A SOC 2 Type 1 report, developed by the American Institute of Certified Public Accountants (AICPA), assesses a service organization's internal controls and systems related to security, availability, processing integrity, confidentiality, and privacy, focusing on both the design and operating effectiveness of those controls over a period of time, typically 6-12 months.
Information and systems are protected against unauthorized access; unauthorized disclosure of information; and damage to systems that could compromise the availability; integrity; confidentiality; and privacy of information or systems and affect the entity’s ability to meet its objectives.
Protection of information assets from unauthorized physical and logical access.
Cultivating a security-conscious culture through training and awareness programs.
Managing and monitoring IT infrastructure to ensure its security and availability.
Implementing measures to protect data throughout its lifecycle.
Protecting the physical environment and access to IT assets.
Identifying and analyzing potential security risks to the organization's information assets.
Ongoing monitoring of systems and logs to detect security incidents and anomalies.
Establishing and maintaining an incident response plan to effectively manage security incidents.
Implementing procedures to identify; assess; and remediate security vulnerabilities in a timely manner.
Protecting the network infrastructure from unauthorized access and malicious activity.
Information and systems are available for operation and use to meet the entity’s objectives.
Ensuring the reliability and uptime of the underlying IT infrastructure.
Maintaining backups of critical data and having the ability to restore systems in case of an outage.
Having a plan in place to recover IT systems and business operations after a significant disruption.
Continuously monitoring system performance and capacity to ensure optimal availability.
Implementing redundant systems and automated failover capabilities for critical components.
Developing and maintaining a comprehensive business continuity plan to address various potential disruptions.
System processing is complete; accurate; timely; and authorized to meet the entity’s objectives.
Ensuring the accuracy and completeness of data entered into the system.
Ensuring that data is processed correctly and as intended.
Ensuring the accuracy and completeness of information produced by the system.
Implementing procedures to identify; log; and resolve processing errors.
Establishing and enforcing policies for the retention and secure disposal of data.
Implementing automated and manual data validation procedures to ensure data accuracy.
Performing regular reconciliations of data and system outputs to ensure accuracy and completeness.
Information designated as confidential is protected to meet the entity’s objectives.
Defining and classifying information that requires confidentiality protection.
Implementing controls to safeguard confidential information throughout its lifecycle.
Restricting access to confidential information to authorized personnel based on the principle of least privilege.
Using confidentiality or non-disclosure agreements with personnel and third parties who have access to confidential information.
Personal information collected; used; retained; and disclosed is protected to meet the entity’s objectives.
Providing data subjects with notice about the collection; use; retention; and disclosure of their personal information.
Providing data subjects with choices and obtaining their consent regarding the collection; use; and disclosure of their personal information; where applicable.
Limiting the collection of personal information to that which is relevant and necessary to accomplish the purposes identified in the notice.
Limiting the use of personal information to the purposes identified in the notice and retaining it only for as long as necessary to fulfill those purposes.
Providing data subjects with access to their personal information for review and update.
Controlling the disclosure of personal information to third parties.
Implementing security safeguards to protect personal information against unauthorized access; use; and disclosure.
Maintaining accurate and complete personal information.
Monitoring compliance with its privacy policies and procedures and having procedures to address privacy-related inquiries and complaints.
Assigning responsibility and establishing procedures for addressing inquiries; complaints; and disputes related to its privacy practices.
Providing personnel with training on its privacy policies and procedures.
Maintaining the integrity of personal information and taking reasonable steps to ensure it is accurate; complete; and current.