S4-m1 Flashcards
Outsources Payroll Processors
Service organization that provide payroll services
Financial IT Outsourcing Services
Financial institutions that provide IT based transaction processing services such as servicing loans, payment processing, and asset management
What is the purpose of a SOC engagement?
to assess the effectiveness of a service organizations controls. These engagements, which result in the issuance of a SOC report, promote reliance by third parties on service organizations
SOC 1 for Services Organizations
Internal Control over Financial Reporting:
The examination and reporting on controls at a service organization that are likely to be relevant to user entities internal control over financial reporting
Are SOC 1 reports restricted?
They are restricted to management of the service organization, user entities of the service organization system, and the independent auditor. Does not include potential users of the service organization
SOC 2 for Service Organization
Trust Services Criteria:
The examination and reporting on the security, availability, or processing integrity of a system, or the confidentiality or privacy of the information processed by the system (AICPA 5 trust service criteria)
Who are SOC 2 reports intended for?
Intended for use by those who have sufficient knowledge and understanding of the service organization, the services it provides, and the system used to provide those services, among other matters.
What does it mean to have sufficient knowledge?
knowledge of:
-nature of the service provided by the user organization
-service organizations system interactions with user entities, subservice organizations, and other parties
-Internal control and its limitations
-complementary user entity controls
-complementary subservice organizational controls
-user entity responsibilities and their impact to effectively use the service organizations services
-the applicable trust services criteria
-risk
SOC 3 for the Service Organization
Trust Service Criteria for General Use Report:
Similar to the requirements and guidance for performing a SOC 2 engagement, the service auditor reports on whether controls within the system were effective to provide reasonable assurance that the service organization service commitments and system requirements were achieved based on the applicable trust service criteria
-ordinarily for general users who need assurance about controls at a service organization relevant to security, availability, processing integrity, confidentiality, or privacy, but lack the knowledge and understanding for a SOC 2
ALWAYS A TYPE 2 REPORT
What is the reporting difference between a SOC 2 and a SOC 3?
a SOC 3 report does not include a description of the system (detailed controls within the system are not disclosed), a description of the service auditors tests of controls, and the results thereof.
SOC for Cybersecurity Engagement
Examine and report on a description of the entities cybersecurity risk management program and the effectiveness of controls with that program
SOC for Supply Chain Engagement
Examine and report on an entity’s controls over the security, availability, processing integrity, confidentiality, or privacy of a system used to produce, manufacture, or distribute products
Type 1 Report
a report on the fairness of the presentation of managements description of the service organizations system and the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date
Type 2
A report on the fairness of the presentation of managements description of the service organizations system and the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the description throughout a specified period
What is a Type 1 & 2 report comprised of?
- managements description of the service organizations system
- written assertion by management of the service organization about whether, as of a specified date on the criteria
- a report that expresses an opinion on matters described above
Criteria for written assertion by management
-managements description of the system fairly presents the service organizations system that was designed and implemented
-controls related to the control objectives stated in the managements description of the system were suitably designed to achieve those control objectives
Key difference between Type 1 and Type 2 SOC reports?
A type 1 covers the system design as of a given point in time whereas a Type 2 covers both the design and operating effectiveness over a period of time
AICPA trust service criteria CAPPS
-security
-availability
-processing integrity
-confidentiality
-privacy
What trust service criteria is addressed in most trust service engagements?
Security because security controls are generally a primary area of focus for system users because organizations and their customers and business partners have an increased dependence on technology and concerns about cybersecurity risks and their impact on operational processes.
Confidentiality
Information designated as confidential is protected to meet the entity’s objectives
Availability
Information and systems are available for operation and use to meet the entity’s objectives
Processing integrity
System processing is complete, valid, accurate, timely, and authorize to meet the entity’s objectives