SOC 2 controls are based on the Trust Services Criteria deemed applicable to your organization. A SOC 2 report focuses on non-financial criteria related to security, availability, confidentiality, processing integrity, and privacy. A SOC 1 report is designed to address internal controls over financial reporting, while a SOC 2 report addresses a service organization’s controls that are relevant to their operations and compliance. SOC 1 and SOC 2 reports can have a lot of overlap in the control activities that are covered in the report.
Once it has been determined whether a SOC 1 or SOC 2 is required (or both) and whether a type 1 or type 2 report will be the first report, the service organization then needs to prepare for the examination. A readiness assessment can be beneficial to validate that controls are in place to meet the control objectives or control criteria.
SOC 1 vs SOC 2 Reports
SOC 1 Reports
A SOC 1 report falls under the Statement on Standards for Attestation Engagements (SSAE) 18 AT-C 320 (formerly SSAE 16 or AT 801). It is named a SOC 1 versus the name of the standard (reports are NOT called SSAE 18s). A SOC 1 report has a financial focus that includes a service organization’s controls relevant to an audit of a service organization’s client’s financials. The service organization (with the assistance of the auditors) will figure out what the key control objectives are for the services they are providing to their clients. Control objectives will be related to both information technology processes and business processes at the service organization.
SOC 2 Reports
A SOC 2 report also falls under the SSAE 18 standard AT-C 105 and the SSAE 21 standard AT-C 205. The SOC 2 report includes a service organization’s controls that are outlined by the AICPA’s Trust Services Criteria (TSC), and that are relevant to its services, operations, and compliance. There are five available criteria that include security, availability, processing integrity, confidentiality, and privacy. The security criteria, which are also referred to as the common criteria, are the only required criteria to be included in the SOC 2. The difference between SOC 1 and SOC 2 in reference to these controls and criteria are as follows:
- In a SOC 2, controls meeting the criteria are identified and tested.
- In a SOC 1, controls meeting the identified control objectives are tested.
A service organization can choose a SOC 2 report that includes just the security/common criteria, all five criteria, or a combination of the five criteria. The interested readers of the SOC 2 report may also be compliance officers, financial execs, and financial auditors, but could also be an organization’s IT execs, regulators, or partners.
In summary of the comparison of SOC 1 vs. SOC 2 reports:
- The SOC 1 addresses internal control relevant to a service organization’s client’s financial statements.
- The SOC 2 report addresses a service organization’s controls that are relevant to its operations and compliance, as outlined by the AICPA’s Trust Services Criteria (TSCs).
A type I examination looks at the description or design of controls as of a specified date. The report for a type I includes the same sections as the type II, there is just no testing included outside of a test of one to confirm the description or design of controls.
A type II examination also looks at the design of controls, but additionally includes testing of the operating effectiveness of controls over a period of time. A type II report covers a minimum of six months (there are exceptions to this, but as a general rule six months is the minimum). The goal of an organization is to have the type II cover 12 months and then have annual type II reports to have continual coverage of controls.
If a service organization needs to get an initial report to a client or prospect quickly, the initial report can be a type I to show evidence of controls in place. If there is not a rush to get an initial report out quickly, we generally recommend starting with a type II.
Prior to deciding on the criteria to include in the SOC 2 examination, the service organization, with the help of its auditor, should determine the system and its boundaries relevant to the services that are being provided. This should include contemplation of the entire environment, including software, infrastructure, procedures, data, and people. After the scope of the examination has been determined, it can then be decided which of the criteria are pertinent to the service organization’s services and system.
For each trust services criteria (TSC) you choose to cover with your SOC 2 audit, there is a list of requirements (or “criteria”) that your auditor will assess your compliance against. Controls are what you implement to meet those requirements, and the auditor is attesting to the design and/or operating effectiveness of those controls.
If your audit covers security only, your auditor will typically be looking for 80-100 controls. As you add more TSCs to your audit (privacy, availability, processing integrity, or confidentiality), each will come with its own set of requirements that your business has to meet and controls you design and implement to satisfy them.
SOC 2 Trust Services Criteria
1 Security
Also known as the “common criteria,” security is the foundational criteria required in a SOC 2 assessment. Security focuses on the protection of information and systems against unauthorized access. It tests if your customers’ information is protected at all times (collection, creation, use, processing, transmission, and storage) along with the systems that handle it.
Security is required in any SOC audit because it not only sets overarching security standards for your company, but also overlaps with the others: setting security controls for availability, confidentiality, privacy, and processing integrity.
For example, the criteria related to risk management apply to four of the criteria (security, processing integrity, confidentiality, and availability). The common criteria establish the criteria common to all the trust services criteria and the comprehensive set of criteria for the security criteria.
When a service organization’s client wants to know their information/data is secure and protected, they are likely interested in the security criteria. This criteria is comprehensive enough that including it in the scope of the examination alone will likely be enough for service organization’s clients to get the assurance they need with respect to the security of their information/data.
2 Availability
Availability addresses network performance, downtime, security event handling, etc. This criterion makes sure your systems are secure and available for customers to use when they expect to. This is important for startups that promise customers access to their data and your services at key times.
For example, your team worked hard to get your platform’s uptime to 99.31%. By validating your uptime and other availability considerations with the availability criteria, you’re further demonstrating your reliability to your customers.
3 Confidentiality
Confidentiality addresses the handling and protection of information, personal or not, that you’ve agreed to designate confidential and secure for your customers (think of proprietary information like business plans, financial or transaction details, legal documents, etc.)
In addition to the protections outlined in the security criteria, the confidentiality criteria provide guidance for identifying, protecting, and destroying confidential information.
For example, your platform manages a customer’s documentation about their trade secrets and intellectual property. For obvious reasons, they only want people within the company (and only some of them) to have access to this sensitive information. The confidentiality criteria signal that you’re set up to protect that information and secure access as desired. It also shows that you’re set up to appropriately destroy confidential information if, say, the customer decides to stop using your platform.
4 Privacy
Privacy addresses the secure collecting, storing, and handling of personal information, like name, address, email, Social Security number, or other identification info, purchase history, criminal history, etc.
Similar to confidentiality, the privacy criteria test whether you effectively protect your customers’ personal information. Confidentiality, on the other hand, applies to any information you agreed to keep confidential.
5 Processing Integrity
Processing integrity addresses processing errors and how long it takes to detect and fix them, as well as the incident-free storage and maintenance of data. It also makes sure that any system inputs and outputs are free from unauthorized assessor manipulation. This criterion helps businesses make sure their services are delivered in an accurate, authorized, and timely manner.
For example, the processing integrity criteria demonstrate to customers that your data, processes, and system work as intended, so they don’t have to worry about inaccuracies, delays, errors and whether only authorized people can use your product.
SOC 2 Controls / Criteria List
In simplest terms, a control is a system, process, or policy you put in place in order to mitigate a bad thing from happening. A bicycle helmet is a control to help avoid a head injury!
The SOC 2 controls we list here are an overview of those you may need to implement for your SOC 2 report. The ones that are relevant to your business should be selected by your CISO and management team.
While there are many controls associated with each of the five TSCs, controls associated with the common criteria include common IT general controls.
1 Control Environment
These SOC 2 controls relate to a commitment to integrity and ethical values.
Involvement of the board of directors and senior management’s oversight relating to the development and performance of internal control.
Hold individuals accountable for their internal control responsibilities in the pursuit of objectives.
2 Communication and Information
This includes SOC 2 controls related to the internal and external use of quality information to support the functioning of internal control.
3 Risk Assessment
This requests the identification and assessment of risk relating to objectives, including fraud.
4 Monitoring Activities
Place controls related to the performance of ongoing and separate evaluations to determine deficiencies of controls and communicate those to the correct parties.
5 Control Activities
These relate to the control activities contributing to risk mitigation and policy and procedure establishment.
6 Logical and Physical Access Controls
Related to the implementation of logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet its objectives.
- Issuing of credentials to new internal and external users
- Authorization, modification, or removal of access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design
- Restriction of physical access to facilities and protected information assets to authorized personnel to meet its objectives
- Implementation of controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet its objectives.
7 System Operations
SOC 2 controls related to the use of detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities and (2) susceptibilities to newly-discovered vulnerabilities.
- Response to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.
- Monitoring of system components and the operation of those components for anomalies indicative of malicious acts, natural disasters, and errors
8 Change Management
Controls related to the authorization, design, development, testing, approval, and implementation of changes to infrastructure, data, software, and procedures to meet its objectives.
9 Risk Mitigation
Identifies, selects, and develops risk mitigation activities for risks arising from potential business disruptions.
Additional SOC 2 Criteria for Privacy, Processing Integrity, Confidentiality, Availability
In addition to the requirements attached to Security, businesses should fulfill the controls for other relevant categories based on the commitments they make to their customers.
Find examples of additional SOC 2 control categories and control types that satisfy these categories below.
10 Privacy:
Provides notice of privacy practices to relevant parties.
The notice is updated and communicated in a timely manner, including changes in the use of personal information.
11 Processing Integrity:
Obtains or generates, uses, and communicates relevant, quality information regarding the SOC 2 objectives related to processing.
This includes definitions of processed data, and product and service specifications, to support the use of products and services.
12 Confidentiality:
Identifies and maintains confidential information to meet SOC 2 objectives related to confidentiality.
- Retention and Classification
- Disposal of Information
13 Availability:
Maintains, monitors, and evaluates current processing capacity and use of system components like infrastructure, data, and software.
- System Capacity
Maintaining processing capacity and use of system components (infrastructure, data, and software) to manage demand and enable the implementation of additional capacity to help meet objectives.
- Backups and evironmental controls
- Recovery controls
SOC 2 Control Details
# |
Category |
Trust ID |
Point of Focus |
Trust Criteria |
1 |
Control Environment |
CC1.1 |
|
COSO Principle 1: The entity |
2 |
Control Environment |
CC1.1 |
1 |
Sets the Tone at the Top—The board of directors and |
3 |
Control Environment |
CC1.1 |
2 |
Establishes Standards of Conduct—The expectations of the board of |
4 |
Control Environment |
CC1.1 |
3 |
Evaluates Adherence to Standards of |
5 |
Control Environment |
CC1.1 |
4 |
Addresses Deviations in a Timely |
6 |
Control Environment |
CC1.1 |
5 |
Considers Contractors and Vendor |
7 |
Control Environment |
CC1.2 |
|
COSO Principle 2: The board of directors |
8 |
Control Environment |
CC1.2 |
1 |
Establishes Oversight |
9 |
Control Environment |
CC1.2 |
2 |
Applies Relevant Expertise—The board of directors defines, maintains, and periodically evaluates |
10 |
Control Environment |
CC1.2 |
3 |
Operates Independently—The board of directors has sufficient members who are independent from |
11 |
Control Environment |
CC1.2 |
4 |
Supplements Board Expertise—The board of directors supplements |
12 |
Control Environment |
CC1.3 |
|
COSO Principle 3: Management |
13 |
Control Environment |
CC1.3 |
1 |
Considers All Structures of the |
14 |
Control Environment |
CC1.3 |
2 |
Establishes Reporting Lines—Management designs and evaluates lines of reporting for each entity |
15 |
Control Environment |
CC1.3 |
3 |
Defines, Assigns, and Limits |
16 |
Control Environment |
CC1.3 |
4 |
Addresses Specific Requirements When |
17 |
Control Environment |
CC1.3 |
5 |
Considers Interactions With External |
18 |
Control Environment |
CC1.4 |
|
COSO Principle 4: The entity |
19 |
Control Environment |
CC1.4 |
1 |
Establishes Policies and Practices—Policies and practices reflect |
20 |
Control Environment |
CC1.4 |
2 |
Evaluates Competence and Addresses |
21 |
Control Environment |
CC1.4 |
3 |
Attracts, Develops, and Retains |
22 |
Control Environment |
CC1.4 |
4 |
Plans and Prepares for Succession—Senior management and the board of |
23 |
Control Environment |
CC1.4 |
5 |
Considers the Background of |
24 |
Control Environment |
CC1.4 |
6 |
Considers the Technical Competency |
25 |
Control Environment |
CC1.4 |
7 |
Provides Training to Maintain |
26 |
Control Environment |
CC1.5 |
|
COSO Principle 5: The entity holds |
27 |
Control Environment |
CC1.5 |
1 |
Enforces Accountability Through |
28 |
Control Environment |
CC1.5 |
2 |
Establishes Performance Measures, |
29 |
Control Environment |
CC1.5 |
3 |
Evaluates Performance Measures, |
30 |
Control Environment |
CC1.5 |
4 |
Considers Excessive Pressures—Management and the board of |
31 |
Control Environment |
CC1.5 |
5 |
Evaluates Performance and Rewards or |
32 |
Communication and Information |
CC2.1 |
|
COSO Principle 13: The entity |
33 |
Communication and Information |
CC2.1 |
1 |
Identifies Information Requirements—A process is in place to identify the information required and expected |
34 |
Communication and Information |
CC2.1 |
2 |
Captures Internal and External |
35 |
Communication and Information |
CC2.1 |
3 |
Processes Relevant Data Into |
36 |
Communication and Information |
CC2.1 |
4 |
Maintains Quality Throughout |
37 |
Communication and Information |
CC2.2 |
|
COSO Principle 14: The entity |
38 |
Communication and Information |
CC2.2 |
1 |
Communicates Internal Control |
39 |
Communication and Information |
CC2.2 |
2 |
Communicates With the Board of |
40 |
Communication and Information |
CC2.2 |
3 |
Provides Separate Communication |
41 |
Communication and Information |
CC2.2 |
4 |
Selects Relevant Method of |
42 |
Communication and Information |
CC2.2 |
5 |
Communicates Responsibilities—Entity personnel with |
43 |
Communication and Information |
CC2.2 |
6 |
Communicates Information on |
44 |
Communication and Information |
CC2.2 |
7 |
Communicates Objectives and Changes |
45 |
Communication and Information |
CC2.2 |
8 |
Communicates Information to Improve |
46 |
Communication and Information |
CC2.2 |
9 |
Communicates Information About |
47 |
Communication and Information |
CC2.2 |
10 |
Communicates System Objectives—The entity communicates its |
48 |
Communication and Information |
CC2.2 |
11 |
Communicates System Changes—System changes that affect |
49 |
Communication and Information |
CC2.3 |
|
COSO Principle 15: The entity |
50 |
Communication and Information |
CC2.3 |
1 |
Communicates to External Parties—Processes are in place to communicate relevant and timely information |
51 |
Communication and Information |
CC2.3 |
2 |
Enables Inbound Communications—Open communication channels allow input from customers, consumers, |
52 |
Communication and Information |
CC2.3 |
3 |
Communicates With the Board of |
53 |
Communication and Information |
CC2.3 |
4 |
Provides Separate Communication |
54 |
Communication and Information |
CC2.3 |
5 |
Selects Relevant Method of |
55 |
Communication and Information |
CC2.3 |
6 |
Communicates Objectives Related to |
56 |
Communication and Information |
CC2.3 |
7 |
Communicates Objectives Related to |
57 |
Communication and Information |
CC2.3 |
8 |
Communicates Information About |
58 |
Communication and Information |
CC2.3 |
9 |
Communicates System Objectives—The entity communicates its system objectives to |
59 |
Communication and Information |
CC2.3 |
10 |
Communicates System Responsibilities—External users with responsibility |
60 |
Communication and Information |
CC2.3 |
11 |
Communicates Information on |
61 |
Risk Assessment |
CC3.1 |
|
COSO Principle 6: The entity |
62 |
Risk Assessment |
CC3.1 |
1 |
Reflects Management’s Choices—Operations objectives reflect |
63 |
Risk Assessment |
CC3.1 |
2 |
Considers Tolerances for Risk—Management considers the acceptable |
64 |
Risk Assessment |
CC3.1 |
3 |
Includes Operations and Financial |
65 |
Risk Assessment |
CC3.1 |
4 |
Forms a Basis for Committing of |
66 |
Risk Assessment |
CC3.1 |
5 |
Complies With Applicable Accounting |
67 |
Risk Assessment |
CC3.1 |
6 |
Considers Materiality—Management considers materiality in |
68 |
Risk Assessment |
CC3.1 |
7 |
Reflects Entity Activities—External reporting reflects the |
69 |
Risk Assessment |
CC3.1 |
8 |
Complies With Externally Established |
70 |
Risk Assessment |
CC3.1 |
9 |
Considers the Required Level of |
71 |
Risk Assessment |
CC3.1 |
10 |
Reflects Entity Activities—External reporting reflects the |
72 |
Risk Assessment |
CC3.1 |
11 |
Reflects Management’s Choices—Internal reporting provides |
73 |
Risk Assessment |
CC3.1 |
12 |
Considers the Required Level of |
74 |
Risk Assessment |
CC3.1 |
13 |
Reflects Entity Activities—Internal reporting reflects the |
75 |
Risk Assessment |
CC3.1 |
14 |
Reflects External Laws and |
76 |
Risk Assessment |
CC3.1 |
15 |
Considers Tolerances for Risk—Management considers the acceptable |
77 |
Risk Assessment |
CC3.1 |
16 |
Establishes Sub-objectives to |
78 |
Risk Assessment |
CC3.2 |
|
COSO Principle 7: The entity |
79 |
Risk Assessment |
CC3.2 |
1 |
Includes Entity, Subsidiary, |
80 |
Risk Assessment |
CC3.2 |
2 |
Analyzes Internal and External |
81 |
Risk Assessment |
CC3.2 |
3 |
Involves Appropriate Levels of |
82 |
Risk Assessment |
CC3.2 |
4 |
Estimates Significance of Risks |
83 |
Risk Assessment |
CC3.2 |
5 |
Determines How to Respond to Risks—Risk assessment includes |
84 |
Risk Assessment |
CC3.2 |
6 |
Identifies and Assesses Criticality |
85 |
Risk Assessment |
CC3.2 |
7 |
Analyzes Threats and Vulnerabilities |
86 |
Risk Assessment |
CC3.2 |
8 |
Considers the Significance of the |
87 |
Risk Assessment |
CC3.3 |
|
COSO Principle 8: The entity |
88 |
Risk Assessment |
CC3.3 |
1 |
Considers Various Types of Fraud—The assessment of fraud considers fraudulent reporting, possible loss |
89 |
Risk Assessment |
CC3.3 |
2 |
Assesses Incentives and Pressures—The assessment of fraud risks considers incentives and pressures. |
90 |
Risk Assessment |
CC3.3 |
3 |
Assesses Opportunities—The assessment of fraud risk considers opportunities for unauthorized |
91 |
Risk Assessment |
CC3.3 |
4 |
Assesses Attitudes and Rationalizations—The assessment of fraud risk considers how management and other |
92 |
Risk Assessment |
CC3.3 |
5 |
Considers the Risks Related to the |
93 |
Risk Assessment |
CC3.4 |
|
COSO Principle 9: The entity |
94 |
Risk Assessment |
CC3.4 |
1 |
Assesses Changes in the External |
95 |
Risk Assessment |
CC3.4 |
2 |
Assesses Changes in the Business |
96 |
Risk Assessment |
CC3.4 |
3 |
Assesses Changes in Leadership—The entity considers changes in management and respective attitudes and |
97 |
Risk Assessment |
CC3.4 |
4 |
Assess Changes in Systems and |
98 |
Risk Assessment |
CC3.4 |
5 |
Assess Changes in Vendor and |
99 |
Monitoring Activities |
CC4.1 |
|
COSO Principle 16: The entity |
100 |
Monitoring Activities |
CC4.1 |
1 |
Considers a Mix of Ongoing and |
101 |
Monitoring Activities |
CC4.1 |
2 |
Considers Rate of Change—Management considers the rate of |
102 |
Monitoring Activities |
CC4.1 |
3 |
Establishes Baseline Understanding—The design and current state of an internal control system are used to |
103 |
Monitoring Activities |
CC4.1 |
4 |
Uses Knowledgeable Personnel—Evaluators performing ongoing and |
104 |
Monitoring Activities |
CC4.1 |
5 |
Integrates With Business Processes—Ongoing evaluations are built into |
105 |
Monitoring Activities |
CC4.1 |
6 |
Adjusts Scope and Frequency—Management varies the scope and frequency of separate evaluations |
106 |
Monitoring Activities |
CC4.1 |
7 |
Objectively Evaluates—Separate evaluations are performed periodically to provide objective |
107 |
Monitoring Activities |
CC4.1 |
8 |
Considers Different Types of Ongoing |
108 |
Monitoring Activities |
CC4.2 |
|
COSO Principle 17: The entity |
109 |
Monitoring Activities |
CC4.2 |
1 |
Assesses Results—Management and the board of directors, as appropriate, assess results |
110 |
Monitoring Activities |
CC4.2 |
2 |
Communicates Deficiencies—Deficiencies are communicated to parties responsible for taking |
111 |
Monitoring Activities |
CC4.2 |
3 |
Monitors Corrective Action—Management tracks whether deficiencies are remedied on a timely basis. |
112 |
Control Activities |
CC5.1 |
|
COSO Principle 10: The entity |
113 |
Control Activities |
CC5.1 |
1 |
Integrates With Risk Assessment—Control activities help ensure that |
114 |
Control Activities |
CC5.1 |
2 |
Considers Entity-Specific Factors—Management considers how the environment, |
115 |
Control Activities |
CC5.1 |
3 |
Determines Relevant Business |
116 |
Control Activities |
CC5.1 |
4 |
Evaluates a Mix of Control Activity |
117 |
Control Activities |
CC5.1 |
5 |
Considers at What Level Activities |
118 |
Control Activities |
CC5.1 |
6 |
Addresses Segregation of Duties—Management segregates incompatible |
119 |
Control Activities |
CC5.2 |
|
COSO Principle 11: The entity also |
120 |
Control Activities |
CC5.2 |
1 |
Determines Dependency Between the |
121 |
Control Activities |
CC5.2 |
2 |
Establishes Relevant Technology |
122 |
Control Activities |
CC5.2 |
3 |
Establishes Relevant Security |
123 |
Control Activities |
CC5.2 |
4 |
Establishes Relevant Technology |
124 |
Control Activities |
CC5.3 |
|
COSO Principle 12: The entity |
125 |
Control Activities |
CC5.3 |
1 |
Establishes Policies and Procedures |
126 |
Control Activities |
CC5.3 |
2 |
Establishes Responsibility and |
127 |
Control Activities |
CC5.3 |
3 |
Performs in a Timely Manner—Responsible personnel perform control activities in a timely manner as |
128 |
Control Activities |
CC5.3 |
4 |
Takes Corrective Action—Responsible personnel investigate and act on matters identified as a |
129 |
Control Activities |
CC5.3 |
5 |
Performs Using Competent Personnel—Competent personnel with sufficient authority perform control |
130 |
Control Activities |
CC5.3 |
6 |
Reassesses Policies and Procedures—Management periodically reviews |
131 |
Logical and Physical Access Controls |
CC6.1 |
|
The entity implements logical access |
132 |
Logical and Physical Access Controls |
CC6.1 |
1 |
Identifies and Manages the Inventory |
133 |
Logical and Physical Access Controls |
CC6.1 |
2 |
Restricts Logical Access—Logical access to information |
134 |
Logical and Physical Access Controls |
CC6.1 |
3 |
Identifies and Authenticates Users—Persons, infrastructure and |
135 |
Logical and Physical Access Controls |
CC6.1 |
4 |
Considers Network Segmentation—Network segmentation permits |
136 |
Logical and Physical Access Controls |
CC6.1 |
5 |
Manages Points of Access—Points of access by outside |
137 |
Logical and Physical Access Controls |
CC6.1 |
6 |
Restricts Access to Information |
138 |
Logical and Physical Access Controls |
CC6.1 |
7 |
Manages Identification and |
139 |
Logical and Physical Access Controls |
CC6.1 |
8 |
Manages Credentials for |
140 |
Logical and Physical Access Controls |
CC6.1 |
9 |
Uses Encryption to Protect Data—The entity uses encryption to |
141 |
Logical and Physical Access Controls |
CC6.1 |
10 |
Protects Encryption Keys—Processes are in place to protect |
142 |
Logical and Physical Access Controls |
CC6.2 |
|
Prior to issuing system credentials |
143 |
Logical and Physical Access Controls |
CC6.2 |
1 |
Controls Access Credentials to |
144 |
Logical and Physical Access Controls |
CC6.2 |
2 |
Removes Access to Protected Assets |
145 |
Logical and Physical Access Controls |
CC6.2 |
3 |
Reviews Appropriateness of Access |
146 |
Logical and Physical Access Controls |
CC6.3 |
|
The entity authorizes, modifies, or |
147 |
Logical and Physical Access Controls |
CC6.3 |
1 |
Creates or Modifies Access to |
148 |
Logical and Physical Access Controls |
CC6.3 |
2 |
Removes Access to Protected |
149 |
Logical and Physical Access Controls |
CC6.3 |
3 |
Uses Role-Based Access Controls—Role-based access control is |
150 |
Logical and Physical Access Controls |
CC6.4 |
|
The entity restricts physical access |
151 |
Logical and Physical Access Controls |
CC6.4 |
1 |
Creates or Modifies Physical Access—Processes are in place to create or modify physical |
152 |
Logical and Physical Access Controls |
CC6.4 |
2 |
Removes Physical Access—Processes are in place to remove |
153 |
Logical and Physical Access Controls |
CC6.4 |
3 |
Reviews Physical Access—Processes are in place to periodically review |
154 |
Logical and Physical Access Controls |
CC6.5 |
|
The entity discontinues logical and |
155 |
Logical and Physical Access Controls |
CC6.5 |
1 |
Identifies Data and Software for |
156 |
Logical and Physical Access Controls |
CC6.5 |
2 |
Removes Data and Software From |
157 |
Logical and Physical Access Controls |
CC6.6 |
|
The entity implements logical access |
158 |
Logical and Physical Access Controls |
CC6.6 |
1 |
Restricts Access—The types of activities that can |
159 |
Logical and Physical Access Controls |
CC6.6 |
2 |
Protects Identification and |
160 |
Logical and Physical Access Controls |
CC6.6 |
3 |
Requires Additional Authentication |
161 |
Logical and Physical Access Controls |
CC6.6 |
4 |
Implements Boundary Protection |
162 |
Logical and Physical Access Controls |
CC6.7 |
|
The entity restricts the |
163 |
Logical and Physical Access Controls |
CC6.7 |
1 |
Restricts the Ability to Perform |
164 |
Logical and Physical Access Controls |
CC6.7 |
2 |
Uses Encryption Technologies or |
165 |
Logical and Physical Access Controls |
CC6.7 |
3 |
Protects Removal Media—Encryption technologies and |
166 |
Logical and Physical Access Controls |
CC6.7 |
4 |
Protects Mobile Devices—Processes are in place to protect |
167 |
Logical and Physical Access Controls |
CC6.8 |
|
The entity implements controls to |
168 |
Logical and Physical Access Controls |
CC6.8 |
1 |
Restricts Application and Software |
169 |
Logical and Physical Access Controls |
CC6.8 |
2 |
Detects Unauthorized Changes to |
170 |
Logical and Physical Access Controls |
CC6.8 |
3 |
Uses a Defined Change Control |
171 |
Logical and Physical Access Controls |
CC6.8 |
4 |
Uses Antivirus and Anti-Malware |
172 |
Logical and Physical Access Controls |
CC6.8 |
5 |
Scans Information Assets from |
173 |
System Operations |
CC7.1 |
|
To meet its objectives, the entity |
174 |
System Operations |
CC7.1 |
1 |
Uses Defined Configuration Standards—Management has defined |
175 |
System Operations |
CC7.1 |
2 |
Monitors Infrastructure and Software—The entity monitors infrastructure |
176 |
System Operations |
CC7.1 |
3 |
Implements Change-Detection |
177 |
System Operations |
CC7.1 |
4 |
Detects Unknown or Unauthorized |
178 |
System Operations |
CC7.1 |
5 |
Conducts Vulnerability Scans—The entity conducts vulnerability |
179 |
System Operations |
CC7.2 |
|
The entity monitors system |
180 |
System Operations |
CC7.2 |
1 |
Implements Detection Policies, |
181 |
System Operations |
CC7.2 |
2 |
Designs Detection Measures—Detection measures are designed to |
182 |
System Operations |
CC7.2 |
3 |
Implements Filters to Analyze |
183 |
System Operations |
CC7.2 |
4 |
Monitors Detection Tools for |
184 |
System Operations |
CC7.3 |
|
The entity evaluates security events |
185 |
System Operations |
CC7.3 |
1 |
Responds to Security Incidents—Procedures are in place for |
186 |
System Operations |
CC7.3 |
2 |
Communicates and Reviews Detected |
187 |
System Operations |
CC7.3 |
3 |
Develops and Implements Procedures |
188 |
System Operations |
CC7.3 |
4 |
Assesses the Impact on Personal |
189 |
System Operations |
CC7.3 |
5 |
Determines Personal Information Used |
190 |
System Operations |
CC7.4 |
|
The entity responds to identified |
191 |
System Operations |
CC7.4 |
1 |
Assigns Roles and Responsibilities—Roles and responsibilities for the |
192 |
System Operations |
CC7.4 |
2 |
Contains Security Incidents—Procedures are in place to contain security |
193 |
System Operations |
CC7.4 |
3 |
Mitigates Ongoing Security Incidents—Procedures are in place to mitigate |
194 |
System Operations |
CC7.4 |
4 |
Ends Threats Posed by Security |
195 |
System Operations |
CC7.4 |
5 |
Restores Operations—Procedures are |
196 |
System Operations |
CC7.4 |
6 |
Develops and Implements |
197 |
System Operations |
CC7.4 |
7 |
Obtains Understanding of Nature of |
198 |
System Operations |
CC7.4 |
8 |
Remediates Identified |
199 |
System Operations |
CC7.4 |
9 |
Communicates Remediation Activities—Remediation activities are |
200 |
System Operations |
CC7.4 |
10 |
Evaluates the Effectiveness of |
201 |
System Operations |
CC7.4 |
11 |
Periodically Evaluates Incidents—Periodically, management reviews |
202 |
System Operations |
CC7.4 |
12 |
Communicates Unauthorized Use and |
203 |
System Operations |
CC7.4 |
13 |
Application of Sanctions—The conduct of individuals and |
204 |
System Operations |
CC7.5 |
|
The entity identifies, develops, and |
205 |
System Operations |
CC7.5 |
1 |
Restores the Affected Environment—The activities restore the affected |
206 |
System Operations |
CC7.5 |
2 |
Communicates Information About the |
207 |
System Operations |
CC7.5 |
3 |
Determines Root Cause of the Event—The root cause of the event is |
208 |
System Operations |
CC7.5 |
4 |
Implements Changes to Prevent and |
209 |
System Operations |
CC7.5 |
5 |
Improves Response and Recovery |
210 |
System Operations |
CC7.5 |
6 |
Implements Incident Recovery Plan |
211 |
Change Management |
CC8.1 |
|
The entity authorizes, designs, |
212 |
Change Management |
CC8.1 |
1 |
Manages Changes Throughout the |
213 |
Change Management |
CC8.1 |
2 |
Authorizes Changes—A process is in place to authorize |
214 |
Change Management |
CC8.1 |
3 |
Designs and Develops Changes—A process is in place to design and |
215 |
Change Management |
CC8.1 |
4 |
Documents Changes—A process is in place to document |
216 |
Change Management |
CC8.1 |
5 |
Tracks System Changes—A process is in place to track |
217 |
Change Management |
CC8.1 |
6 |
Configures Software—A process is in place to select and |
218 |
Change Management |
CC8.1 |
7 |
Tests System Changes—A process is in place to test |
219 |
Change Management |
CC8.1 |
8 |
Approves System Changes—A process is in place to approve |
220 |
Change Management |
CC8.1 |
9 |
Deploys System Changes—A process is in place to implement |
221 |
Change Management |
CC8.1 |
10 |
Identifies and Evaluates System |
222 |
Change Management |
CC8.1 |
11 |
Identifies Changes in |
223 |
Change Management |
CC8.1 |
12 |
Creates Baseline Configuration of IT |
224 |
Change Management |
CC8.1 |
13 |
Provides for Changes Necessary in |
225 |
Change Management |
CC8.1 |
14 |
Protects Confidential Information—The entity protects confidential |
226 |
Change Management |
CC8.1 |
15 |
Protects Personal Information—The entity protects personal |
227 |
Risk Mitigation |
CC9.1 |
|
The entity identifies, selects, and |
228 |
Risk Mitigation |
CC9.1 |
1 |
Considers Mitigation of Risks of |
229 |
Risk Mitigation |
CC9.1 |
2 |
Considers the Use of Insurance to |
230 |
Risk Mitigation |
CC9.2 |
|
The entity assesses and manages |
231 |
Risk Mitigation |
CC9.2 |
1 |
Establishes Requirements for Vendor |
232 |
Risk Mitigation |
CC9.2 |
2 |
Assesses Vendor and Business Partner |
233 |
Risk Mitigation |
CC9.2 |
3 |
Assigns Responsibility and |
234 |
Risk Mitigation |
CC9.2 |
4 |
Establishes Communication Protocols |
235 |
Risk Mitigation |
CC9.2 |
5 |
Establishes Exception Handling |
236 |
Risk Mitigation |
CC9.2 |
6 |
Assesses Vendor and Business Partner |
237 |
Risk Mitigation |
CC9.2 |
7 |
Implements Procedures for Addressing |
238 |
Risk Mitigation |
CC9.2 |
8 |
Implements Procedures for |
239 |
Risk Mitigation |
CC9.2 |
9 |
Obtains Confidentiality Commitments |
240 |
Risk Mitigation |
CC9.2 |
10 |
Assesses Compliance With |
241 |
Risk Mitigation |
CC9.2 |
11 |
Obtains Privacy Commitments from |
242 |
Risk Mitigation |
CC9.2 |
12 |
Assesses Compliance with Privacy |
243 |
Additional Criteria For Availability |
A1.1 |
|
The entity maintains, monitors, and |
244 |
Additional Criteria For Availability |
A1.1 |
1 |
Measures Current Usage—The use of |
245 |
Additional Criteria For Availability |
A1.1 |
2 |
Forecasts Capacity—The expected average and peak use |
246 |
Additional Criteria For Availability |
A1.1 |
3 |
Makes Changes Based on Forecasts—The system change management |
247 |
Additional Criteria For Availability |
A1.2 |
|
The entity authorizes, designs, |
248 |
Additional Criteria For Availability |
A1.2 |
1 |
Identifies Environmental Threats—As part of the risk assessment |
249 |
Additional Criteria For Availability |
A1.2 |
2 |
Designs Detection Measures—Detection measures are implemented |
250 |
Additional Criteria For Availability |
A1.2 |
3 |
Implements and Maintains |
251 |
Additional Criteria For Availability |
A1.2 |
4 |
Implements Alerts to Analyze |
252 |
Additional Criteria For Availability |
A1.2 |
5 |
Responds to Environmental Threat |
253 |
Additional Criteria For Availability |
A1.2 |
6 |
Communicates and Reviews Detected |
254 |
Additional Criteria For Availability |
A1.2 |
7 |
Determines Data Requiring Backup—Data is evaluated to determine |
255 |
Additional Criteria For Availability |
A1.2 |
8 |
Performs Data Backup—Procedures are in place for backing |
256 |
Additional Criteria For Availability |
A1.2 |
9 |
Addresses Offsite Storage—Back-up data is stored in a |
257 |
Additional Criteria For Availability |
A1.2 |
10 |
Implements Alternate Processing |
258 |
Additional Criteria For Availability |
A1.3 |
|
The entity tests recovery plan |
259 |
Additional Criteria For Availability |
A1.3 |
1 |
Implements Business Continuity Plan |
260 |
Additional Criteria For Availability |
A1.3 |
2 |
Tests Integrity and Completeness of |
261 |
Additional Criteria For |
C1.1 |
|
The entity identifies and maintains |
262 |
Additional Criteria For |
C1.1 |
1 |
Identifies Confidential information—Procedures are in place to identify |
263 |
Additional Criteria For |
C1.1 |
2 |
Protects Confidential Information |
264 |
Additional Criteria For |
C1.2 |
|
The entity disposes of confidential |
265 |
Additional Criteria For |
C1.2 |
1 |
Identifies Confidential Information |
266 |
Additional Criteria For |
C1.2 |
2 |
Destroys Confidential Information—Procedures are in place to erase or |
267 |
Additional Criteria For Processing |
PI1.1 |
|
The entity obtains or generates, |
268 |
Additional Criteria For Processing |
PI1.1 |
|
Identifies Information |
269 |
Additional Criteria For Processing |
PI1.1 |
|
Defines Data Necessary to Support a |
270 |
Additional Criteria For Processing |
PI1.1 |
|
(1) The definition |
271 |
Additional Criteria For Processing |
PI1.1 |
|
(2) The definition |
272 |
Additional Criteria For Processing |
PI1.1 |
|
— The |
273 |
Additional Criteria For Processing |
PI1.1 |
|
— The nature of |
274 |
Additional Criteria For Processing |
PI1.1 |
|
— Source(s) of |
275 |
Additional Criteria For Processing |
PI1.1 |
|
— The unit(s) |
276 |
Additional Criteria For Processing |
PI1.1 |
|
— The |
277 |
Additional Criteria For Processing |
PI1.1 |
|
— The |
278 |
Additional Criteria For Processing |
PI1.1 |
|
— The date the |
279 |
Additional Criteria For Processing |
PI1.1 |
|
— The factors |
280 |
Additional Criteria For Processing |
PI1.1 |
|
(3) The definition |
281 |
Additional Criteria For Processing |
PI1.1 |
|
(4) The |
282 |
Additional Criteria For Processing |
PI1.2 |
|
The entity implements policies and |
283 |
Additional Criteria For Processing |
PI1.2 |
1 |
Defines Characteristics of |
284 |
Additional Criteria For Processing |
PI1.2 |
2 |
Evaluates Processing Inputs—Processing inputs are evaluated for |
285 |
Additional Criteria For Processing |
PI1.2 |
3 |
Creates and Maintains Records of |
286 |
Additional Criteria For Processing |
PI1.3 |
|
The entity implements policies and |
287 |
Additional Criteria For Processing |
PI1.3 |
1 |
Defines Processing Specifications—The processing specifications that |
288 |
Additional Criteria For Processing |
PI1.3 |
2 |
Defines Processing Activities—Processing activities are defined |
289 |
Additional Criteria For Processing |
PI1.3 |
3 |
Detects and Corrects Production |
290 |
Additional Criteria For Processing |
PI1.3 |
4 |
Records System Processing Activities—System processing activities are |
291 |
Additional Criteria For Processing |
PI1.3 |
5 |
Processes Inputs—Inputs are processed completely, |
292 |
Additional Criteria For Processing |
PI1.4 |
|
The entity implements policies and |
293 |
Additional Criteria For Processing |
PI1.4 |
1 |
Protects Output—Output is protected when stored or |
294 |
Additional Criteria For Processing |
PI1.4 |
2 |
Distributes Output Only to Intended |
295 |
Additional Criteria For Processing |
PI1.4 |
3 |
Distributes Output Completely and |
296 |
Additional Criteria For Processing |
PI1.4 |
4 |
Creates and Maintains Records of |
297 |
Additional Criteria For Processing |
PI1.5 |
|
The entity implements policies and |
298 |
Additional Criteria For Processing |
PI1.5 |
1 |
Protects Stored Items—Stored items are protected to |
299 |
Additional Criteria For Processing |
PI1.5 |
2 |
Archives and Protects System Records—System records are archived, and |
300 |
Additional Criteria For Processing |
PI1.5 |
3 |
Stores Data Completely and |
301 |
Additional Criteria For Processing |
PI1.5 |
4 |
Creates and Maintains Records of |
302 |
Additional Criteria For Privacy |
P1.0 |
|
Privacy Criteria Related to Notice |
303 |
Additional Criteria For Privacy |
P1.1 |
|
The entity provides notice to data |
304 |
Additional Criteria For Privacy |
|
|
Communicates to Data Subjects—Notice is provided to data |
305 |
Additional Criteria For Privacy |
|
|
— Purpose for |
306 |
Additional Criteria For Privacy |
|
|
— Choice and |
307 |
Additional Criteria For Privacy |
|
|
— Types of |
308 |
Additional Criteria For Privacy |
|
|
— Methods of |
309 |
Additional Criteria For Privacy |
|
|
— Use, |
310 |
Additional Criteria For Privacy |
|
|
— Access |
311 |
Additional Criteria For Privacy |
|
|
— Disclosure to |
312 |
Additional Criteria For Privacy |
|
|
— Security for |
313 |
Additional Criteria For Privacy |
|
|
— Quality, |
314 |
Additional Criteria For Privacy |
|
|
— Monitoring |
315 |
Additional Criteria For Privacy |
|
|
If personal information is collected |
316 |
Additional Criteria For Privacy |
|
|
Provides Notice to Data Subjects—Notice is provided to data subjects |
317 |
Additional Criteria For Privacy |
|
|
Covers Entities and Activities in |
318 |
Additional Criteria For Privacy |
|
|
Uses Clear and Conspicuous Language—The entity’s privacy |
319 |
Additional Criteria For Privacy |
P2.0 |
|
Privacy Criteria Related to Choice |
320 |
Additional Criteria For Privacy |
P2.1 |
|
The entity communicates choices |
321 |
Additional Criteria For Privacy |
P2.1 |
1 |
Communicates to Data Subjects—Data subjects are informed (a) |
322 |
Additional Criteria For Privacy |
P2.1 |
2 |
Communicates Consequences of Denying |
323 |
Additional Criteria For Privacy |
P2.1 |
3 |
Obtains Implicit or Explicit Consent—Implicit or explicit consent is |
324 |
Additional Criteria For Privacy |
P2.1 |
4 |
Documents and Obtains Consent for |
325 |
Additional Criteria For Privacy |
P2.1 |
5 |
Obtains Explicit Consent for |
326 |
Additional Criteria For Privacy |
P2.1 |
6 |
Obtains Consent for Data Transfers—Consent is obtained before personal |
327 |
Additional Criteria For Privacy |
P3.0 |
|
Privacy Criteria Related to |
328 |
Additional Criteria For Privacy |
P3.1 |
|
Personal information is collected |
329 |
Additional Criteria For Privacy |
P3.1 |
1 |
Limits the Collection of Personal |
330 |
Additional Criteria For Privacy |
P3.1 |
2 |
Collects Information by Fair and |
331 |
Additional Criteria For Privacy |
P3.1 |
3 |
Collects Information From Reliable |
332 |
Additional Criteria For Privacy |
P3.1 |
4 |
Informs Data Subjects When |
333 |
Additional Criteria For Privacy |
P3.2 |
|
For information requiring explicit |
334 |
Additional Criteria For Privacy |
P3.2 |
1 |
Obtains Explicit Consent for |
335 |
Additional Criteria For Privacy |
P3.2 |
2 |
Documents Explicit Consent to Retain |
336 |
Additional Criteria For Privacy |
P4.0 |
|
Privacy Criteria Related to Use, |
337 |
Additional Criteria For Privacy |
P4.1 |
|
The entity limits the use of |
338 |
Additional Criteria For Privacy |
P4.1 |
1 |
Uses Personal Information for |
339 |
Additional Criteria For Privacy |
P4.2 |
|
The entity retains personal |
340 |
Additional Criteria For Privacy |
P4.2 |
1 |
Retains Personal Information—Personal information is retained |
341 |
Additional Criteria For Privacy |
P4.2 |
2 |
Protects Personal Information—Policies and procedures have been |
342 |
Additional Criteria For Privacy |
P4.3 |
|
The entity securely disposes of |
343 |
Additional Criteria For Privacy |
P4.3 |
1 |
Captures, Identifies, and Flags |
344 |
Additional Criteria For Privacy |
P4.3 |
2 |
Disposes of, Destroys, and Redacts |
345 |
Additional Criteria For Privacy |
P4.3 |
3 |
Destroys Personal Information—Policies and procedures are |
346 |
Additional Criteria For Privacy |
P5.0 |
|
Privacy Criteria Related to Access |
347 |
Additional Criteria For Privacy |
P5.1 |
|
The entity grants identified and |
348 |
Additional Criteria For Privacy |
P5.1 |
1 |
Authenticates Data Subjects’ |
349 |
Additional Criteria For Privacy |
P5.1 |
2 |
Permits Data Subjects Access to |
350 |
Additional Criteria For Privacy |
P5.1 |
3 |
Provides Understandable Personal |
351 |
Additional Criteria For Privacy |
P5.1 |
4 |
Informs Data Subjects If Access Is |
352 |
Additional Criteria For Privacy |
P5.2 |
|
The entity corrects, amends, or |
353 |
Additional Criteria For Privacy |
P5.2 |
1 |
Communicates Denial of Access |
354 |
Additional Criteria For Privacy |
P5.2 |
2 |
Permits Data Subjects to Update or |
355 |
Additional Criteria For Privacy |
P5.2 |
3 |
Communicates Denial of Correction |
356 |
Additional Criteria For Privacy |
P6.0 |
|
Privacy Criteria Related to |
357 |
Additional Criteria For Privacy |
P6.1 |
|
The entity discloses personal |
358 |
Additional Criteria For Privacy |
P6.1 |
1 |
Communicates Privacy Policies to |
359 |
Additional Criteria For Privacy |
P6.1 |
2 |
Discloses Personal Information Only |
360 |
Additional Criteria For Privacy |
P6.1 |
3 |
Discloses Personal Information Only |
361 |
Additional Criteria For Privacy |
P6.1 |
4 |
Discloses Information to Third |
362 |
Additional Criteria For Privacy |
P6.2 |
|
The entity creates and retains a |
363 |
Additional Criteria For Privacy |
P6.2 |
1 |
Creates and Retains Record of |
364 |
Additional Criteria For Privacy |
P6.3 |
|
The entity creates and retains a |
365 |
Additional Criteria For Privacy |
P6.3 |
1 |
Creates and Retains Record of |
366 |
Additional Criteria For Privacy |
P6.4 |
|
The entity obtains privacy |
367 |
Additional Criteria For Privacy |
P6.4 |
1 |
Discloses Personal Information Only |
368 |
Additional Criteria For Privacy |
P6.4 |
2 |
Remediates Misuse of Personal |
369 |
Additional Criteria For Privacy |
P6.5 |
|
The entity obtains commitments from |
370 |
Additional Criteria For Privacy |
P6.5 |
1 |
Remediates Misuse of Personal |
371 |
Additional Criteria For Privacy |
P6.5 |
2 |
Reports Actual or Suspected |
372 |
Additional Criteria For Privacy |
P6.6 |
|
The entity provides notification of |
373 |
Additional Criteria For Privacy |
P6.6 |
1 |
Remediates Misuse of Personal |
374 |
Additional Criteria For Privacy |
P6.6 |
2 |
Provides Notice of Breaches and |
375 |
Additional Criteria For Privacy |
P6.7 |
|
The entity provides data subjects |
376 |
Additional Criteria For Privacy |
P6.7 |
1 |
Identifies Types of Personal |
377 |
Additional Criteria For Privacy |
P6.7 |
2 |
Captures, Identifies, and |
378 |
Additional Criteria For Privacy |
P7.0 |
|
Privacy Criteria Related to Quality |
379 |
Additional Criteria For Privacy |
P7.1 |
|
The entity collects and maintains |
380 |
Additional Criteria For Privacy |
P7.1 |
1 |
Ensures Accuracy and Completeness of |
381 |
Additional Criteria For Privacy |
P7.1 |
2 |
Ensures Relevance of Personal |
382 |
Additional Criteria For Privacy |
P8.0 |
|
Privacy Criteria Related to |
383 |
Additional Criteria For Privacy |
P8.1 |
|
The entity implements a process for |
384 |
Additional Criteria For Privacy |
P8.1 |
1 |
Communicates to Data Subjects—Data subjects are informed about |
385 |
Additional Criteria For Privacy |
P8.1 |
2 |
Addresses Inquiries, Complaints, and |
386 |
Additional Criteria For Privacy |
P8.1 |
3 |
Documents and Communicates Dispute |
387 |
Additional Criteria For Privacy |
P8.1 |
4 |
Documents and Reports Compliance |
388 |
Additional Criteria For Privacy |
P8.1 |
5 |
Documents and Reports Instances of |
389 |
Additional Criteria For Privacy |
P8.1 |
6 |
Performs Ongoing Monitoring—Ongoing procedures are performed |