S4 Flashcards
A SOC 1®
report is used to examine and report on controls at a service organization that are likely to be relevant to the user entity’s internal control over financial reporting.
SOC 2®
report covering the applicable trust services criteria (security, confidentiality, and privacy). The SOC 2® report is intended for use by those who have sufficient knowledge and understanding of the service organization, the services provided, and the system used to provide such services.
will require the service auditor to provide an opinion on:
(1) whether the description of the service organization’s system is presented in accordance with the description criteria throughout a specified period of time;
(2) whether the controls stated in the description were suitably designed to provide reasonable assurance that the service commitments and system requirements were achieved based on the applicable trust services criteria throughout a period of time; and
(3) whether the controls stated in the description operated effectively throughout a specified period of time to provide reasonable assurance that the service commitments and system requirements were achieved based on the applicable trust services criteria.
A SOC 3®
report on the trust services criteria (security, availability, processing integrity, confidentiality, or privacy), but it is intended for general use by those who lack an understanding of the service organization, their services, or their system.
NO OPINION- report does not include a description of the system (detailed controls within the system are not disclosed), a description of the service auditor’s tests of controls, and the results thereof.
SOC for Supply Chain Engagement
used to examine and report on an entity’s controls over a system used to produce, manufacture, or distribute products.
Service and Organization Controls (SOC)
Type 1 vs. Type 2 report :
A Type 1 report covers the design of controls at a given point in time, whereas a Type 2 report covers both the design and operating effectiveness of controls over a period of time.
SOC engagement
trust services
Set the outcomes (confidentiality, availability, processing integrity, privacy, and security) that should be met as a result of effective controls. Effective controls help an entity to achieve its objectives.
security trust services
ensuring that information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity’s ability to meet its objectives.
privacy trust services
relates to ensuring personal information is collected, used, retained, disclosed, and disposed of to meet the entity’s objectives
I.E. collect personal data, obtain consent when collecting and using that data, using data for specific purposes only, and managing access to individuals’ data responsibly
availability trust services
KEY: el sistema aun esta disponible pq tienen un plan de recovery.
ensuring information and systems are available for operation and use to meet the entity’s objectives.
I.E. The entity tests its recovery plan procedures to ensure system recovery meets entity objectives.
processing integrity trust services
KEY: Integrity= ACCURATE /integra ... a tiempo
ensuring system processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.
trust services criteria
is NOT for IC over Financial Reporting (Not SOC 1)
Its applicable for SOC 2 (type 1 & 2) & SOC for cybersecurity
trust services categories
A service auditor must address the common criteria for all trust services categories and additional specific criteria for availability, processing integrity, confidentiality, and privacy.
OJO: There are no additional specific criteria related to security.
trust services criteria are NOT controls, but rather OUTCOMES
trust services criteria are NOT controls, but rather OUTCOMES
Control activities
KEY: Actividad =fisica (pysical access) y operacion
controls over logical and physical access, system operations, change management, and risk mitigation are classified as =CONTROL ACTIVITIES …..NOT environment.
Adverse OP
material and pervasive issue is identified
Disclaimer OP
when sufficient and appropriate evidence cannot be obtained on which to base the opinion & possible effects on the subject matters of undetected misstatements, if any, could be both material and pervasive
Qualified OP
material but not pervasive
i.e. deficiencies in the suitability of the design of only one control had an impact on the achievement of a control objective but did not affect other controls or control objectives
Unmodified OP
No issues… (not material not pervasive)
subservice organization
entity used by the service organization to provide services to user entities to provide reasonable assurance that the service commitments and system requirements would be achieved
i.e. third party that provides relevant services and controls that are necessary in combination with the service organization’s controls
system description documented by the management in a SOC 2® engagement
The description enables report users to understand the system, the processing and flow of data throughout and from the system, and the procedures and controls in place to manage risk.