{"id":293,"date":"2022-11-18T17:25:00","date_gmt":"2022-11-18T17:25:00","guid":{"rendered":"https:\/\/wordpress-851255-3513096.cloudwaysapps.com\/?p=293"},"modified":"2024-12-10T20:19:55","modified_gmt":"2024-12-10T20:19:55","slug":"what-is-soc-2","status":"publish","type":"post","link":"https:\/\/wordpress.staging.certn.co\/anz\/blog\/what-is-soc-2\/","title":{"rendered":"What Is SOC 2"},"content":{"rendered":"\n<p>Developed by the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.aicpa.org\/home\" target=\"_blank\">Association of International Certified Professional Accountants<\/a>&nbsp;(AICPA), Service Organization Control (SOC) 2 is an auditing procedure that verifies companies have internal controls in place to protect sensitive data, and that the controls are operating continuously.<\/p>\n\n\n\n<p>Released in 2010, it quickly became a standard for software as a service (SaaS) companies and managed service providers. <strong>SOC 2 is voluntary, so not all companies need to be compliant to operate, but if you deal with data and store data in the cloud, earning a clean audit can improve your ability to sign new clients and get ahead of the competition.<\/strong><\/p>\n\n\n\n<p>Below we break down the different designations and the benefits of becoming compliant if you aren\u2019t already. Of course, we also cover&nbsp;<a href=\"https:\/\/wordpress.staging.certn.co\/what-is-soc2-compliance-how-backgroundchecks-help-you-get-there\/\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/wordpress.staging.certn.co\/what-is-soc2-compliance-how-backgroundchecks-help-you-get-there\" rel=\"noreferrer noopener\">how background checks help achieve SOC 2 compliance<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SOC 1 vs SOC 2<\/h3>\n\n\n\n<p>SOC 2 implies the existence of others, of which there are several. In total, there are actually three: SOC 1, SOC 2, and SOC 3 \u2014 all simultaneously released in 2010 by the AICPA.<\/p>\n\n\n\n<p>It\u2019s worth noting that they were all developed and released at the same time because it can be easy to assume that SOC 2 is an evolution of #1, or that SOC 3 is an upgraded and more comprehensive version of the second one. But that\u2019s not the case. Rather, each type covers something a little different.<\/p>\n\n\n\n<p>This means that you don\u2019t need to get #1 before getting #2, or that #3 provides more benefits than #2.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Different Types of SOC<\/h3>\n\n\n\n<p>The table below outlines the different types:<\/p>\n\n\n<div class=\"wp-block-image certn-blogimage\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1024\" height=\"805\" data-src=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/2022-11-18-SOC-1-vs.-SOC-2-Comparison-1024x805-1.webp\" alt=\"Infographic describing SOC 1 versus SOC 2\" class=\"wp-image-8628 lazyload\" data-srcset=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/2022-11-18-SOC-1-vs.-SOC-2-Comparison-1024x805-1.webp 1024w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/2022-11-18-SOC-1-vs.-SOC-2-Comparison-1024x805-1-300x236.webp 300w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/2022-11-18-SOC-1-vs.-SOC-2-Comparison-1024x805-1-768x604.webp 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/805;\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">SOC Compliance Types<\/h3>\n\n\n\n<p>Within SOC 2 (and SOC 1), there are two subtypes: Type 1 and Type 2.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SOC 2 Type 1<\/h3>\n\n\n\n<p>This type examines whether your company met the requirements for SOC 2 compliance on a specific date, it\u2019s a snapshot in time.<\/p>\n\n\n\n<p>Due its short time span and smaller scope, Type 1 can be useful when working under a tight deadline. However, because it\u2019s less comprehensive, clients may not be as interested in seeing it. They\u2019ll likely be looking for a report that demonstrates continuous compliance over a longer period of time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SOC 2 Type 2<\/h3>\n\n\n\n<p>This type determines whether a company has maintained continuous SOC 2 compliance over a long period of time, rather than at a specific point in time.<\/p>\n\n\n\n<p>Typically, Type 2 reports cover several months to a year. The time frame they cover can\u2019t exceed a year, though, which means that for a company to remain compliant, it must regularly undergo audits. <strong>When people talk about SOC 2 compliance, this is typically the subtype they\u2019re referring to or are looking for.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SOC 2 Compliance Checklist<\/h3>\n\n\n\n<p>Is there a checklist? No, not exactly.<\/p>\n\n\n\n<p>Because the needs of a company depend on a number of factors, including its size, customer base, industry, and processes, achieving a clean audit isn\u2019t about meeting a standard checklist. Rather, it\u2019s about demonstrating that you\u2019ve implemented custom processes necessary to maintain your specific company\u2019s security standards, and having their effectiveness and rigor validated by an outside auditor.<\/p>\n\n\n\n<p>To achieve this level of compliance, your custom policies must be rooted in the five&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/us.aicpa.org\/interestareas\/frc\/assuranceadvisoryservices\/socforserviceorganizations\" target=\"_blank\">Trust Service Criteria<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security<\/li>\n\n\n\n<li>Privacy<\/li>\n\n\n\n<li>Confidentiality<\/li>\n\n\n\n<li>Processing Integrity<\/li>\n\n\n\n<li>Availability<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image certn-blogimage\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"975\" height=\"993\" data-src=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-Diagram.webp\" alt=\"soc 2 diagram\" class=\"wp-image-8629 lazyload\" data-srcset=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-Diagram.webp 975w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-Diagram-295x300.webp 295w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-Diagram-768x782.webp 768w\" data-sizes=\"(max-width: 975px) 100vw, 975px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 975px; --smush-placeholder-aspect-ratio: 975\/993;\" \/><\/figure>\n<\/div>\n\n\n<p>As we outlined in this blog post that describes how\u00a0<a href=\"\/blog\/what-is-soc2-compliance-how-backgroundchecks-help-you-get-there\" target=\"_blank\" rel=\"noreferrer noopener\">background checks help SOC 2 compliance<\/a>, the security principle is a mandatory TSC, whereas controls for the principles can be included at the discretion of your management. You only need to adopt controls that apply to your business.<\/p>\n\n\n\n<div class=\"hs-cta-embed hs-cta-simple-placeholder hs-cta-embed-174438046514\"\n  style=\"max-width:100%; max-height:100%; width:800px;height:285.28125px\" data-hubspot-wrapper-cta-id=\"174438046514\">\n  <a href=\"https:\/\/cta-service-cms2.hubspot.com\/web-interactives\/public\/v1\/track\/redirect?encryptedPayload=AVxigLISF8Ih784mu10aIzVnmiIWPuq8EDjmuuYo0lBx%2FQIXgh88ot%2BqD5wpjMVHrr0URJhkpmtPwOJMXkdVgjfZMeB%2BQljLAKiZKGLgs8CrC%2BIpDG1BVhiK%2BqoqANtCz%2FH0hSbF70BDdrOH19%2BjFD6y5wlbjpovod3m3DC13eW1JoNXuPq0nyELf3Ojv8YAbozcgzU%3D&#038;webInteractiveContentId=174438046514&#038;portalId=2697060\" target=\"_blank\" rel=\"noopener\" crossorigin=\"anonymous\">\n    <img decoding=\"async\" alt=\"Certn_Lockup_FC\" data-src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2697060\/interactive-174438046514.png\" style=\"height: 100%; width: 100%; object-fit: fill\"\n      onerror=\"this.style.display='none'\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/>\n  <\/a>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of SOC 2 Compliance<\/h2>\n\n\n\n<p>This kind of commitment to information security has benefits to many companies because mismanaged data can leave businesses vulnerable to growing cyber attacks and data breaches. Aside from distinguishing your brand as trustworthy and enhancing your reputation, the security controls protect your business from cyber attacks and data breaches.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full certn-blogimage\"><img decoding=\"async\" width=\"1024\" height=\"533\" data-src=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/Why-SOC-2-compliance-1024x533-1.webp\" alt=\"Lock image representing SOC 2 security\" class=\"wp-image-8630 lazyload\" data-srcset=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/Why-SOC-2-compliance-1024x533-1.webp 1024w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/Why-SOC-2-compliance-1024x533-1-300x156.webp 300w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/Why-SOC-2-compliance-1024x533-1-768x400.webp 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/533;\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Third-Party Risk Management<\/h3>\n\n\n\n<p>According to a <a href=\"https:\/\/www.youtube.com\/watch?v=utqP5wvBrCQ\" target=\"_blank\" rel=\"noreferrer noopener\">Splunk Global Research<\/a> survey of over 1,200 global security leaders,\u00a090% of organizations reported that they\u2019ve increased their focus on third-party risk assessment as a result of recent cyber attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full certn-blogimage\"><img decoding=\"async\" width=\"1024\" height=\"533\" data-src=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-audit-1024x533-1.webp\" alt=\"Image depicting SOC 2 audit\" class=\"wp-image-8631 lazyload\" data-srcset=\"https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-audit-1024x533-1.webp 1024w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-audit-1024x533-1-300x156.webp 300w, https:\/\/wordpress.staging.certn.co\/wp-content\/uploads\/2023\/05\/SOC-2-audit-1024x533-1-768x400.webp 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/533;\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">SOC 2 Competitive Advantage<\/h3>\n\n\n\n<p>SOC 2 is as recognized as ISO 27001 is in North America. In fact, some companies, especially in the United States, will only do business with partners and vendors that are certified to prove they\u2019ve implemented security controls to protect customer data. Without it, you might miss out on revenue.<\/p>\n\n\n\n<p>Other businesses that rely on outsourcing arrangements are also driving adoption:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Software as a service (SaaS)<\/li>\n\n\n\n<li>Infrastructure as a service (IaaS)<\/li>\n\n\n\n<li>Platform as a service (PaaS)<\/li>\n\n\n\n<li>Managed service providers<\/li>\n<\/ul>\n\n\n\n<p>By nature, early-stage startups have smaller security teams, so having SOC can set you apart as a trustworthy partner.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Uphold Cybersecurity Regulations<\/h3>\n\n\n\n<p>Regulated industries that are undergoing a major flux due to technological innovation like health care, financial services, and education are likely to benefit from certification because it gives investors, partners, vendors, and customers extra assurance. It&#8217;s the same way that background checks give you extra peace of mind.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SOC 2 Compliance Automation &#8211; The Certn Difference<\/h2>\n\n\n\n<p>Compiling the documentation you need and putting in place continuous IT vendor monitoring can be daunting. Fortunately, there are leading information security platforms designed to make the process as easy as possible. Even better? Certn&#8217;s\u00a0<a href=\"\/partnerships-integrations\/\" target=\"_blank\" rel=\"noreferrer noopener\">background checks API<\/a> means we integrate with many of them.<\/p>\n\n\n\n<p>We&#8217;ve partnered with industry leaders to integrate background checks into their platforms, making it easier to keep track of all your compliance efforts. One of our partners, Drata, offers a compliance solution that features automated monitoring and evidence collection that alert you of any failed controls (like incomplete background checks) to keep you audit-ready at all times.<\/p>\n\n\n\n<p>If you\u2019re ready to get started on the background checks required to achieve SOC 2 compliance,\u00a0<a href=\"\/request-a-quote\/\" target=\"_blank\" rel=\"noreferrer noopener\">book a demo<\/a>\u00a0to learn more about how Certn and our partners can help.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/request-a-quote\/\" target=\"_blank\" rel=\"noreferrer noopener\">Book a Demo<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Developed by the\u00a0Association of International Certified Professional Accountants\u00a0(AICPA), Service Organization Control (SOC) 2 is an auditing procedure that verifies companies have internal controls in place to protect sensitive data, and that the controls are operating continuously.<\/p>\n","protected":false},"author":52,"featured_media":20212,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[46,18],"tags":[154],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","category-security","tag-background-checks-for-soc-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":15,"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":28386,"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/posts\/293\/revisions\/28386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/media\/20212"}],"wp:attachment":[{"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.staging.certn.co\/anz\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}