Guide: SOC 2 Reporting on an Examination of Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy
By AICPA
()
About this ebook
New to this edition are:
- Updated for SSAE No. 18 (clarified attestation standards), this guide has been fully conformed to reflect lessons learned in practice
- Contains insight from expert authors on the SOC 2 working group composed of CPAs who perform SOC 2 and SOC 3 engagements
- Includes illustrative report paragraphs describing the matter that gave rise to the report modification for a large variety of situations
- Includes a new appendix for performing and reporting on a SOC 2 examination in accordance with International Standards on Assurance Engagements (ISAEs) or in accordance with both the AICPA’s attestation standards and the ISAEs
Read more from Aicpa
Practice Aid: Enterprise Risk Management: Guidance For Practical Implementation and Assessment, 2018 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Property and Liability Insurance Entities 2018 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Construction Contractors, 2018 Rating: 0 out of 5 stars0 ratingsAudit Risk Alert: General Accounting and Auditing Developments 2018/19 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Entities With Oil and Gas Producing Activities, 2018 Rating: 0 out of 5 stars0 ratingsGuide to Audit Data Analytics Rating: 0 out of 5 stars0 ratingsAttestation Engagements on Sustainability Information (Including Greenhouse Gas Emissions Information) Rating: 0 out of 5 stars0 ratingsAudit Risk Alert: Government Auditing Standards and Single Audit Developments: Strengthening Audit Integrity 2018/19 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Not-for-Profit Entities, 2018 Rating: 0 out of 5 stars0 ratingsAudit Risk Alert: Employee Benefit Plans Industry Developments, 2018 Rating: 0 out of 5 stars0 ratingsCodification of Statements on Standards for Accounting and Review Services: Numbers 21-24 Rating: 0 out of 5 stars0 ratingsAccounting Guide: Brokers and Dealers in Securities 2018 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: State and Local Governments 2018 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Investment Companies Rating: 0 out of 5 stars0 ratingsCodification of Statements on Standards for Accounting and Review Services: Numbers 1 - 23 Rating: 0 out of 5 stars0 ratingsAudit Guide: Government Auditing Standards and Single Audits 2018 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Gaming 2018 Rating: 0 out of 5 stars0 ratingsProspective Financial Information Rating: 0 out of 5 stars0 ratingsEmployee Benefit Plans 2018 Rating: 0 out of 5 stars0 ratingsAudit Risk Alert: General Accounting and Auditing Developments, 2017/18 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Health Care Entities, 2018 Rating: 0 out of 5 stars0 ratingsGuide: Preparation, Compilation, and Review Engagements, 2018 Rating: 0 out of 5 stars0 ratingsAlert: Developments in Preparation, Compilation, and Review Engagements, 2017/18 Rating: 0 out of 5 stars0 ratingsCodification of Statements on Auditing Standards: Numbers 122 to 133, January 2018 Rating: 0 out of 5 stars0 ratingsCodification of Statements on Standards for Attestation Engagements, January 2018 Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: Life and Health Insurance Entities 2018 Rating: 0 out of 5 stars0 ratings
Related to Guide
Related ebooks
IS Auditor - Process of Auditing: Information Systems Auditor, #1 Rating: 0 out of 5 stars0 ratingsInformation Systems Auditing: The IS Audit Testing Process: Information Systems Auditing, #3 Rating: 1 out of 5 stars1/5ISO27001:2013 Assessments Without Tears Rating: 3 out of 5 stars3/5Information Systems Auditing: The IS Audit Planning Process: Information Systems Auditing, #1 Rating: 4 out of 5 stars4/5Information Systems Auditing: The IS Audit Reporting Process: Information Systems Auditing, #4 Rating: 5 out of 5 stars5/5GRC Chronicles Rating: 0 out of 5 stars0 ratingsCRISC Standard Requirements Rating: 0 out of 5 stars0 ratingsCRISC A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPCI DSS: A Pocket Guide, fourth edition Rating: 0 out of 5 stars0 ratingsApplication security in the ISO27001:2013 Environment Rating: 4 out of 5 stars4/5CISSP For Dummies Rating: 4 out of 5 stars4/5Zero Trust Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPCI DSS: A pocket guide, sixth edition Rating: 0 out of 5 stars0 ratingsSelling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsThird-Party Risk Management A Complete Guide - 2019 Edition Rating: 5 out of 5 stars5/5EU General Data Protection Regulation (GDPR) - An Implementation and Compliance Guide Rating: 0 out of 5 stars0 ratingsInformation Security Risk Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsNine Steps to Success: North American edition: An ISO 27001 Implementation Overview Rating: 0 out of 5 stars0 ratingsSOC 2 A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCloud Governance And Use A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsISO/IEC 27701:2019: An introduction to privacy information management Rating: 4 out of 5 stars4/5CISA Certified Information Systems Auditor Study Guide Rating: 5 out of 5 stars5/5Cybersecurity and Third-Party Risk: Third Party Threat Hunting Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 5 out of 5 stars5/5ISO 27005 A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsGRC, The Backbone of Enterprise Management Rating: 0 out of 5 stars0 ratingsCDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide Rating: 0 out of 5 stars0 ratingsCISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition Rating: 5 out of 5 stars5/5The Official (ISC)2 Guide to the CISSP CBK Reference Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratings
Auditing For You
Auditing For Dummies Rating: 4 out of 5 stars4/5The Prosperity Bible Rating: 4 out of 5 stars4/5Exposing Fraud: Skills, Process and Practicalities Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Internal Controls: Guidance for Private, Government, and Nonprofit Entities Rating: 0 out of 5 stars0 ratingsGuide to Audit Data Analytics Rating: 0 out of 5 stars0 ratings2022 Best Ways To Make Money Online Rating: 4 out of 5 stars4/5The Internal Auditing Handbook Rating: 0 out of 5 stars0 ratingsBribery and Corruption Casebook: The View from Under the Table Rating: 0 out of 5 stars0 ratingsAudit and Accounting Guide: State and Local Governments 2018 Rating: 0 out of 5 stars0 ratingsA Step By Step Guide: How to Perform Risk Based Internal Auditing for Internal Audit Beginners Rating: 4 out of 5 stars4/5Fraud 101: Techniques and Strategies for Understanding Fraud Rating: 0 out of 5 stars0 ratingsRisk-Based Internal Audit Rating: 5 out of 5 stars5/5Money Laundering Prevention: Deterring, Detecting, and Resolving Financial Fraud Rating: 0 out of 5 stars0 ratingsEssentials of Corporate Fraud Rating: 0 out of 5 stars0 ratingsBeyond Compliance Design of a Quality System: Tools and Templates for Integrating Auditing Perspectives Rating: 0 out of 5 stars0 ratingsFinancial Statement Fraud Casebook: Baking the Ledgers and Cooking the Books Rating: 4 out of 5 stars4/5Essential Strategies for Financial Services Compliance Rating: 0 out of 5 stars0 ratingsBudgeting - The Right Way Rating: 0 out of 5 stars0 ratingsPreventing Fraud and Mismanagement in Government: Systems and Structures Rating: 4 out of 5 stars4/5Detecting Fraud in Organizations: Techniques, Tools, and Resources Rating: 0 out of 5 stars0 ratingsA Guide to Forensic Accounting Investigation Rating: 4 out of 5 stars4/5Trade-Based Money Laundering: The Next Frontier in International Money Laundering Enforcement Rating: 0 out of 5 stars0 ratingsPreventing Money Laundering and Terrorist Financing, Second Edition: A Practical Guide for Bank Supervisors Rating: 0 out of 5 stars0 ratingsISO Lesson Guide 2015: Pocket Guide to ISO 9001:2015 Rating: 0 out of 5 stars0 ratingsCutting Edge Internal Auditing Rating: 3 out of 5 stars3/5The Layman's Guide GDPR Compliance for Small Medium Business Rating: 5 out of 5 stars5/5
Reviews for Guide
0 ratings0 reviews
Book preview
Guide - AICPA
Preface
(Updated as of January 1, 2018)
About AICPA Guides
This AICPA Guide, SOC 2® Reporting on an Examination of Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy, has been developed by members of the AICPA Assurance Services Executive Committee’s (ASEC’s) SOC 2® Working Group, in conjunction with members of the Auditing Standards Board (ASB), to assist practitioners engaged to examine and report on a service organization’s controls over its system relevant to security, availability, processing integrity, confidentiality, or privacy.
This AICPA Guide includes certain content presented as Supplement
or Appendix.
A supplement is a reproduction, in whole or in part, of authoritative guidance originally issued by a standard-setting body (including regulatory bodies) and is applicable to entities or engagements within the purview of that standard setter, independent of the authoritative status of the applicable AICPA Guide. Appendixes are included for informational purposes and have no authoritative status.
An AICPA Guide containing attestation guidance is recognized as an interpretive publication as described in AT-C section 105, Concepts Common to All Attestation Engagements.1 Interpretative publications are recommendations on the application of Statements on Standards for Attestation Engagements (SSAEs) in specific circumstances, including engagements for entities in specialized industries. Interpretive publications are issued under the authority of the ASB. The members of the ASB have found the attestation guidance in this guide to be consistent with existing SSAEs.
A practitioner should be aware of and consider the guidance in this guide that is applicable to his or her attestation engagement. If the practitioner does not apply the attestation guidance included in an applicable AICPA Guide, the practitioner should be prepared to explain how he or she complied with the SSAE provisions addressed by such attestation guidance.
Any attestation guidance in a guide appendix, although not authoritative, is considered an other attestation publication.
In applying such guidance, the practitioner should, exercising professional judgment, assess the relevance and appropriateness of such guidance to the circumstances of the engagement. Although the practitioner determines the relevance of other attestation guidance, such guidance in a guide appendix has been reviewed by the AICPA Audit and Attest Standards staff and the practitioner may presume that it is appropriate.
The ASB is the designated senior committee of the AICPA authorized to speak for the AICPA on all matters related to attestation. Conforming changes made to the attestation guidance contained in this guide are approved by the ASB Chair (or his or her designee) and the Director of the AICPA Audit and Attest Standards Staff. Updates made to the attestation guidance in this guide exceeding that of conforming changes are issued after all ASB members have been provided an opportunity to consider and comment on whether the guide is consistent with the SSAEs.
Purpose and Applicability
This guide, SOC 2® Reporting on an Examination of Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy, provides guidance to practitioners engaged to examine and report on a service organization’s controls over one or more of the following:
The security of a service organization’s system
The availability of a service organization’s system
The processing integrity of a service organization’s system
The confidentiality of the information that the service organization’s system processes or maintains for user entities
The privacy of personal information that the service organization collects, uses, retains, discloses, and disposes of for user entities
In April 2016, the ASB issued SSAE No. 18, Attestation Standards: Clarification and Recodification, which includes AT-C section 105 and AT-C section 205, Examination Engagements. AT-C sections 105 and 205 establish the requirements and application guidance for reporting on a service organization’s controls over its system relevant to security, availability, processing integrity, confidentiality, or privacy.
The attestation standards enable a practitioner to report on subject matter other than historical financial statements. A practitioner may be engaged to examine and report on controls at a service organization related to various types of subject matter (for example, controls that affect user entities’ financial reporting or the privacy of information processed for user entities’ customers).
Defining Professional Responsibilities in AICPA Professional Standards
AICPA professional standards applicable to attestation engagements use the following two categories of professional requirements, identified by specific terms, to describe the degree of responsibility they impose on a practitioner:
Unconditional requirements. The practitioner must comply with an unconditional requirement in all cases in which such requirement is relevant. The attestation standards use the word must
to indicate an unconditional requirement.
Presumptively mandatory requirements. The practitioner must comply with a presumptively mandatory requirement in all cases in which such requirement is relevant; however, in rare circumstances, the practitioner may judge it necessary to depart from the requirement. The need for the practitioner to depart from a relevant presumptively mandatory requirement is expected to arise only when the requirement is for a specific procedure to be performed and, in the specific circumstances of the engagement, that procedure would be ineffective in achieving the intent of the requirement. In such circumstances, the practitioner should perform alternative procedures to achieve the intent of that requirement and should document the justification for the departure and how the alternative procedures performed in the circumstances were sufficient to achieve the intent of the requirement. The attestation standards use the word should
to indicate a presumptively mandatory requirement.
References to Professional Standards
In citing attestation standards and their related interpretations, references to standards that have been codified use section numbers within the codification of currently effective SSAEs and not the original statement number.
Changes to the Attestation Standards Introduced by SSAE No. 18
Restructuring of the Attestation Standards
The attestation standards provide for three types of services—examination, review, and agreed-upon procedures engagements. SSAE No. 18 restructures the attestation standards so that the applicability of any AT-C section to a particular engagement depends on the type of service provided and the subject matter of the engagement.
AT-C section 105 contains requirements and application guidance applicable to any attestation engagement. AT-C section 205, AT-C section 210, Review Engagements, and AT-C section 215, Agreed-Upon Procedures Engagements, each contain incremental requirements and application guidance specific to the level of service performed. The applicable requirements and application guidance for any attestation engagement are contained in at least two AT-C sections: AT-C section 105 and either AT-C section 205, 210, or 215, depending on the level of service provided.
In addition, incremental requirements and application guidance unique to four subject matters are included in the subject matter AT-C sections. Those sections are AT-C section 305, Prospective Financial Information, AT-C section 310, Reporting on Pro Forma Financial Information, AT-C section 315, Compliance Attestation, and AT-C section 320, Reporting on an Examination of Controls at a Service Organization Relevant to User Entities’ Internal Control Over Financial Reporting. The applicable requirements and application guidance for an engagement to report on any of these subject matters are contained in three AT-C sections: AT-C section 105; AT-C section 205, 210, or 215, depending on the level of service provided; and the applicable subject matter section.
To avoid repetition, the requirements and application guidance in AT-C section 105 are not repeated in the level of service sections or in the subject matter sections, and the requirements and application guidance in the level of service sections are not repeated in the subject matter sections, except for repetition of the basic report elements for the particular subject matter.
Practitioner Is Required to Request a Written Assertion
In all attestation engagements, the practitioner is required to request from the responsible party a written assertion about the measurement or evaluation of the subject matter against the criteria. In examination and review engagements, when the engaging party is also the responsible party, the responsible party’s refusal to provide a written assertion requires the practitioner to withdraw from the engagement when withdrawal is possible under applicable laws and regulations. In examination and review engagements, when the engaging party is not the responsible party, the responsible party’s refusal to provide a written assertion requires the practitioner to disclose that refusal in the practitioner’s report and restrict the use of the report to the engaging party. In an agreed-upon procedures engagement, the responsible party’s refusal to provide a written assertion requires the practitioner to disclose that refusal in the practitioner’s report.
Risk Assessment in Examination Engagements
SSAE No. 18 incorporates a risk assessment model in examination engagements. In examination engagements, the practitioner is required to obtain an understanding of the subject matter that is sufficient to enable the practitioner to identify and assess the risks of material misstatement in the subject matter and provide a basis for designing and performing procedures to respond to the assessed risks.
Incorporates Certain Requirements Contained in the Auditing Standards
SSAE No. 18 incorporates a number of detailed requirements that are similar to those contained in the Statements on Auditing Standards, such as the requirement to obtain a written engagement letter and to request written representations. SSAE No. 18 includes these requirements based on the ASB’s belief that a service that results in a level of assurance similar to that obtained in an audit or review of historical financial statements should generally consist of similar requirements.
Separate Discussion of Review Engagements
SSAE No. 18 separates the detailed procedural and reporting requirements for review engagements from their counterparts for examination engagements. The resulting guidance more clearly differentiates the two services.
Convergence
It is the ASB’s general strategy to converge its standards with those of the International Auditing and Assurance Standards Board. Accordingly, the foundation for AT-C sections 105, 205, and 210 is International Standard on Assurance Engagements (ISAE) 3000 (Revised), Assurance Engagements Other Than Audits or Reviews of Historical Financial Information. Many of the paragraphs in SSAE No. 18 have been converged with the related paragraphs in ISAE 3000 (Revised), with certain changes made to reflect U.S. professional standards. Other content included in this statement is derived from the extant SSAEs. The ASB decided not to adopt certain provisions of ISAE 3000 (Revised); for example, a practitioner is not permitted to issue an examination or review report if the practitioner has not obtained a written assertion from the responsible party, except when the engaging party is not the responsible party. In the ISAEs, an assertion (or representation about the subject matter against the criteria) is not required in order for the practitioner to report.
Examinations of System and Organization Controls: SOC Suite of Services
In 2017, the AICPA introduced the term system and organization controls (SOC) to refer to the suite of services practitioners may provide relating to system-level controls of a service organization or system- or entity-level controls of other organizations. Formerly, SOC referred to service organization controls. By redefining that acronym, the AICPA enables the introduction of new internal control examinations that may be performed (a) for other types of organizations, in addition to service organizations, and (b) on either system-level or entity-level controls of such organizations. This guide, SOC 2® Reporting on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy, is an interpretation of AT-C section 105 and AT-C section 205 that assists CPAs in reporting on the security, availability, or processing integrity of a system or the confidentiality or privacy of the information processed by the system. This engagement is referred to as SOC 2®—SOC for Service Organizations: Trust Services Criteria. Other SOC engagements include the following:
SOC 1®—SOC for Service Organizations: ICFR. Service organizations may provide services that are relevant to their customers’ internal control over financial reporting and, therefore, to the audit of financial statements. The requirements and guidance for performing and reporting on such controls is provided in AT-C section 320. The AICPA Guide Reporting on an Examination of Controls at a Service Organization Relevant to User Entities’ Internal Control Over Financial Reporting (SOC 1®) is an interpretation of AT-C section 320 that assists CPAs engaged to examine and report on controls at a service organization that are likely to be relevant to user entities’ internal control over financial reporting.
SOC 3®—SOC for Service Organizations: Trust Services Criteria for General Use Report. Similar to a SOC 2® engagement, in a SOC 3® examination the practitioner reports on whether controls within the system were effective to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the applicable trust services criteria. Although the requirements and guidance for performing a SOC 3® examination are similar to a SOC 2® examination, the reporting requirements are different. Because of the different reporting requirements, a SOC 2® report is appropriate only for specified parties with sufficient knowledge and understanding of the service organization and the system, whereas a SOC 3® report is ordinarily appropriate for general use.
SOC for Cybersecurity. As part of an entity’s cybersecurity risk management program, an entity designs, implements, and operates cybersecurity controls. An engagement to examine and report on a description of the entity’s cybersecurity risk management program and the effectiveness of controls within that program is a cybersecurity risk management examination. The requirements and guidance for performing and reporting in a cybersecurity risk management examination are provided in AT-C section 105 and AT-C section 205. The AICPA Guide Reporting on an Entity’s Cybersecurity Risk Management Program and Controls is an interpretation of AT-C section 205 that assists practitioners engaged to examine and report on the description of an entity’s cybersecurity risk management program and the effectiveness of controls within that program.
This guide focuses on SOC 2® engagements. To make practitioners aware of the various professional standards and guides available to them for examining and reporting on system-level controls at a service organization and entity-level controls at other organizations, and to help practitioners select the appropriate standard or guide for a particular engagement, appendix B, Comparison of SOC 1®, SOC 2®, and SOC 3® Examinations and Related Reports,
includes a table that compares the features of the three engagements. Additionally, appendix C, Illustrative Comparison of a SOC 2® Examination and Related Report With the Cybersecurity Risk Management Examination and Related Report,
compares the features of a SOC 2® examination and a cybersecurity risk management examination.
Revisions to Description Criteria for a Description of a Service Organization’s System in a SOC 2® Report
In February 2018, the AICPA ASEC issued revised description criteria for a description of a service organization’s system in a SOC 2® report, which are codified in DC section 200, 2018 Description Criteria for a Description of a Service Organization’s System in a SOC 2® Report (2018 description criteria).2 The extant description criteria included in paragraphs 1.26–.27 of the AICPA Guide Reporting on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy (SOC 2®) (2015 description criteria) are now codified in DC section 200A. The 2018 description criteria were established by ASEC for use by service organization management when preparing the description of the service organization’s system and by the service auditors when evaluating whether the description is presented in accordance with the description criteria in a SOC 2® examination.
ASEC, in establishing and developing these criteria, followed due process procedures, including exposure of the proposed criteria for public comment. Under BL section 360, Committees,3 ASEC has been designated as a senior committee and has been given authority to make public statements and publish measurement criteria without clearance from AICPA Council or the board of directors.
Revisions to Trust Services Criteria
In April 2017, ASEC issued revisions to the trust services criteria for security, availability, processing integrity, confidentiality, or privacy. Codified as TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy,4 the revised trust services criteria were established by the ASEC for use by practitioners when providing attestation or consulting services to evaluate controls relevant to the security, availability, or processing integrity of one or more systems, or the confidentiality or privacy of information processed by one or more systems, used by an entity. Management of an entity may also use the trust services criteria to evaluate the suitability of design and operating effectiveness of such controls.
ASEC, in establishing and developing these criteria, followed due process procedures, including exposure of the proposed criteria for public comment.
The trust services principles and criteria were revised to do the following:
Restructure and align the trust services criteria with the Committee of Sponsoring Organizations of the Treadway Commission’s 2013 Internal Control—Integrated Framework (COSO framework). ASEC restructured and realigned the trust services criteria to facilitate their use in an entity-wide engagement. Because the COSO framework is a widely used and accepted internal control framework that is intended to be applied to internal control at an entity as a whole or to a segment of an entity, ASEC determined that alignment with that framework was the best way to revise the trust services criteria for use when reporting at an entity level. Therefore, the 2017 trust services criteria align with the 17 principles in the COSO framework.5
The 2017 trust services criteria may be used to evaluate control effectiveness in examinations of various subject matters. In addition, they may be used to evaluate controls over the security, availability, processing integrity, confidentiality, or privacy of information and systems
—
across an entire entity;
—
at a subsidiary, division, or operating unit level;
—
within a function or system; or
—
for a particular type of information used by the entity.
Rename the trust services principles and criteria. The COSO framework uses the term principles to refer to the elements of internal control that must be present or functioning for the entity’s internal control to be considered effective. To avoid confusion between the terminology used in the COSO framework and that used in the trust services principles and criteria, the latter were renamed as the trust services criteria. In addition, the five principles (security, availability, processing integrity, confidentiality, and privacy) included therein are now referred to as the trust services categories.
Restructure the criteria and add supplemental criteria to better address cybersecurity risks in engagements using the trust services criteria. The 2017 trust services criteria address risk management, incident management, and certain other areas at a more detailed level than the previous version of the criteria. In addition, the 2017 trust services criteria include new supplemental criteria to address areas that are increasingly important to information security. The new criteria are organized into the following categories:
—
Logical and physical access controls. The criteria relevant to how an entity restricts logical and physical access, provides and removes that access, and prevents unauthorized access to meet the entity’s objectives addressed by the engagement
—
System operations. The criteria relevant to how an entity manages the operation of systems and detects and mitigates processing deviations, including logical and physical security deviations, to meet the entity’s objectives addressed by the engagement
—
Change management. The criteria relevant to how an entity identifies the need for changes, makes the changes using a controlled change management process, and prevents unauthorized changes from being made, to meet the entity’s objectives addressed by the engagement
Add points of focus to all criteria. The COSO framework contains points of focus that represent important characteristics of the criteria to help users apply the criteria; thus, those points of focus are included in the revised trust services criteria. In addition, points of focus have been developed for each of the new supplemental criteria described in the previous bullet. Similar to the points of focus included in the COSO framework, the points of focus related to the supplemental criteria also represent important characteristics of those criteria. The points of focus may assist management and the practitioner in evaluating whether the controls are suitably designed and operating effectively; however, use of the criteria does not require management or the practitioner to separately assess whether points of focus are addressed.
AICPA.org Website
The AICPA encourages you to visit its website at aicpa.org and the Financial Reporting Center website at www.aicpa.org/frc. The Financial Reporting Center supports members in the execution of high-quality financial reporting. Whether you are a financial statement preparer or a member in public practice, this center provides exclusive member-only resources for the entire financial reporting process, and provides timely and relevant news, guidance, and examples supporting the financial reporting process, including accounting, preparing financial statements, and performing compilation, review, audit, attest, or assurance and advisory engagements. Certain content on the AICPA’s websites referenced in this guide may be restricted to AICPA members only.
Recognition
Auditing Standards Board (2016–2017)
Michael J. Santay, Chair
Gerry Boaz
Jay Brodish, Jr.
Dora Burzenski
Joseph S. Cascio
Lawrence Gill
Steven M. Glover
Gaylen Hansen
Tracy Harding
Daniel J. Hevia
Ilene Kassman
Alan Long
Richard Miller
Daniel D. Montgomery
Steven Morrison
Richard N. Reisig
Catherine M. Schweigel
Jere G. Shawyer
Chad Singletary
Assurance Services Executive Committee (2016–2017)
Robert Dohrer, Chair
Bradley Ames
Christine M. Anderson
Bradley Beasley
Nancy Bumgarner
Jim Burton
Chris Halterman
Mary Grace Davenport
Jennifer Haskell
Brad Muniz
Michael Ptasienski
Joanna Purtell
Miklos Vasarhelyi
ASEC SOC 2® Working Group
Chris Halterman, Chair
Efrim Boritz
Brandon Brown
Jeff Cook
Charles Curran
Peter F. Heuzey
Eddie Holt
Audrey Katcher
Kevin Knight
Christopher W. Kradjan
Thomas Patterson
Binita Pradhan
John Richardson
Soma Sinha
Rod Smith
David Wood
AICPA Staff
Charles E. Landes
Vice President
Professional Standards and Services
Amy Pawlicki
Vice President
Assurance and Advisory Innovation
Erin Mackler
Director
Assurance and Advisory Services—SOC Reporting
Mimi Blanco-Best
Senior Manager
Guidance—Assurance and Advisory SOC Reporting
Tanya Hale
Senior Manager
SOC Reporting—Service Organizations
Nisha Gordhan
Manager
Product Management and Development
Notes
1 All AT-C sections can be found in AICPA Professional Standards.
2 DC sections can be found in AICPA Description Criteria.
3 BL sections can be found in AICPA Professional Standards.
4 TSP sections can be found in AICPA Trust Services Criteria.
5 ©2013, Committee of Sponsoring Organizations of the Treadway Commission (COSO). All rights reserved. Used by permission. See www.coso.org.
__________________________
TABLE OF CONTENTS
1 Introduction and Background
Introduction
Intended Users of a SOC 2® Report
Overview of a SOC 2® Examination
Contents of the SOC 2® Report
Definition of a System
Boundaries of the System
Time Frame of Examination
Difference Between Privacy and Confidentiality
Criteria for a SOC 2® Examination
The Service Organization’s Service Commitments and System Requirements
SOC 2® Examination That Addresses Additional Subject Matters and Additional Criteria
SOC 3® Examination
Other Types of SOC Examinations: SOC Suite of Services
SOC 1®—SOC for Service Organizations: ICFR
SOC for Cybersecurity
Professional Standards
Attestation Standards
Code of Professional Conduct
Quality in the SOC 2® Examination
Definitions
2 Accepting and Planning a SOC 2® Examination
Introduction
Understanding Service Organization Management’s Responsibilities
Management Responsibilities Prior to Engaging the Service Auditor
Management Responsibilities During the Examination
Management’s Responsibilities During Engagement Completion
Responsibilities of the Service Auditor
Engagement Acceptance and Continuance
Independence
Competence of Engagement Team Members
Preconditions of a SOC 2® Engagement
Determining Whether the Subject Matter Is Appropriate for the SOC 2® Examination
Determining Whether Management Is Likely to Have a Reasonable Basis for Its Assertion
Assessing the Suitability and Availability of Criteria
Assessing the Appropriateness of the Service Organization’s Principal Service Commitments and System Requirements Stated in the Description
Requesting a Written Assertion and Representations From Service Organization Management
Agreeing on the Terms of the Engagement
Accepting a Change in the Terms of the Examination
Additional Considerations for a Request to Extend or Modify the Period Covered by the Examination
Establishing an Overall Examination Strategy for and Planning the Examination
Planning Considerations When the Inclusive Method Is Used to Present the Services of a Subservice Organization
Considering Materiality During Planning
Performing Risk Assessment Procedures
Obtaining an Understanding of the Service Organization’s System
Assessing the Risk of Material Misstatement
Considering Entity-Level Controls
Understanding the Internal Audit Function
Planning to Use the Work of Internal Auditors
Evaluating the Competence, Objectivity, and Systematic Approach Used by Internal Auditors
Determining the Extent to Which to Use the Work of Internal Auditors
Coordinating Procedures With the Internal Auditors
Evaluating Whether the Work of Internal Auditors Is Adequate for the Service Auditor’s Purposes
Planning to Use the Work of an Other Practitioner
Planning to Use the Work of a Service Auditor’s Specialist
Accepting and Planning a SOC 3® Examination
3 Performing the SOC 2® Examination
Designing Overall Responses to the Risk Assessment and Obtaining Evidence
Considering Materiality in Responding to the Assessed Risks and Planning Procedures
Defining Misstatements in This Guide
Obtaining and Evaluating Evidence About Whether the Description Presents the System That Was Designed and Implemented in Accordance With the Description Criteria
The Service Organization’s Service Commitments and System Requirements
Disclosures About Individual Controls
Disclosures About System Incidents
Disclosures About Complementary User Entity Controls and User Entity Responsibilities
Disclosures Related to Subservice Organizations
Disclosures About Complementary Subservice Organization Controls
Disclosures About Significant Changes to the System During the Period Covered by a Type 2 Examination
Changes to the System That Occur Between the Periods Covered by a Type 2 Examination
Procedures to Obtain Evidence About the Description
Considering Whether the Description Is Misstated or Otherwise Misleading
Identifying and Evaluating Description Misstatements
Materiality Considerations When Evaluating Whether the Description Is Presented in Accordance With the Description Criteria
Obtaining and Evaluating Evidence About the Suitability of the Design of Controls
Additional Considerations for Subservice Organizations
Multiple Controls Are Necessary to Address an Applicable Trust Services Criterion
Multiple Controls to Achieve the Service Organization’s Service Commitments and Service Requirements Based on the Same Applicable Trust Services Criterion
Procedures to Obtain Evidence About the Suitability of Design of Controls
Identifying and Evaluating Deficiencies in the Suitability of Design of Controls
Obtaining and Evaluating Evidence About the Operating Effectiveness of Controls in a Type 2 Examination
Designing and Performing Tests of Controls
Nature of Tests of Controls
Evaluating the Reliability of Information Produced by the Service Organization
Timing of Tests of Controls
Extent of Tests of Controls
Testing Superseded Controls
Using Sampling to Select Items to Be Tested
Selecting Items to Be Tested
Additional Considerations Related to Risks of Vendors and Business Partners
Additional Considerations Related to CSOCs
Considering Controls That Did Not Need to Operate During the Period Covered by the Examination
Identifying and Evaluating Deviations in the Operating Effectiveness of Controls
Materiality Considerations When Evaluating the Suitability of Design and Operating Effectiveness of Controls
Using the Work of the Internal Audit Function
Using the Work of a Service Auditor’s Specialist
Revising the Risk Assessment
Evaluating the Results of Procedures
Responding to and Communicating Known and Suspected Fraud, Noncompliance With Laws or Regulations, Uncorrected Misstatements, and Deficiencies in the Design or Operating Effectiveness of Controls
Known or Suspected Fraud or Noncompliance With Laws or Regulations
Communicating Incidents of Known or Suspected Fraud, Noncompliance With Laws or Regulations, Uncorrected Misstatements, or Internal Control Deficiencies
Obtaining Written Representations
Requested Written Representations Not Provided or Not Reliable
Representations From the Engaging Party When Not the Responsible Party
Subsequent Events and Subsequently Discovered Facts
Subsequent Events Unlikely to Have an Effect on the Service Auditor’s Report
Documentation
Considering Whether Service Organization Management Should Modify Its Assertion
4 Forming the Opinion and Preparing the Service Auditor’s Report
Responsibilities of the Service Auditor
Forming the Service Auditor’s Opinion
Concluding on the Sufficiency and Appropriateness of Evidence
Considering Uncorrected Description Misstatements and Deficiencies
Expressing an Opinion on Each of the Subject Matters in the SOC 2® Examination
Describing Tests of Controls and the Results of Tests in a Type 2 Report
Describing Tests of Controls and Results When Using the Internal Audit Function
Describing Tests of the Reliability of Information Produced by the Service Organization
Preparing the Service Auditor’s SOC 2® Report
Elements of the Service Auditor’s SOC 2® Report
Requirement to Restrict the Use of the SOC 2® Report
Reporting When the Service Organization’s Design of Controls Assumes Complementary User Entity Controls
Reporting When the Service Organization Carves Out the Controls at a Subservice Organization
Reporting When the Service Auditor Assumes Responsibility for the Work of an Other Practitioner
Modifications to the Service Auditor’s Report
Qualified Opinion
Adverse Opinion
Scope Limitation
Disclaimer of Opinion
Report Paragraphs Describing the Matter Giving Rise to the Modification
Illustrative Separate Paragraphs When There Are Material Misstatements in the Description
Illustrative Separate Paragraphs: Material Deficiencies in the Suitability of Controls
Illustrative Separate Paragraphs: Material Deficiencies in the Operating Effectiveness of Controls
Other Matters Related to the Service Auditor’s Report
Emphasis-of-Matter Paragraphs and Other-Matter Paragraphs
Distribution of the Report by Management
Service Auditor’s Recommendations for Improving Controls
Other Information Not Covered by the Service Auditor’s Report
Illustrative Type 2 Reports
Preparing a Type 1 Report
Forming the Opinion and Preparing a SOC 3® Report
Elements of the SOC 3® Report
Elements of the Service Auditor’s Report
Illustrative SOC 3® Management Assertion and Service Auditor’s Report
Supplement A 2018 Description Criteria for a Description of a Service Organization’s System in a SOC 2® Report
Supplement B Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy
A Information for Service Organization Management
B Comparison of SOC 1®, SOC 2®, and SOC 3® Examinations and Related Reports
C Illustrative Comparison of a SOC 2® Examination and Related Report With the Cybersecurity Risk Management Examination and Related Report
D
D-1 Illustrative Management Assertion and Service Auditor’s Report for a Type 2 Examination (Carved-Out Controls of a Subservice Organization and Complementary Subservice Organization and Complementary User Entity Controls)
D-2 Illustrative Service Organization and Subservice Organization Management Assertions and Service Auditor’s Report for a Type 2 Examination (Subservice Organization Presented Using the Inclusive Method and Complementary User Entity Controls)
D-3 Illustrative Service Auditor’s Report for a Type 2 Examination in Which the Service Auditor Disclaims an Opinion Because of a Scope Limitation
D-4 Illustrative Type 2 Report (Including Management’s Assertion, Service Auditor’s Report, and the Description of the System)
E Illustrative Management Assertion and Service Auditor’s Report for a Type 1 Examination
F Illustrative Management Assertion and Service Auditor’s Report for a SOC 3® Examination
G
G-1 Illustrative Management Representation Letter for Type 2 Engagement
G-2 Illustrative Management Representation Letter for Type 1 Engagement
H Performing and Reporting on a SOC 2® Examination in Accordance With International Standards on Assurance Engagements (ISAEs) or in Accordance With Both the AICPA’s Attestation Standards and the ISAEs
I Definitions
EULA
Chapter 1
Introduction and Background
This chapter explains the relationship between a service organization and its user entities; provides examples of service organizations and the services they may provide; explains the relationship between those services and the system used to provide them; describes the components of a system and its boundaries; identifies the criteria used to evaluate a description of a service organization’s system (description criteria) and the criteria (applicable trust services criteria) used to evaluate whether controls were suitably designed and operated effectively to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved; and explains the difference between a type 1 and type 2 SOC 2® report.1 It also describes the relationship between a service organization and its business partners and the effect of a service organization’s system on those business partners. In addition, this chapter provides an overview of a SOC 3® examination and other SOC services.
Introduction
1.01 Entities often use business relationships with other entities to further their objectives. Network-based information technology has enabled, and telecommunications systems have substantially increased, the economic benefits derived from these relationships. For example, some entities (user entities) are able to function more efficiently and effectively by outsourcing tasks or entire functions to another organization (service organization). A service organization is organized and operated to provide user entities with the benefits of the services of its personnel, expertise, equipment, and technology to help accomplish these tasks or functions. Other entities (business partners) enter into agreements with a service organization that enable the service organization to offer the business partners’ services or assets (for example, intellectual property) to the service organization’s customers. In such instances, business partners may want to understand the effectiveness of controls implemented by the service organization to protect the business partners’ intellectual property.
1.02 Examples of the types of services provided by service organizations are as follows:
Customer support. Providing customers of user entities with online or telephonic post-sales support and service management. Examples of these services are warranty inquiries and investigating and responding to customer complaints.
Health care claims management and processing. Providing medical providers, employers, third-party administrators, and insured parties of employers with systems that enable medical records and related health insurance claims to be processed accurately, securely, and confidentially.
Enterprise IT outsourcing services. Managing, operating, and maintaining user entities’ IT data centers, infrastructure, and application systems and related functions that support IT activities, such as network, production, security, change management, hardware, and environmental control activities.
Managed security. Managing access to networks and computing systems for user entities (for example, granting access to a system and preventing, or detecting and mitigating, system intrusion).
Financial technology (FinTech) services. Providing financial services companies with IT-based transaction processing services. Examples of such transactions are loan processing, peer-to-peer lending, payment processing, crowdfunding, big data analytics, and asset management.
1.03 Although these relationships may increase revenues, expand market opportunities, and reduce costs for the user entities and business partners, they also result in additional risks arising from interactions with the service organization and its system. Accordingly, the management of those user entities and business partners are responsible for identifying, evaluating, and addressing those additional risks as part of their risk assessment. In addition, although management can delegate responsibility for specific tasks or functions to a service organization, management remains accountable for those tasks to boards of directors, shareholders, regulators, customers, and other affected parties. As a result, management is responsible for establishing effective internal control over interactions between the service organizations and their systems.
1.04 To assess and address the risks associated with a service organization, its services, and the system used to provide the services, user entities and business partners usually need information about the design, operation, and effectiveness of controls2 within the system. To support their risk assessments, user entities and business partners may request a SOC 2® report from the service organization. A SOC 2® report is the result of an examination of whether (a) the description of the service organization’s system presents the system that was designed and implemented in accordance with the description criteria, (b) the controls stated in the description were suitably designed to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the criteria, if those controls operated effectively, and (c) in a type 2 examination, the controls stated in the description operated effectively to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the criteria relevant to the security, availability, or processing integrity of the service organization’s system (security, availability, processing integrity) or based on the criteria relevant to the system’s ability to maintain the confidentiality or privacy of the information processed for user entities (confidentiality or privacy).3 ,4 This examination, which is referred to as a SOC 2® examination, is the subject of this guide.
1.05 Because the informational needs of SOC 2® report users vary, there are two types of SOC 2® examinations and related reports:
a.
A type 1 examination is an examination of whether
i.
a service organization’s description presents the system that was designed and implemented as of a point in time in accordance with the description criteria and
ii.
controls were suitably designed as of a point in time to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the applicable trust services criteria, if controls operated effectively.
A report on such an examination is referred to as a type 1 report.
b.
A type 2 examination also addresses the description of the system and the suitability of design of controls, but it also includes an additional subject matter: whether controls operated effectively throughout the period of time to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the applicable trust services criteria. A type 2 examination also includes a detailed description of the service auditor’s5 tests of controls and the results of those tests. A report on such an examination is referred to as a type 2 report.
1.06 A service auditor is engaged to perform either a type 1 or a type 2 examination. A service auditor may not be engaged to examine and express an opinion on the description of the service organization’s system and the suitability of design of certain controls stated in the description and be engaged to express an opinion on the operating effectiveness of other controls stated in the description.
Intended Users of a SOC 2® Report
1.07 A SOC 2® report, whether a type 1 or a type 2 report, is usually intended to provide report users with information about the service organization’s system relevant to security, availability, processing integrity, confidentiality, or privacy to enable such users to assess and address the risks that arise from their relationships with the service organization. For instance, the description of the service organization’s system is intended to provide report users with information about the system that may be useful when assessing the risks arising from interactions with the service organization’s system, particularly system controls that the service organization has designed, implemented, and operated to provide reasonable assurance that its service commitments and system requirements were achieved based on the applicable trust services criteria. For example, disclosures about the types of services provided, the environment in which the entity operates, and the components of the system used to provide such services allow report users to better understand the context in which the system controls operate.
1.08 A SOC 2® report is intended for use by those who have sufficient knowledge and understanding of the service organization, the services it provides, and the system used to provide those services, among other matters. Without such knowledge, users are likely to misunderstand the content of the SOC 2® report, the assertions made by management, and the service auditor’s opinion, all of which are included in the report. For that reason, management and the service auditor should agree on the intended users of the report (referred to as specified parties). The expected knowledge of specified parties ordinarily includes the following:
The nature of the service provided by the service organization
How the service organization’s system interacts with user entities, business partners, subservice organizations,6 and other parties
Internal control and its limitations
Complementary user entity controls and complementary subservice organization controls7 and how those controls interact with the controls at the service organization to achieve the service organization’s service commitments and system requirements
User entity responsibilities and how they may affect the user entities’ ability to effectively use the service organization’s services
The applicable trust services criteria
The risks that may threaten the achievement of the service organization’s service commitments and system requirements, and how controls address those risks
1.09 Specified parties of a SOC 2® report may include service organization personnel, user entities of the system throughout some or all of the period, business partners subject to risks arising from interactions with the system, practitioners providing services to user entities and business partners, and regulators who have sufficient knowledge and understanding of such matters.
1.10 Other parties may also have the requisite knowledge and understanding identified in paragraph 1.08. For example, prospective user entities or business partners, who intend to use the information contained in the SOC 2® report as part of their vendor selection process or to comply with regulatory requirements for vendor acceptance, may have gained such knowledge while performing due diligence. (If prospective users lack such knowledge and understanding, management may instead engage a service auditor to provide a SOC 3® report, as discussed in paragraph 1.13.)
1.11 Because of the knowledge that intended users need to understand the SOC 2® report, the service auditor’s report is required to be restricted to specified parties who possess that knowledge. Restricting the use of a service auditor’s report in a SOC 2® examination is discussed beginning in paragraph 4.33.
1.12 As previously discussed, the SOC 2® report has been designed to meet the common information needs of the broad range of intended users described in the preceding paragraphs. However, nothing precludes the service auditor from restricting the use of the service auditor’s report to a smaller group of users.
1.13 In some situations, service organization management may wish to distribute a report on the service organization’s controls relevant to security, availability, confidentiality, processing integrity, or privacy to users who lack the knowledge and understanding described in paragraph 1.08. In that case, management may engage a service auditor to examine and express an opinion on the effectiveness of controls within a service organization’s system in a SOC 3® examination. As discussed beginning at paragraph 1.55, a SOC 3® report is ordinarily appropriate for general users. Chapter 4, Forming the Opinion and Preparing the Service Auditor’s Report,
discusses the reporting elements of a SOC 3® report in further detail.
Overview of a SOC 2® Examination
1.14 As previously discussed, a SOC 2® examination is an examination of a service organization’s description of its system, the suitability of the design of its controls, and in a type 2 examination, the operating effectiveness of controls relevant to security, availability, processing integrity, confidentiality, or privacy. This guide provides performance and reporting guidance for both types of SOC 2® examinations.
1.15 The service auditor performs a SOC 2® examination in accordance with AT-C section 105, Concepts Common to All Attestation Engagements,8 and AT-C section 205, Examination Engagements. Those standards establish performance and reporting requirements for the SOC 2® examination. According to those standards, an attestation examination is predicated on the concept that a party other than the practitioner (the responsible party) makes an assertion about whether the subject matter is measured or evaluated in accordance with suitable criteria. An assertion is any declaration or set of declarations about whether the subject matter is in accordance with, or based on, the criteria.
1.16 In a SOC 2® examination, service organization management is the responsible party. However, in certain situations there may be other responsible parties.9 As the responsible party, service organization management prepares the description of the service organization’s system that is included in the SOC 2® report. In addition, the service auditor is required by the attestation standards10 to request a written assertion from management. Management’s written assertion addresses whether (a) the description of the service organization’s system is presented in accordance with the description criteria, (b) the controls stated in the description were suitably designed to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the applicable trust services criteria, and (c) in a type 2 examination, those controls were operating effectively to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the applicable trust services criteria.
1.17 The service auditor designs and performs procedures to obtain sufficient appropriate evidence about whether the description presents the system that was designed and implemented in accordance with the description criteria and whether (a) the controls stated in the description were suitably designed to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the applicable trust services criteria and, (b) in a type 2 examination, those controls were operating effectively to provide reasonable assurance that the service organization’s service commitments and system requirements were achieved based on the applicable trust services criteria. In a type 2 examination, the service auditor also presents, in a separate section of the SOC 2® report, a description of the service auditor’s tests of controls and the results thereof.
Contents of the SOC 2® Report
1.18 A SOC 2® examination results in the issuance of a SOC 2® report. As shown in table 1-1, the SOC 2® report includes three key components:
Table 1-1 Contents of a SOC 2® Report
Definition of a System
1.19 In the SOC 2® examination, a system is defined as the infrastructure, software, procedures, and data that are designed, implemented, and operated by people to achieve one or more of the organization’s specific business objectives (for example, delivery of services or production of goods) in accordance with management-specified requirements.
1.20 System components can be classified into the following five categories:
Infrastructure. The collection of physical or virtual resources that supports an overall IT environment, including the physical environment and related structures, IT, and hardware (for example, facilities, servers, storage, environmental monitoring equipment, data storage devices and media, mobile devices, and internal networks and connected external telecommunications networks) that the service organization uses to provide the services
Software. The application programs and IT system software that supports application programs (operating systems, middleware, and utilities), the types of databases used, the nature of external-facing web applications, and the nature of applications developed in-house, including details about whether the applications in use are mobile applications or desktop or laptop applications
People. The personnel involved in the governance, management, operation, security, and use of a system (business unit personnel, developers, operators, user entity personnel, vendor personnel, and managers)
Data. The types of data used by the system, such as transaction streams, files, databases, tables, and other output used or processed by the system
Procedures. The automated and manual procedures related to the services provided, including, as appropriate, procedures by which service activities are initiated, authorized, performed, and delivered, and reports and other information prepared
Boundaries of the System
1.21 The boundaries of a system addressed by a SOC 2® examination need to be clearly understood, defined, and communicated to report users. For example, a financial reporting system is likely to be bounded by the components of the system related to financial transaction initiation, authorization, recording, processing, and reporting. The boundaries of a system related to processing integrity (system processing is complete, accurate, timely, and authorized), however, may extend to other operations (for example, risk management, internal audit, information technology, or customer call center processes).
1.22 In a SOC 2® examination that addresses the security, availability, or processing integrity criteria, the system boundaries would cover, at a minimum, all the system components as they relate to the transaction processing or service life cycle including initiation, authorization, processing, recording, and reporting of the transactions processed for or services provided to user entities. The system boundaries would not include instances in which transaction-processing information is combined with other information for secondary purposes internal to the service organization, such as customer metrics tracking.
1.23 In a SOC 2® examination that addresses the confidentiality or privacy criteria, the system