Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016



Similar documents
SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Service Organization Control Reports

Information for Management of a Service Organization

Documentation of Use of a Type 2 Service Auditor s Report In an Audit of an Employee Benefit Plan s Financial Statements

Goodbye, SAS 70! Hello, SSAE 16!

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Shared Service System Audits: What User Management and Auditors Need to Know

The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011

New Flood Insurance Regulations What You Need to Know. Brian M. Shea, CRCM, CAMS

Vendor Management Best Practices

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Understanding changes to the Trust Services Principles for SOC 2 reporting

3.B METHODOLOGY SERVICE PROVIDER

SECURITY AND EXTERNAL SERVICE PROVIDERS

A Guide to HMDA Reporting

Service Organization Control (SOC) Reports

SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) reports What are they?

SRA International Managed Information Systems Internal Audit Report

FAQs New Service Organization Standards and Implementation Guidance

SSAE 16 Everything You Wanted To Know But Are Afraid To Ask. Kurt Hagerman CISA, CISSP, QSA Managing Director, Coalfire December 8, 2011

SAS No. 70, Service Organizations

3 rd Party Vendor Risk Management

Reporting on Controls at a Service Organization

Asset Manager Guide to SAS 70. Issue Date: October 7, Asset

SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships

Frequently asked questions: SOC 2 and 3

Service Organization Controls. Managing Risks by Obtaining a Service Auditor s Report

Farewell to SAS 70. What you need to know about the New Standard for Service Organization Reporting

Microsoft s Compliance Framework for Online Services

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

SSAE 16 and ISAE 3402: Preparing for New Service Company Control Standards Mastering Requirements Governing Your Next Controls Report

Third Party Risk Management 12 April 2012

BASIS FOR CONCLUSIONS Canadian Standard on Assurance Engagements (CSAE) 3416, Reporting on Controls at a Service Organization

Information Technology Internal Audit Report

Ayla Networks, Inc. SOC 3 SysTrust 2015

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

SECTION I INDEPENDENT SERVICE AUDITOR S REPORT

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Security from a customer s perspective. Halogen s approach to security

Service Organization Controls. Managing Risks by Obtaining a Service Auditor s Report

Here comes SSAE 16 SAS 70 EVOLUTION: How will the new standard affect my business? How do I prepare to meet the new requirements?

Anypoint Platform Cloud Security and Compliance. Whitepaper

Connecting the dots: IT to Business

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Cloud Vendor Evaluation

Cybersecurity: What CFO s Need to Know

WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Guide to Understanding SAS 70 Reports

Understanding SAS 70 Reports on Internal Control

Stone Vault, LLC SOC 1 (SSAE NO. 16) TYPE 1 REPORT ON CONTROLS PLACED IN OPERATION FOR TAX RETURN AND FINANCIAL STATEMENT PORTAL SERVICES

John Essner, CISO Office of Information Technology State of New Jersey

INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS (ISAE) 3402 ASSURANCE REPORTS ON CONTROLS AT A SERVICE ORGANIZATION

Relevant COSO Principles. Policies and procedures are maintained. Policies and Procedures. Roles and responsibilities are identified

Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions

Domain 1 The Process of Auditing Information Systems

Client Security Risk Assessment Questionnaire

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

SSAE 16 & SAS 70 A Primer on Changes to Service Organization Audit Standards

Update on AICPA Assurance Services Executive Committee Activities

Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability

How To Understand The Benefits Of An Internal Audit

Tom J. Hull & Company Type 1 SSAE

CFPB Readiness Series: Compliant Vendor Management Overview

Joint Audit Report for South Lakeland District Council. & Eden District Council

University System of Maryland University of Maryland, College Park Division of Information Technology

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Managing data security and privacy risk of third-party vendors

VENDOR MANAGEMENT. General Overview

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

I. EXECUTIVE SUMMARY. Date: June 30, Sabina Sitaru, Chief Innovation Officer, Metro Hartford Innovation Services

Transcription:

Understanding SOC Reports for Effective Vendor Management Jason T. Clinton January 26, 2016 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2012 Wolf & Company, P.C.

Before we get started Today s presentation slides can be downloaded at https://www.wolfandco.com/webinars/2016 The session will last about an hour. Our audience will be muted during the session so if you have questions throughout the presentation, please send them by using the question box located on the webinar s control panel. 2

About Wolf & Company, P.C. Established in 1911 Offers Audit, Tax, and Risk Management services to nearly 250 financial institutions Offices located in: Boston, Massachusetts Springfield, Massachusetts Albany, New York Livingston, New Jersey Nearly 200 professionals As a leading regional firm, we provide our clients with specialized industry expertise and responsive service. 3

Financial Institution Expertise Provide services to nearly 250 financial institutions: Approximately 50 FIs with assets > $1B Approximately 30 publicly traded FIs Constant regulatory review of our deliverables Over 60 Risk Management Professionals: IT Assurance Services Group Professionals Internal Audit Services Group Professionals Regulatory Compliance Services Group Professionals WolfPAC Solutions Group Professionals Provide RMS in 27 states and 2 U.S. territories 4

Meet Today s Presenter Jason T. Clinton IT Assurance Senior Consultant Phone: 617-261-8132 Email: jclinton@wolfandco.com

Objectives Learn the differences between the three SOC reports Understand which SOC reports you should be requesting from your service providers Learn the sections of the SOC reports and how to effectively review the information 6

SOC Terminology Service Organization Service Auditor User Entity User Auditor 7

Service Organization Control Reports (SOC) AICPA SOC 1 Report Report on Controls at a Service Organization Relevant to User Entities Internal Control over Financial Reporting. (SSAE No. 16) AICPA SOC 2 Report Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, and/or Privacy AICPA SOC 3 Report Trust Services Report for Service Organizations 8

Type 1 vs. Type 2 Type 1 Report on management s description of a service organization s system and the suitability of the design of controls As of a specified date Type 2 Report on management s description of a service organization's system and the suitability of the design and operating effectiveness of controls Throughout the specified period 9

SOC 1 (SSAE No. 16) Report Performed using AICPA Guide: Service Organizations Applying SSAE No. 16, Reporting on Controls at a Service Organization (SOC 1) Type 1 and Type 2 format The service organization defines the control objectives that relate to the types of assertions commonly embodied in the broad range of user entities financial statements Restricted use report 10

SOC 2 Report Performed using AICPA Guide: Reporting on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy (SOC 2) Type 1 and Type 2 format (structured similarly to SSAE No. 16 (SOC 1)) The report is based on predefined criteria: Trust Services Principles and Criteria The service organization selects the principles that best align with the scope of services delivered to the user entities for whom the reports are intended Can be used by those that have sufficient knowledge and understanding of the services, systems, and internal controls 11

SOC 3 Report More general purpose and less detailed than a SOC 2 The report is based on predefined criteria: Trust Services Principles and Criteria The service organization selects the principles that best align with the scope of services delivered to the user entities Report can be made public Must be a Type 2 and cannot have control exceptions or complementary user entity controls 12

SOC 2 & 3 Trust Services Principles and Criteria Set of profession attestation and advisory services based on a core set of principles and criteria that address risks and opportunities of IT-enabled systems and privacy programs Developed by AICPA and the CPA Canada (Formerly Canadian Institute of Charted Accountants) 13

Trust Services Principles Security System is protected against unauthorized access, use, or modification (both physical and logical). Availability System is available for operation and use as committed or agreed. Processing Integrity System process is complete, accurate, timely, and authorized. Confidentiality Information designed as confidential is protected as committed or agreed. Privacy The system s collection use, retention, disclosure, and disposal of personal information is in accordance with the entity s commitments and system requirements. 14

Trust Services Criteria The Principles are organized into seven categories (except Privacy) as follows: Organization and Management The entity has a defined structure to manage and support personnel in the system. Communications The entity has communicated its policies, processes, and system requirements to authorized users and responsible parties of the system. Risk Management and Design and Implementation of Controls The entity has a process to identify risks and design and implement controls. 15

Trust Services Criteria The Principles are organized into seven categories (except Privacy) as follows: Monitoring of Controls The entity monitors the system and takes action to address deficiencies. Logical and Physical Access Controls The entity restricts logical and physical access to the system. System Operations The entity manages the execution of system procedures and detects and mitigates processing deviations. Change Management The entity has a controlled change management process and controls to prevent unauthorized changes. 16

SOC Report Products/Services SOC 1 Payroll Providers Data Processors Loan Servicing Trust Companies SOC 2 / SOC 3 Managed Security Providers Cloud Computing Non-Transactional Website Hosting Data Centers 17

Elements of a SOC 1 & SOC 2 Report Section 1: Service Auditor Independent Service Auditor s Report (Opinion Letter) Section 2: Service Organization Service Organization s Assertion Section 3: Service Organization Description of Service Organization s System Control Objectives and Control Activities (SOC 1) / Trust Services Principles and Criteria and Controls (SOC 2) Complementary User Entity Controls Section 4: Service Auditor (Type 2 only) Independent Service Auditor s Description of Tests of Controls and Results Section 5: Service Organization Additional Information Provided by the Service Organization 18

Section 1: Service Auditor s Report Identifies products / services in scope Defines period of coverage (Type 2) or as of date (Type 1) Inclusive or Carve-Out Method Opine on whether documented controls satisfy the control objectives (SOC 1) or trust services criteria (SOC 2) Identifies exceptions to testing of the documented controls (Type 2) 19

Section 2: Service Organization Assertion Identifies products / services in scope Defines period of coverage (Type 2) or as of date (Type 1) Assert on whether documented controls satisfy the control objectives (SOC 1) or trust services criteria (SOC 2) The criteria used in making the assertion 20

Section 3: Description of Systems The type of services provided Classes of transactions processed (SOC 1) Components of the system including Infrastructure, Software, People, Procedures, and Data (SOC 2) How the system captures and addresses significant events and conditions Reporting Relevant aspects of: Control Environment Risk Assessment Process Monitoring Controls Information and Communication Complementary user entity controls 21

Section 4: Independent Service Auditor s Description of Tests of Controls and Results Control objectives and related controls (SOC 1) or Trust Service criteria and related controls (SOC 2) Types of tests: Inquiry Observation Inspection Re-performance Testing of operating effectiveness 22

Example of Testing in a SOC 1 Physical Security: Controls provide reasonable assurance that physical access restrictions are implemented to ensure only authorized individuals have access to sensitive areas. Control Activity Test Type Test Results A key fob is required for entry to the server room. Server room access is only provided to authorized employees. I O Inspect documented policies to ensure that physical access to the server room is required to be restricted to authorized employees. Observe that a key fob is required for entry to the server room. No exceptions noted. No exceptions noted. I Inspect the key fob access report and authorization forms to ensure that only authorized individuals have access to the server room. No exceptions noted. 23

Testing in a SOC 2 CC1.0 Common Criteria Related to Organization and Management Criteria Control Test Test Results 1. The entity has defined organizational structures, reporting lines, authorities, and responsibilities for the design, development, implementation, operation, maintenance and monitoring of the system enabling it to meet its commitments and requirements as they relate to security and availability. 1. The Written Information Security Program (WISP) assigns the Information Security Officer as responsible and accountable for system security and availability. 2. Employees roles and responsibilities are defined in written job descriptions that are available on the intranet and updated annually. Inspected the Written Information Security Program (WISP) to determine it assigns the Information Security Officer responsible and accountable for system security and availability. Inspected a sample of written job descriptions to ensure employees roles and responsibilities are defined. No exceptions noted. No exceptions noted. Observed written job descriptions are available to employees through the Company s intranet. Inspected a sample of written job descriptions to ensure the job descriptions are updated on an annual basis. No exceptions noted. No exceptions noted. 24

Section 5: Additional Information Provided by the Service Organization Information the Service Organization may detail in this section includes: Management s response and remediation plans for exceptions noted New products and services Business continuity / disaster recovery planning 25

Elements of a SOC 3 Report Section 1: Service Auditor Independent Service Auditor s Report (Opinion Letter) Section 2: Service Organization Service Organization s Assertion Section 3: Service Organization Description of Service Organization s System 26

Vendor Management SOC reports should be requested for vendor due diligence and vendor oversight User entities SOC report review documentation should include the following: Products and services covered in the report Type (1 or 2) of the report and period covered Opinion of the service auditor User entities responses to the complimentary user entity controls stated in the report Exceptions noted by the service auditor 27

Vendor Management User entities SOC report review documentation should specify if the report covered the following elements: Information Security Program Business Continuity/ Disaster Recovery Program Change Management Process Logical and Physical Controls Data Backup and Restoration Incident Response Plan Use of sub-service organizations 28

Questions? Jason T. Clinton IT Assurance Senior Consultant Phone: 617-261-8132 Email: jclinton@wolfandco.com