Here we understand the business context. We discuss the need and requirements of SOC 2 under the current set of IT infrastructure of the company.
It includes asset identification, risk assessment, and existing control identification. Based on the Trust Service Principles, we conduct gap analysis to check deviation under security, availability, processing integrity, confidentiality and privacy controls in the organisation.
In this phase we help implement a detailed set of controls like Multifactor Authentication, Encryption, Access Controls to ensure that the service infrastructure follows the SysTrust and WebTrust principles. We then conduct an efficiency check to determine the efficiency of the controls introduced.
Under this phase we securely check whether the controls implemented and the processes introduced are being followed in the organisation.
It is carried out by independent auditors (generally a US-based CPA), not by the implementers. We help you find suitable auditor for the certification process and help throughout the process.