SOC POFs
SOC POFs
SOC POFs
Objective
Mandatory?
SOC 1
SOC 2
SOC 3
Period
Assessment Type
Period
Type I
3 months
Design of the Control
Point in Time
Type II
6 months to 1 year
Design & Operative effectiveness
Over a period of Time
Trust service Categories Criteria's
CC1 — Control environment
CC2 — Communication and Information
CC3 — Risk Assessment
CC4 — Monitoring Controls
Security (Common Criteria) CC5 — Control Activities
CC6 – Logical and Physical Access Controls
CC7 – System Operations
CC8 – Change Management
CC9 – Risk Mitigation
Availability A
Processing Integrity PI
Confidentiality C
Privacy P
17 COSO Principles
Additional Criteria's
SOC 1 & SOC 2 SOC 3
Management's Assertion/ Assertions of
Independent Service Auditor's Report Service Organization Management
Management's Assertion/ Assertions of Service
Organization Management Independent Service Auditor's Report
Description of Service organization System
Controls, Testing Matrix
Criteria Control Description/ Criteria Description.
Sets the Tone at the Top — The board of directors and management, at all levels,
demonstrate through their directives, actions, and behavior the importance of integrity
and ethical values to support the functioning of the system of internal control.
• Establishes Standards of Conduct — The expectations of the board of directors and
senior management concerning integrity and ethical values are defined in the entity’s
standards of conduct and understood at all levels of the entity and by outsourced service
providers and business partners.
• Evaluates Adherence to Standards of Conduct — Processes are in place to evaluate the
performance of individuals and teams against the entity’s expected standards of conduct.
• Addresses Deviations in a Timely Manner — Deviations from the entity’s expected
standards of conduct are identified and remedied in a timely and consistent manner.
• Considers Contractors and Vendor Employees in Demonstrating Its Commitment —
Management and the board of directors consider the use of contractors and vendor
employees in its processes for establishing standards of conduct, evaluating adherence to
those standards, and addressing deviations in a timely manner.
• Removes Data and Software for Disposal — Procedures are in place to remove, delete,
or otherwise render data and software inaccessible from physical assets and other
devices owned by the entity, its vendors, and employees when the data and software are
no longer required on the asset or the asset will no longer be under the control of the
entity.
• Restricts Access — The types of activities that can occur through a communication
channel (for example, FTP site, router port) are restricted.
• Protects Identification and Authentication Credentials — Identification and
authentication credentials are protected during transmission outside its system
boundaries.
• Requires Additional Authentication or Credentials — Additional authentication
information or credentials are required when accessing the system from outside its
boundaries.
• Implements Boundary Protection Systems — Boundary protection systems (for
example, firewalls, demilitarized zones, intrusion detection or prevention systems, and
endpoint detection and response systems) are configured, implemented, and maintained
to protect external access points.
• Restricts the Ability to Perform Transmission — Data loss prevention processes and
technologies are used to restrict ability to authorize and execute transmission,
movement, and removal of information.
• Uses Encryption Technologies or Secure Communication Channels to Protect Data —
Encryption technologies or secured communication channels are used to protect
transmission of data and other communications beyond connectivity access points.
• Protects Removal Media — Encryption technologies and physical asset protections are
used for removable media (such as USB drives and backup tapes), as appropriate.
• Protects Endpoint Devices — Processes and controls are in place to protect endpoint
devices (such as mobile devices, laptops, desktops, and sensor).
• Restricts Installation and Modification of Application and Software — The ability to
install and modify applications and software is restricted to authorized individuals.Utility
software capable of bypassing normal operating or security procedures is limited to use
by authorized individuals and is monitored regularly.
• Detects Unauthorized Changes to Software and Configuration Parameters —
Processes are in place to detect changes to software and configuration parameters that
may be indicative of unauthorized or malicious software.
• Uses a Defined Change Control Process — A management-defined change control
process is used for the implementation of software.
• Uses Antivirus and Anti-Malware Software — Antivirus and anti-malware software on
servers and endpoint devices is configured, implemented, and maintained to provide for
the interception or detection and remediation of malware.
• Scans Information Assets From Outside the Entity for Malware and Other
Unauthorized Software — Procedures are in place to scan information assets that have
been transferred or returned to the entity’s custody for malware and other unauthorized
software. Detected malware or other software is removed prior to connection to the
entity’s network.
Obtained background check reports for a sample of employees and confirmed that
background checks are performed for all the employees prior to hiring.
es prior to hiring or within 30days of hiring.
ROWD
No Exceptions noted.
Tester Sign -off QA Sign off
We will perform gap
Finx EY assessment to see if
Services Loan processing Services the service
organization have
proper
We willcontrols
Test theto
meet
Design of SOC
the all the
1 Gap Assessment requirements.
controls if Design is
We will test
effective both
as per SOC
2 Type I design and
requirements
effectiveness of the
controls as per SOC
3 Type II requirements