COMMITMENTS & SYSTEM REQUIREMENTS - THE KEY TO SOC 2
There's a ton of information out there about #soc2, so I won't get into "what is it?" (but feel free to message me if you do want to know more!)
Based on my previous post, I’m going to write a series of articles to break down some specific things that were revised/expanded/clarified/etc. in the 2022 AICPA SOC 2 guide.
I'm going to start with commitments and system requirements. Why??Because they are the core driver and most important aspect of everything (IMO) when it comes to SOC 2 reporting. The reason is they have a part in almost every part of the SOC 2 process. This goes from initial scoping all the way through to final reporting. Because of this, this article would be superfluous if it were to detail every aspect of commitments and system requirements in SOC 2. Therefore, I’ll keep this high-level here, but in future posts I may go into more detail on how commitments and system requirements relate to that specific topic.
To get technical for a minute (sorry), in the 2022 SOC 2 guide the AICPA shows us how to understand commitments and system requirements (paraphrased):
So, what does that mean? Let’s use an example.?Your company provides a cloud-based software application to help customers organize personal documents in a virtual environment.?You want to make your customers’ lives easier and more organized at any point they choose by using your tool. Awesome mission and vision!
To help meet your mission & vision, in customer contracts you have language for “protection of customer data from unauthorized use or disclosure”. Your SLA states that the service “will be available 99.99% of the time in any given month”.?These are your objectives embedded in your documented commitments to customers.
Now, because you are a prestige worldwide caliber company, you?are subject to GDPR because you have customers in Europe. The system has to function in a way that meets the requirements of GDPR for your European customers - a system requirement.?(NOTE – I’m going to have a future article in more detail about other frameworks in relation to SOC 2)
领英推荐
From there, you develop controls that help mitigate the risks of not achieving your objectives. Unauthorized access? Implement MFA. System downtime??Redundancy through your cloud infrastructure provider. And so on.
Right off the bat, we see how big of an impact commitments and system requirements have on the control environment of your company itself, but what about the SOC 2 engagement? Here are a few bullets for greater depth of how they impact SOC 2 reporting:
Here is a visual of that flow down:
Now you have an idea of how important commitments and system requirements are to the SOC 2 effort as a whole.?But what else can they affect in SOC 2 engagements?
There is so much more I could talk about, but let’s save it for more detail in future articles! As always, if you have any questions, need to bounce some ideas, or just want to chat, feel free to message me!