Checks We Perform
Below is a list of all the checks we perform. Select one to view more information.
- All (21)
- Risk Mitigation (1)
- Logical and Physical Access Controls (3)
- Change Management (1)
- Other Criteria (5)
- Internal Control (9)
- System Operations (2)
Risk Mitigation
CC9.1 Were controls modified to address the changing risk landscape? (mitigating risks that lead to business disruption)
Logical and Physical Access Controls
CC6.1 Does the report include testing of access controls beyond cloud infrastructure? (protection through logical access)
Change Management
CC8.1 Were change tickets compared against system changes to discover undocumented changes? (change management best practices)
Other Criteria
P1.1 Were privacy principles evaluated beyond security principles? (what is the difference between privacy and security)
Internal Control
CC4.2 Have the ongoing processes for monitoring of operational effectiveness been tested? (who is monitoring internal control)
Internal Control
CC3.2 Does the scope of the risk assessment include risks across the organization beyond IT threats? (What types of risks does your organization face)
Other Criteria
C1.2 Have client agreements been inspected and compared against data repositories to ensure data disposal procedures are followed? (how contractual obligations impact confidential information)
Internal Control
CC1.2 Have board members been interviewed to emphasize their cybersecurity and compliance obligations? (SOC 2 Academy: A Board’s Independence from Management)
Internal Control
CC2.2 Has a sample of employees been interviewed to ensure they understand and acknowledge their internal control responsibilities? (communicating with internal parties)
Other Criteria
A1.2 Does the backup process all critical data supporting the system? (data backup processes)
System Operations
CC7.2 Has vulnerability management been integrated with the build pipeline? (performing code review prior to release)
Other Criteria
PI1.3 Were custom control descriptions written to capture the unique service delivery controls of the organization? (what is a service delivery walkthrough)
Internal Control
CC2.3 Do client agreements and shared responsibility models communicate the client’s role in maintaining internal control? (Communicating with external parties)
Other Criteria
A1.3 Does the recovery plan testing include the restoration of data to ensure data integrity objectives have been met? (testing your business continuity and disaster recovery plan)
Logical and Physical Access Controls
CC6.4 Are physical environments for critical roles and processes considered in the testing performed? (physical security controls)
System Operations
CC7.4 Was a sample of incidents inspected to evaluate the incident response process? (incident response best practices)
Logical and Physical Access Controls
CC6.6 Are controls for source code management, intrusion prevention, and security group hardening included in access control testing? (additional points of focus for logical access)
Internal Control
1.1 Does the scope of the SOC 2 report include the people, processes, and systems necessary for the proper functioning of internal control? (The importance of scope)
Internal Control
1.2 Did testing procedures include observations and sampling beyond interviews? (Why demonstration is necessary to quality audits)
Internal Control
1.3 Were custom control descriptions created by the service organization to reflect the unique nature of their environment? (quality reports delivered by professional writers)
Internal Control
1.4 Is the audit firm qualified to perform the engagement? i.e. skills, experience, compliance (Choosing the right audit firm)
Risk Mitigation
CC9.1 Were controls modified to address the changing risk landscape? (mitigating risks that lead to business disruption)
Logical and Physical Access Controls
CC6.1 Does the report include testing of access controls beyond cloud infrastructure? (protection through logical access)
Logical and Physical Access Controls
CC6.4 Are physical environments for critical roles and processes considered in the testing performed? (physical security controls)
Logical and Physical Access Controls
CC6.6 Are controls for source code management, intrusion prevention, and security group hardening included in access control testing? (additional points of focus for logical access)
Change Management
CC8.1 Were change tickets compared against system changes to discover undocumented changes? (change management best practices)
Other Criteria
P1.1 Were privacy principles evaluated beyond security principles? (what is the difference between privacy and security)
Other Criteria
C1.2 Have client agreements been inspected and compared against data repositories to ensure data disposal procedures are followed? (how contractual obligations impact confidential information)
Other Criteria
A1.2 Does the backup process all critical data supporting the system? (data backup processes)
Other Criteria
PI1.3 Were custom control descriptions written to capture the unique service delivery controls of the organization? (what is a service delivery walkthrough)
Other Criteria
A1.3 Does the recovery plan testing include the restoration of data to ensure data integrity objectives have been met? (testing your business continuity and disaster recovery plan)
Internal Control
CC4.2 Have the ongoing processes for monitoring of operational effectiveness been tested? (who is monitoring internal control)
Internal Control
CC3.2 Does the scope of the risk assessment include risks across the organization beyond IT threats? (What types of risks does your organization face)
Internal Control
CC1.2 Have board members been interviewed to emphasize their cybersecurity and compliance obligations? (SOC 2 Academy: A Board’s Independence from Management)
Internal Control
CC2.2 Has a sample of employees been interviewed to ensure they understand and acknowledge their internal control responsibilities? (communicating with internal parties)
Internal Control
CC2.3 Do client agreements and shared responsibility models communicate the client’s role in maintaining internal control? (Communicating with external parties)
Internal Control
1.1 Does the scope of the SOC 2 report include the people, processes, and systems necessary for the proper functioning of internal control? (The importance of scope)
Internal Control
1.2 Did testing procedures include observations and sampling beyond interviews? (Why demonstration is necessary to quality audits)
Internal Control
1.3 Were custom control descriptions created by the service organization to reflect the unique nature of their environment? (quality reports delivered by professional writers)
Internal Control
1.4 Is the audit firm qualified to perform the engagement? i.e. skills, experience, compliance (Choosing the right audit firm)
System Operations
CC7.2 Has vulnerability management been integrated with the build pipeline? (performing code review prior to release)
System Operations
CC7.4 Was a sample of incidents inspected to evaluate the incident response process? (incident response best practices)