Learn more about the latest ESG updates from the SEC. ...
One of the most common questions we hear from clients and colleagues is how do you scope a SOC 2 audit? Based on our experience, here are some best practices for determining the scope of your audit.
First, choose the services that will be in scope.
Next, for each included service, determine the following components that make up the boundaries of the system:
Third, determine which SOC 2 Categories (Availability, Confidentiality, Processing Integrity, Privacy) should be included in addition to the Security Category.
Schneider Downs employs a unique approach to SOC reports, integrating the expertise of information technology, internal audit and external audit professionals. By combining cross-disciplinary knowledge and project management expertise, we are able to effectively deliver on our clients' expectations. If you are interested in learning how we can assist your organization, please contact us to get started or learn more about our practice at www.schneiderdowns.com/soc.
With SOC 2 reports, organizations decide which categories to include in the scope of the examination. This flexibility means reports are unique to each company, while providing a consistent framework to evaluate whether organizations meet the criteria for the categories included in the examination. These examinations are designed for a broad range of users that need information and assurance about the controls at a service organization relevant to security, availability and processing integrity of the systems the service organization uses to process users’ data, and the confidentiality and privacy of the information processed by these systems. The use of this report is restricted. These reports can play an important role in oversight of the organization, vendor management programs, and internal corporate governance and risk management processes.