SOC II
Compliance
Trusted by Leading Companies Worldwide
SOC 2 Attestation
SOC 2 compliance is an esteemed designation offered to organizations that pass the SOC 2 auditing procedure. To earn SOC 2 attestation, a service organization must meet the following five trust service principles
Security
SOC 2 auditors will assess policies, processes, and controls that have been put in place to protect systems from unauthorized access
Confidentiality
Auditors will also evaluate safeguards that have been put in place to protect confidential data during storage
Privacy
How a service provider safeguards personally identifiable information is also part of an SOC 2 audit
Availability
SOC 2 compliance requires that a service provider’s product or solution operates at the minimum performance levels promised in their service level agreement or contract
Processing Integrity
Finally, auditors evaluate how well a system achieves its intended objective
Features
1
SOC 2 Type I Overview
The SOC 2 Type I audit investigates that a company has internal controls in place for managing customer data based on five trust service principles as of a specified calendar date. It also looks to ensure those controls are designed appropriately to meet the service provider’s objectives. You can think of Type I as a snapshot in time.
2
SOC 2 Type II Overview
While the SOC 2 Type I audit investigates that a company has controls in operation as of a specified date, the SOC 2 Type II audit delves further to investigate the operational effectiveness of those controls—assessing whether or not they performed as promised over a period of time spanning from 3 consecutive months up to 1 year.
Wary of Cyber threats?
No worries. Our team is always on standby with reinforcements to ensure your organization's security and compliance
Get in Touch