HOW IT WORKS

1 SCOPE DETERMINATION

Here we understand the business context. We discuss the need and requirements of SOC 2 under the current set of IT infrastructure of the company.

2 GAP ANALYSIS

It includes asset identification, risk assessment, and existing control identification. Based on the Trust Service Principles, we conduct gap analysis to check deviation under security, availability, processing integrity, confidentiality and privacy controls in the organisation.

3 IMPLEMENTATION

In this phase we help implement a detailed set of controls like Multifactor Authentication, Encryption, Access Controls to ensure that the service infrastructure follows the SysTrust and WebTrust principles. We then conduct an efficiency check to determine the efficiency of the controls introduced.

4 INTERNAL AUDIT

Under this phase we securely check whether the controls implemented and the processes introduced are being followed in the organisation.

5 CERTIFICATION

It is carried out by independent auditors (generally a US-based CPA), not by the implementers. We help you find suitable auditor for the certification process and help throughout the process.

ADVANTAGES

  • Ensure the security, availability, processing integrity, confidentiality and privacy of your organisation.
  • Improve the degree of trust in the service offerings of your organisations among your prospective clients.
  • Gain better understanding of risk management in service industry.
  • SOC2 is custom made for outsourced service providers, hence handles risk mitigation better than other compliances.
  • Offer your clients, a separate audit report focusing on internal controls and not just the financial controls as highlighted in the other SOC versions.