteria are included at the discretion of the service organization and usually depend on the nature of the services offered. The use of a SOC 2 report is also restricted, however that restriction is typically applied broadly to management of the service organization and parties who have sufficient knowledge and understanding of the service organization and the content of the report. SOC 2 reports are one of the most common methods service organizations provide stakeholders assurance of their internal control environment.

For more detailed information on SOC 2 reports please see our blog What is a SOC 2 – Overview, Who Needs One, and How to Obtain a Report or contact us here.

 

SOC 3 – SOC for Service Organizations: Trust Services Criteria for General Use Report.

Similar to SOC 2 reports, a SOC 3 is intended to provide report users information and an independent CPA’s opinion regarding the security, availability, processing integrity, confidentiality, and/or privacy of the services offered. The difference exists in the intended users of the report. The SOC 3 report is unrestricted and can be used for general distribution. The content of the SOC 3 report is reduced to exclude detailed lists of controls and service auditor testing procedures to avoid an uninformed user of the report misinterpreting the information. SOC 3 reports are commonly displayed on websites and within marketing materials for organizations and can be provided freely to prospective customers. Often service organizations will obtain a SOC 3 along with their SOC 2 report.

 

SOC for Cybersecurity

In 2017 the AICPA established a cybersecurity risk management reporting framework to help organizations communicate relevant and useful information regarding the effectiveness of their cybersecurity risk management program, via a SOC for Cybersecurity report. The framework consists of description criteria for organizations to leverage while presenting information about their cybersecurity risk management programs and control criteria for organizations to use in the evaluation of the effectiveness of the cybersecurity risk management program. SOC for Cybersecurity examinations leverage the same control criteria as SOC 2 reports with respect to the Security, Availability, and Confidentiality categories but excludes Processing Integrity and Privacy categories. Similar to SOC 3 reports, a SOC for Cybersecurity report’s use is unrestricted and can be used for general distribution. The appearance of a SOC for Cybersecurity report is also similar to a SOC 3 in that it includes an assertion by management, the independent auditor’s report, and a description of the cybersecurity risk management program, however the report excludes a detailed list of controls and auditor testing procedures.

There are a few subtle but important differences between a SOC for Cybersecurity and a SOC 1/2/3. For instance, whereas the SOC 1/2/3 is obtained by service organizations, a SOC for Cybersecurity can be for any entity. Also, the scope of a SOC 1/2/3 is typically limited to a specified system (i.e. product), whereas the SOC for Cybersecurity can be an entity-wide assessment of the organization’s cybersecurity risk management program. Lastly, while the AICPA offers a framework for organizations to use when presenting the description of their cybersecurity risk management program and control criteria, organizations have the option to use a separate framework if they choose within a SOC for Cybersecurity report.

 

SOC for Supply Chain

The SOC for Supply Chain examination is the AICPA’s newest reporting framework designed to help manufacturers, producers, or distribution companies communicate information regarding their production, manufacturing, or distribution system and supply chain risk management program. The intent of the report is to provide greater transparency to allow report users to better understand and manage risks arising from business relationships with their supplier and distribution networks. A SOC for Supply Chain report is similar to a SOC 1 and SOC 2 in that it contains a detailed description of the system that is the focus of the report (presented in accordance with a framework established by the AICPA) and a list of the organization’s controls based on applicable control criteria. The SOC for Supply Chain uses the same control criteria as SOC 2. Those criteria include five basic categories included at the discretion of management: Security, Availability, Processing Integrity, Confidentiality, and/or Privacy. Also, similar to SOC 2, the SOC for Supply Chain report is restricted in its use to management and parties specified who have sufficient knowledge and understanding of the system presented so as to not misinterpret the information within the report. This essentially just means the report cannot be broadly distributed such as posted on the company website.

The SOC for Supply Chain report can be a great way for manufacturing, production, or distribution companies to differentiate themselves in the marketplace with a targeted, flexible, and voluntary compliance assessment. It can also be a key consideration by any organization to evaluate the supply chain risks associated with a current or potential business partner or vendor.

 

Conclusion

SOC reports are valuable instruments organizations can leverage to broadly distribute information regarding their services and the internal control environment associated with those services. They are also reliable reports companies can request to evaluate the control environment of their vendors and business partners. It has become a common business requirement that organizations have the ability to demonstrate their internal control environment, typically via an independent compliance assessment. Compliance assessments are now frequently included within standard business contracts as a vendor requirement. SOC reports are one of the most accepted compliance assessments across a broad spectrum of industries. SOC reports often help organizations reduce the costs associated with completing time-consuming vendor questionnaires, customer audits, and fielding a constant flow of inquiries from current or potential customers because a SOC report provides a single document that can be easily distributed to satisfy most of these customer concerns and relieve the burden on personnel.

If you have decided you have need of a SOC report, the first step is to determine what type of report will provide your organization and your customers the most benefit. A competent CPA firm can guide you in determining the type of report that is right for you. If you need help in deciding what type of report is right for your organization or have any questions about the SOC examination process, we are happy to help! Please feel free to contact us and we will connect you with one of our industry experts.

Speak to an expert!

Written By:

Dale Crump

Dale Crump is the Founder Managing Partner of AssurancePoint. Dale has over a decade of experience in information security auditing, governance, risk, compliance, and internal control frameworks. Dale is the SOC examination practice lead at AssurancePoint and has personally contributed to the issuance of hundreds of audit reports for companies in various industries including healthcare, financial technology, information privacy, legal, gaming, managed services, marketing, logistics, etc. Dale is a strong advocate of advancing quality in the security and compliance industry and delivering value to his clients. Dale is licensed certified public accountant (CPA) and also hold various other industry and security specific certifications including Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Privacy Professional (CIPP), Certificate of Cloud Security Knowledge (CCSK), ISO 27001 Lead Auditor, Advanced SOC for Service Organizations credential, among others. Dale is active member of the AICPA, Georgia Society of CPAs, ISACA, ISC2, and the IAPP.
Security Events vs. Security Incidents

Security Events vs. Security Incidents

In the world of cybersecurity, a common misunderstanding often exists within organizations - the distinction between security events and security incidents. We audit a lot of organizations’ incident management protocols, and the lack of a distinction between event...

How to Evaluate Auditors 2

How to Evaluate Auditors

Selecting an audit firm can, and probably should, feel daunting. After all, you hopefully will work with this firm for many years to come, so it shouldn’t be a rushed decision. Many organizations make the mistake of letting cost be the primary driver of choosing an...

Factors That Create a Positive Compliance Experience

Factors That Create a Positive Compliance Experience

There is no doubt in my mind that I have seen vastly more audit horror stories and unsatisfied auditees on public forums and social media than I have seen people raving about a positive audit experience. Auditing is an extremely tough profession, and we auditors...

How to Prepare for a SOC 2 Security Assessment 2

How to Prepare for a SOC 2 Security Assessment

Security assessments, such as SOC 2 reports, are increasingly becoming a requirement in modern business. Organizations often approach us needing a SOC 2 but need help knowing where to start. So, let's break down the significant steps in preparing for a SOC 2....

What Is A SOC 1 And Do You Need One

What Is a SOC 1 and Do You Need One?

So, you have a customer telling you they need your SOC 1 report, but you do not currently have one and you need guidance on how to obtain one. This is a common problem we see in clients and is generally a positive sign that your firm is growing and obtaining larger...

Introduction To The SOC For Cybersecurity

Introduction To The SOC For Cybersecurity

The rise and institutionalization of cyber-attacks and data breaches within the corporate landscape has justifiably resulted in an atmosphere of reduced trust among business entities and consumers. Risk management and cybersecurity are consistently listed as top...