A SOC 2 Type 2 report, developed by the American Institute of Certified Public Accountants (AICPA), assesses a service organization's internal controls and systems related to security, availability, processing integrity, confidentiality, and privacy, focusing on both the design and operating effectiveness of those controls over a period of time, typically 6-12 months.
Information and systems are protected against unauthorized access; unauthorized disclosure of information; and damage to systems that could compromise the availability; integrity; confidentiality; and privacy of information or systems and affect the entity's ability to meet its objectives.
The entity implements logical access security software, infrastructure, and procedures to provide security over the entity's systems and information.
The entity implements and monitors its security awareness program to ensure that personnel understand their security responsibilities.
The entity monitors system components and activity to identify security events.
The entity implements a change management process to authorize; test; approve; and implement changes to the entity's infrastructure; data; software; and procedures.
The entity performs periodic risk assessments to identify and analyze threats and vulnerabilities that could affect the security of the entity's systems and information.
The entity implements procedures to identify and address security vulnerabilities in a timely manner.
The entity develops and maintains an incident response plan to manage and recover from security incidents.
The entity implements physical security controls to protect the entity's facilities and information assets from unauthorized physical access; theft; and damage.
The entity implements controls to protect data at rest and in transit through methods such as encryption and data loss prevention techniques.
The entity implements network security controls to protect its network infrastructure from unauthorized access and malicious activity.
Information and systems are available for operation and use to meet the entity's objectives.
The entity maintains infrastructure resources to meet its availability objectives.
The entity backs up information and tests its recoverability to meet its availability objectives.
The entity develops and maintains a disaster recovery plan to ensure the entity's ability to recover from events that could significantly disrupt business operations.
The entity monitors system performance and capacity to ensure systems are available to meet processing demands.
The entity implements redundant systems and failover capabilities for critical infrastructure components.
The entity develops and maintains a comprehensive business continuity plan to address a wide range of potential disruptions.
System processing is complete; accurate; timely; and authorized to meet the entity's objectives.
The entity implements data input controls to ensure that information processed by the system is accurate; complete; and valid.
The entity implements processing controls to ensure that transactions are processed completely; accurately; and in a timely manner.
The entity implements data output controls to ensure that reports and other outputs are accurate; complete; and distributed to authorized personnel.
The entity implements procedures to identify; log; and resolve processing errors.
The entity implements policies and procedures for the retention and disposal of data to meet regulatory and business requirements.
The entity implements automated and manual data validation procedures at the point of data entry.
The entity performs regular reconciliations of data and system outputs to ensure accuracy and completeness.
The entity implements authorization controls to ensure that only authorized personnel can initiate and process transactions.
The entity logs and monitors transactions to provide an audit trail for detecting and investigating processing errors or unauthorized activities.
The entity maintains backups of data necessary to ensure the completeness and accuracy of processing in the event of a system failure or data loss.
Information designated as confidential is protected to meet the entity's objectives.
The entity identifies and classifies confidential information.
The entity protects confidential information using appropriate controls.
The entity securely disposes of confidential information when it is no longer needed.
The entity restricts access to confidential information to authorized personnel based on the principle of least privilege.
The entity uses confidentiality or non-disclosure agreements with personnel and third parties who have access to confidential information.
Personal information collected; used; retained; and disclosed is protected to meet the entity's objectives.
The entity provides notice to data subjects about the collection; use; retention; and disclosure of their personal information.
The entity provides data subjects with choices and obtains their consent regarding the collection; use; and disclosure of their personal information; where applicable.
The entity limits the collection of personal information to that which is relevant and necessary to accomplish the purposes identified in the notice.
The entity limits the use of personal information to the purposes identified in the notice and retains it only for as long as necessary to fulfill those purposes.
The entity provides data subjects with access to their personal information for review and update.
The entity controls the disclosure of personal information to third parties.
The entity implements security safeguards to protect personal information against unauthorized access; use; and disclosure.
The entity maintains accurate and complete personal information.
The entity monitors compliance with its privacy policies and procedures and has procedures to address privacy-related inquiries and complaints.
The entity assigns responsibility and establishes procedures for addressing inquiries; complaints; and disputes related to its privacy practices.
The entity provides personnel with training on its privacy policies and procedures.
The entity maintains the integrity of personal information and takes reasonable steps to ensure it is accurate; complete; and current.
The entity has procedures for enforcing its privacy policies and addressing violations.
The entity implements security measures to protect the confidentiality; integrity; and availability of personal information throughout processing.