What Are Complementary Subservice Organization Controls And How Do They Impact SOC Reports?

Service organizations typically outsource functions such as data center hosting or transaction processing, to outside vendors, referred to as subservice organizations. Depending on the nature of the function outsourced, user entities may require information about the controls that are in place to mitigate the risk presented by the service they’re providing to the service organization.  When the carve-out method is used for presenting a subservice organization, and controls at the subservice organization, in combination with controls at the service organization, are necessary in order to achieve a control objective (SOC 1) or a trust services criteria (SOC 2), the controls performed by the subservice organization are referred to as complementary subservice organization controls (CSOCs).

When an instance like this occurs, service organizations must incorporate CSOCs into their SOC reports. The CSOCs need to be specific to the services provided by the service organization’s system. The description of the service organization’s system needs to describe the subservice organization’s responsibility for implementing CSOCs and indicate that the service organization can only achieve the specific control objectives or applicable trust services criteria if the CSOCs are suitably designed and, in a type 2 examination, operating effectively throughout the period.

Service organization management may request the service auditor’s assistance when determining how to present the CSOCs in the description. For example, the service auditor may be able to provide examples of CSOC disclosures made by others and can make recommendations to improve the presentation of the CSOCs in the description.

Examples of the types of CSOCs a subservice organization is assumed to have implemented include the following:

  • Controls relevant to the completeness and accuracy of transaction processing on behalf of the service organization.
  • Controls relevant to the completeness and accuracy of specified reports provided to and used by the service organization.
  • General IT controls relevant to the processing performed for the service organization

For more on subservice organization controls, contact a professional at Schneider Downs.

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2022 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on
Benefits of a Trusted Co-Source Audit Partner During the Great Resignation
Business Continuity and Disaster Recovery Planning
What Should a Service Organization Consider When Determining Its SOC Report Testing Period?
Benefits of a Contract Lifecycle Management System
What is blockchain? How can I secure my blockchain environment?
The Benefits of a Compliance Automation Platform
Register to receive our weekly newsletter with our most recent columns and insights.
Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us
contact us

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.