If you would like to add to our FAQs page please use our Contact form to submit the request.
Security Certifications
SOC 2 (System and Organization Controls 2) Type 2 certification is an auditing procedure that ensures service providers securely manage data to protect the interests and privacy of their clients. It is a cybersecurity compliance framework developed by the American Institute of Certified Public Accountants (AICPA). The primary purpose of SOC 2 is to ensure that third-party service providers store and process client data in a secure manner. The criteria for these audits are based on five “trust service principles”:
- Security: The system is protected against unauthorized access.
- Availability: The system is available for operation and use as committed or agreed.
- Processing Integrity: System processing is complete, valid, accurate, timely, and authorized.
- Confidentiality: Information designated as confidential is protected as committed or agreed.
- Privacy: Personal information is collected, used, retained, disclosed, and disposed of in conformity with the commitments in the entity’s privacy notice.
A SOC 2 Type 2 certification report provides detailed information and assurance about the controls in place over a period of time (typically six months to a year). Unlike ISO certifications, there is no central body that accredits firms for SOC 2. Instead, the American Institute of Certified Public Accountants (AICPA) sets the standards for SOC 2, and licensed CPAs perform the audits. Organizations undergo an examination process by independent CPA SOC auditors (accredited by the AICPA), and if they meet the AICPA’s criteria, they receive a SOC 2 report.
ISO/IEC 27001 is an international standard for managing information security. It specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS). The ISO 27001 Compliance standard is designed to ensure the selection of adequate and proportionate security controls.
Key aspects include:
- Context of the Organization: Understanding the organization and its context, as well as the needs and expectations of interested parties.
- Leadership: Commitment from top management and assignment of roles and responsibilities. Planning: Addressing risks and opportunities, setting information security objectives, and planning to achieve them.
- Support: Ensuring resources, competence, awareness, communication, and documented information.
- Operation: Planning, implementing, and controlling processes to meet ISMS requirements.
- Performance Evaluation: Monitoring, measurement, analysis, and evaluation of the ISMS.
- Improvement: Continual improvement of the ISMS.
ISO 27001 compliance involves implementing an ISMS and undergoing a certification process with periodic audits to maintain certification. See https://anab.ansi.org/ or https://www.iso.org/home.html for the certification process.