How to Execute a SOC 2 Report — From Planning to Distribution

How to Execute a SOC 2 Report — From Planning to Distribution

Many companies are employing System and Organization Controls reports before procuring vendors' services.

Cybercrime continues to be a growing threat to businesses. The Identity Theft Resource Center reported that in 2018, hackers pilfered almost 447 million records that contained personal information. Security lapses in some of the world's biggest companies, such as Toyota and Facebook, continue to appear in headlines, and information security is a business priority.

In response, many companies are employing System and Organization Controls reports before procuring vendors' services. These reports no longer merely connect service providers to users — they are now on par with the 10-K with audited financial statements.

The SOC 2 — and What It Means for Business

One of the most common SOC reports for information security, SOC 2, leverages what are known as the Trust Services Criteria. They are categorized in terms of security, availability, confidentiality, processing integrity, and privacy — all of which are critical to the operation of a business.

The criteria are aligned with the Committee of Sponsoring Organizations of the Treadway Commission's 17 internal control framework principles, but SOC 2 can also serve as a reporting framework to include several other common standards, such as the National Institute of Standards and Technology's Cybersecurity Framework, ISO 27001, and Cloud Security Alliance or regulatory subject matter such as HIPAA.

For these reasons, SOC 2 reports provide a good option for businesses looking to have a standardized way to report on a number of key areas. In addition, these reports can be provided to demonstrate how a company is meeting its commitments to its customers. That can make the difference between an enthusiastic new client ready to close new business and one that blocks a deal due to security concerns.

Steps for Executing a SOC 2 Report

Despite their usefulness, many businesses are unclear about how to execute a SOC 2 report. So let’s take a look at the basic steps required to plan, conduct, and ultimately distribute them.

1. Assign ownership and responsibilities for the SOC 2 program.

Designate an individual on the management team who would (or already does) own your information security and compliance initiatives. A chief information security officer is ideal, but there are other alternatives for companies not in a position to have a standalone CISO role. Commitment and buy-in from leadership is critical. Also, define who owns the project management of a future SOC report. This person should have expertise with information technology, security, and compliance.

This role should report directly to management to ensure that support for the project reaches the highest levels of the company.

2. Determine the scope and boundaries.

Those involved with adopting SOC 2 reporting should identify what matters to customers and their stakeholders, including regulatory requirements. This information is typically documented in contracts, service agreements, terms of use, and other paperwork.

As this material is reviewed, those overseeing SOC 2 reporting should ask themselves key questions, including "Which Trust Services Criteria are relevant to our commitments to customers?" and "Which period of time should be covered by the examination?"

In addition, it's good to start with the end in mind, so consider when the report will be delivered. Examination periods should be six to 12 months and are typically annual reports. However, first-year reports might have shortened periods or even a point-in-time report in the event the service provider would like to show "good faith" prior to establishing an annual reporting cycle in subsequent years.

Next, identify which systems support the commitments to customers. For example, a software-as-a-service company's web application is the product, but what are the underlying infrastructure, people, and processes that safeguard the data in scope? This would include questions regarding system monitoring tools for proper functioning and security, operating systems, and the teams responsible for maintaining them.

3. Perform a gap assessment, and fix any issues.

Identify the controls currently in place — and those that are missing — to safeguard the confidentiality, integrity, and availability of data. A gap assessment by the independent audit firm conducting the SOC 2 examination or a firm familiar with SOC 2 reporting is recommended.

Following this analysis, companies should have a clear road map of what needs to be fixed ahead of a SOC 2 examination. Common gaps include a lack of governance-related documentation such as policies, procedures, and risk assessment. Common technical system gaps include a lack of access management over both human and non-human accounts, as well as a lack of change management evidence for secure development and testing. Remediation might also include forming a security committee or establishing a CISO-equivalent role to oversee the security program.

If formal security policies and procedures are not in place, the company should document, approve, and communicate a set of security policies and procedures throughout the organization.

4. Formally implement controls.

At this stage, you are ready to implement controls. This process begins with assigning an owner for each of them.

For example, a product manager might own change management controls over feature quality assurance and testing of the SaaS application. In contrast, a security officer typically owns controls related to the security program, such as managing security policies and incident management procedures, whereas a DevOps engineer might carry more responsibilities with secure coding practices within the deployment pipelines. Each has his or her domain of oversight.

All of their actions should ensure evidence is retained in a format that company management and auditors can inspect. These would include documented approvals for access requests in the ticketing system, as well as meeting minutes and a risk register from risk assessment meetings. They would also include the results from business continuity testing, disaster recovery plans, and even periodic user access reviews of in-scope systems.

5. Finalize the system description.

The system description is a critical section that company management is responsible for preparing in a final SOC 2 report. It describes the background of the company, the scope of services provided, and a more detailed look at the infrastructure, software, people, procedures, and data associated with the system under audit. The description should also include the control activities in place, as well as the responsibilities of user entities (customers) and subservice organizations (vendors).

6. Be prepared for the examination.

Most of the tasks in this phase will be driven by auditor requests, but companies should know what to expect so they can fulfill those requests effectively. A typical step at this stage is gathering evidence based on the document or information request list provided by auditors. These lists often include system queries, information regarding changes, new hires, terminations, policies and procedures, authentication configurations, backup schedules, and other data. Team members should also schedule time with auditors and each control owner to ensure they have all the information they need to form an opinion on the control activities.

7. Finalize and distribute the report.

The final step is to review the SOC 2 report with the auditors to address the completeness and accuracy of the content. After the draft is approved, you will then provide the auditor with a signed management representation letter attesting to the accuracy of the data provided during the audit.

It’s important at this step to determine how you will distribute the report. A SOC 2 should be restricted to management and those who have a need for the information or the knowledge necessary to make effective use of the report. One option is to create a standard nondisclosure agreement that report recipients must sign in order to receive a copy. You can also publish a press release announcing the successful completion of the SOC 2 examination with instructions on how to request a copy.

Given that 80 percent of business leaders in IT anticipate a cyberattack, companies need to be prepared to address questions over information security and compliance when conducting business. Executing and distributing a SOC 2 report can be a key strategy. By following these steps, your team can be assured that it has conducted the process of creating a SOC 2 report effectively and carefully. It can then serve as a key indicator of your company's commitment to customers and security.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3