The SOC 2 is a restricted use SOC Audit Report covering the controls at a service organization relevant to Security, Availability, Processing, Integrity, Confidentiality or Privacy.
The framework for the SOC 2SMaudit report was established to provide a means for Service Organizations to obtain an independent assessment of their internal control environment and supporting controls when they were providing a service other than financial reporting. A SOC 2SMaudit report enables Service Organizations to provide an in-depth look at their internal controls related to Security, Availability, Processing Integrity, Confidentiality and/or Privacy that they have implemented to support the service they are providing. These SOC reports give stakeholders a:
- Thorough understanding of the Service Organization
- An understanding of the service being provided
- Internal controls relating to that service
This empowers stakeholders to evaluate their Service Organization, and maintain better oversight of the organizations they already do business with.
The SOC 2SMframework utilizes the Trust Services Criteria (also referred to as TSC) as a basis for evaluating a Service Organization’s controls. The TSC was established by the AICPA Assurance Services Executive Committee (ASEC). Service Organizations are able to select one or more categories to include within a SOC 2SMreport, with Security being required to be included as one of the categories. A SOC 3SMAudit utilizes the same framework, but the SOC 2SMaudit is a restricted use report (restricted to entities such as prospective users, existing user, user auditor, and regulators), while a SOC 3SMis unrestricted for distribution. A SOC 3SMaudit report is much less detailed in nature.
Learn More About SOC 2 Audit Reports