SOC2 Auditor Assessment



TSPRef COSOprinciple ControlCriteria PointsOfFocus ControlType AssessmentObjectives Assessment Summary Date Action
CC1.1 Principle 1 The entity demonstrates a commitment to integrity and ethical values. Sets the Tone at the Top; Establishes Standards of Conduct; Evaluates Adherence to Standards of Conduct; Addresses Deviations in a Timely Manner; Considers Contractors and Vendor Employees Control Environment Evaluate management's commitment to integrity and ethical behavior, including communication and enforcement mechanisms. 2025-04-10
CC1.2 Principle 2 The board of directors demonstrates independence from management and exercises oversight. Establishes Oversight Responsibilities; Applies Relevant Expertise; Operates Independently Governance and Oversight Confirm board independence and oversight of internal controls. 2025-04-10
CC1.3 Principle 3 Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives. Defines Roles and Responsibilities; Establishes Reporting Lines; Delegates Authority and Responsibilities Organizational Structure Evaluate clarity and appropriateness of organizational structure, roles, responsibilities, and authorities. 2025-04-10
CC1.4 Principle 4 The entity demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives. Establishes Policies and Practices; Evaluates Competence and Addresses Shortcomings; Attracts, Develops, and Retains Competent Individuals; Plans and Prepares for Succession Human Resources Assess effectiveness of processes for hiring, developing, retaining competent personnel, and succession planning. 2025-04-10
CC1.5 Principle 5 The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives. Enforces Accountability Through Structures, Authorities, and Responsibilities; Establishes Performance Measures, Incentives, and Rewards; Evaluates Performance Measures and Rewards; Implements Appropriate Corrective Actions Accountability Evaluate how accountability for internal control responsibilities is defined, measured, and enforced. 2025-04-10
CC2.1 Principle 13 The entity obtains or generates and uses relevant, quality information to support the functioning of internal control. Identifies Information Requirements; Captures Internal and External Sources of Data; Processes Relevant Data Into Information; Maintains Quality Throughout Processing; Considers Costs and Benefits Information and Communication Assess processes for identifying, capturing, processing, and maintaining quality information to support internal control. 2025-04-10
CC2.2 Principle 14 The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control. Communicates Internal Control Information; Communicates With the Board of Directors; Provides Separate Communication Lines; Selects Relevant Method of Communication Information and Communication Evaluate the effectiveness of internal communication channels and clarity of communicated internal control responsibilities. 2025-04-10
CC2.3 Principle 15 The entity communicates with external parties regarding matters affecting the functioning of internal control. Communicates to External Parties; Enables Inbound Communications; Communicates With the Board of Directors; Provides Separate Communication Lines; Selects Relevant Method of Communication Information and Communication Assess external communication mechanisms regarding internal control matters. 2025-04-10
CC3.1 Principle 6 The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives. Operations Objectives; External Financial Reporting Objectives; External Nonfinancial Reporting Objectives; Internal Reporting Objectives; Compliance Objectives Risk Assessment Evaluate clarity in defining operations, external financial and nonfinancial reporting, internal reporting, and compliance objectives to effectively identify and assess associated risks. 2025-04-10
CC3.2 Principle 7 The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed. Includes Entity, Subsidiary, Division, Operating Unit, and Functional Levels; Analyzes Internal and External Factors; Involves Appropriate Levels of Management; Estimates Significance of Risks; Determines How to Respond to Risks Risk Assessment Assess the entity’s comprehensive risk identification and analysis processes across all relevant organizational units and functions. 2025-04-10
CC3.3 Principle 8 The entity considers the potential for fraud in assessing risks to the achievement of objectives. Considers Various Types of Fraud; Assesses Incentives and Pressures; Assesses Opportunities; Assesses Attitudes and Rationalizations Risk Assessment Evaluate how the entity identifies and assesses fraud risks, including types, incentives, opportunities, and attitudes toward fraud. 2025-04-10
CC3.4 Principle 9 The entity identifies and assesses changes that could significantly impact the system of internal control. Assesses Changes in the External Environment; Assesses Changes in the Business Model; Assesses Changes in Leadership Risk Assessment Evaluate processes used by the entity to identify and assess significant changes affecting internal controls, including external environment, business model, and leadership changes. 2025-04-10
CC4.1 Principle 16 The entity selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning. Considers a Mix of Ongoing and Separate Evaluations; Considers Rate of Change; Establishes Baseline Understanding; Uses Knowledgeable Personnel; Integrates With Business Processes; Adjusts Scope and Frequency Monitoring Activities Assess how effectively the entity evaluates internal controls through ongoing and periodic assessments to ensure controls function as intended. 2025-04-10
CC4.2 Principle 17 The entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate. Assesses Results; Communicates Deficiencies; Monitors Corrective Actions Monitoring Activities Evaluate processes for timely evaluation, communication, and monitoring of corrective actions related to internal control deficiencies. 2025-04-10
CC5.1 Principle 10 The entity selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels. Integrates With Risk Assessment; Determines Relevant Business Processes; Considers Entity-Specific Factors; Evaluates a Mix of Control Activity Types; Considers at What Level Activities Are Applied; Addresses Segregation of Duties Control Activities Assess selection, development, and implementation of control activities to adequately mitigate risks identified. 2025-04-10
CC5.2 Principle 11 The entity selects and develops general control activities over technology to support the achievement of objectives. Identifies Technology Dependencies; Establishes Relevant Technology Infrastructure Controls; Establishes Relevant Security Management Processes; Establishes Relevant Technology Acquisition, Development, and Maintenance Controls Control Activities (Technology) Assess if general technology controls align with technology dependencies, infrastructure, security, and development activities. 2025-04-10
CC5.3 Principle 12 The entity deploys control activities through policies that establish what is expected and in procedures that put policies into action. Establishes Policies and Procedures to Support Deployment of Management’s Directives; Establishes Responsibility and Accountability for Executing Policies and Procedures; Performs in a Timely Manner; Takes Corrective Action; Performs Using Competent Personnel; Periodically Reassesses Policies and Procedures Control Activities Evaluate how effectively control activities are established, deployed, and maintained through policies and procedures. 2025-04-10
CC6.1 Common Criteria The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives. Identifies and Manages the Inventory of Information Assets; Restricts Logical Access; Identifies and Authenticates Users; Considers Network Segmentation; Manages Points of Access; Implements Secure Authentication Methods; Identifies and Manages Credentials; Manages Credentials for Infrastructure and Software; Uses Encryption to Protect Data; Protects Encryption Keys; Identifies Information Assets Requiring Protection; Establishes Relevant Technology Infrastructure Controls; Establishes Relevant Security Management Processes Logical Access and Security Controls Verify the implementation of logical access controls, infrastructure security, encryption practices, and protection of credentials and information assets. 2025-04-10
CC6.2 Common Criteria Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users. Controls Access Credentials to Protected Assets; Removes Access to Protected Assets When Appropriate; Reviews Appropriateness of Access Credentials; Implements Least Privilege Access Logical and Physical Access Verify user registration, authorization processes, credential management, and removal of system access for users when no longer needed. 2025-04-10
CC6.3 Common Criteria The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design and changes, giving consideration to the concepts of least privilege and segregation of duties, to meet the entity’s objectives. Creates or Modifies Access Based on Authorization; Removes Access When No Longer Required; Reviews Access Appropriateness Regularly; Implements the Principle of Least Privilege; Segregates Duties to Reduce Risk Logical and Physical Access Assess effectiveness of processes to authorize, modify, or remove access based on roles, least privilege, and segregation of duties principles. 2025-04-10
CC6.4 Common Criteria The entity restricts physical access to facilities and protected information assets (for example, data center facilities, backup media storage, and other sensitive locations) to authorized personnel to meet the entity’s objectives. Creates or Modifies Physical Access Based on Authorization; Removes Physical Access When No Longer Required; Reviews Physical Access Appropriateness Regularly Physical Access Controls Evaluate the processes to authorize, grant, review, and revoke physical access to facilities and sensitive information assets. 2025-04-10
CC6.5 Common Criteria The entity diminishes logical and physical protections on data, software, and other protected assets only after their usefulness ends and secure disposal occurs. Identifies Data and Software for Disposal; Removes Data and Software From Entity Control; Renders Data and Software Unreadable Prior to Disposal Logical and Physical Access Evaluate procedures ensuring logical and physical protections are discontinued only after securely rendering data and software unreadable. 2025-04-10
CC6.6 Common Criteria The entity implements logical access security measures to protect against threats from sources outside its system boundaries. Restricts Access; Protects Identification and Authentication Credentials; Requires Additional Authentication or Credentials for External Access; Implements Boundary Protection Systems (firewalls, DMZs, intrusion detection systems) and Monitors for Unauthorized Access Logical Access Control Verify logical access controls, boundary protection, and credential management to defend against external system threats. 2025-04-10
CC6.7 Common Criteria The entity restricts physical and logical access to information assets and systems to authorized personnel. Restricts Ability to Perform Transmission (Data Loss Prevention); Protects Data in Transit; Protects Data on Removable Media; Protects Mobile Devices Logical and Physical Access Evaluate the effectiveness of controls restricting and protecting data transmission, removable media, and mobile devices from unauthorized access or data loss. 2025-04-10
CC6.8 Common Criteria The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives. Restricts Application and Software Installation; Detects Unauthorized Changes to Software and Configuration Parameters; Uses a Defined Change Control Process; Uses Antivirus and Anti-Malware Software; Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Software Logical and Physical Access Controls Evaluate the implementation and effectiveness of controls to prevent, detect, and respond to unauthorized or malicious software introductions. 2025-04-10
CC7.1 Common Criteria To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations and (2) susceptibilities to newly discovered vulnerabilities. Uses Defined Configuration Standards; Monitors Infrastructure and Software; Implements Change-Detection Mechanisms (e.g., file integrity monitoring tools); Detects Unknown or Unauthorized Components; Conducts Vulnerability Scans and Remediates Identified Deficiencies System Operations and Monitoring Evaluate processes and tools used for configuration monitoring, change detection, vulnerability scanning, and identification/remediation of security issues. 2025-04-10
CC7.2 Common Criteria The entity monitors system components for anomalies impacting objectives, analyzing anomalies to determine if they represent security events. Implements Detection Policies, Procedures, and Tools; Designs Detection Measures for Physical Barrier Compromise, Unauthorized Actions by Authorized Personnel, Use of Compromised Credentials, and Unauthorized External Access; Enables Logging of Unusual Activities System Operations and Monitoring Evaluate policies, tools, and processes implemented to monitor systems, detect anomalies, analyze potential security events, and respond accordingly. 2025-04-10
CC7.3 Common Criteria The entity evaluates security events to determine whether they could or have resulted in a failure of the entity to meet its objectives (security incidents), and takes actions accordingly. Responds to Security Incidents; Communicates and Reviews Detected Security Events; Periodically Evaluates the Effectiveness of Incident Response Procedures System Operations and Monitoring Assess the entity’s effectiveness in identifying, analyzing, responding to, and reviewing security incidents and related communications. 2025-04-10
CC7.4 Common Criteria The entity responds to identified security incidents by executing a defined incident-response program to understand, contain, remediate, and communicate security incidents, as appropriate. Assigns Roles and Responsibilities; Contains Security Incidents; Mitigates Ongoing Security Incidents; Ends Threats Posed by Security Incidents; Restores Operations; Develops and Implements Communication Protocols for Security Incidents; Obtains Understanding of Nature of Incident and Determines Containment Strategy; Remediates Identified Vulnerabilities; Communicates Remediation Activities; Evaluates the Effectiveness of Incident Response; Periodically Evaluates Incidents Incident Response Management Evaluate the entity’s incident-response processes for clearly defined roles, containment, mitigation, remediation, communication, restoration of operations, and periodic effectiveness reviews. 2025-04-10
CC7.5 Common Criteria The entity identifies, develops, and implements activities to recover from identified security incidents. Restores the Affected Environment; Communicates Information About the Event (Internally and Externally); Determines Root Cause of the Event; Implements Changes to Prevent and Detect Recurrences; Improves Response and Recovery Procedures; Implements Incident-Recovery Plan Testing (including threat scenarios, availability impacts, key personnel availability, and continuity plan revisions) Incident Response and Recovery Evaluate the effectiveness of incident recovery activities, including restoration processes, root-cause analysis, prevention improvements, and testing of recovery plans. 2025-04-10
CC8.1 Common Criteria The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. Manages Changes Throughout the System Life Cycle; Authorizes Changes; Designs and Develops Changes; Documents Changes; Tracks System Changes; Configures Software; Tests System Changes; Approves System Changes; Deploys System Changes; Identifies and Evaluates System Changes; Identifies Changes in Infrastructure, Data, Software, and Procedures Required to Remediate Incidents; Creates Baseline Configuration of IT Technology; Provides for Changes Necessary in Emergency Situations Change Management Assess the effectiveness of the entity’s change management process throughout the system life cycle, including authorization, design, documentation, testing, approval, deployment, and emergency change handling. 2025-04-10
CC9.1 Common Criteria The entity identifies, selects, and develops risk mitigation activities for risks arising from potential business disruptions. Considers Mitigation of Risks of Business Disruption (planned policies, procedures, communications, monitoring processes, alternative processing solutions); Considers the Use of Insurance to Mitigate Financial Impact Risks Risk Mitigation & Business Continuity Evaluate the entity’s processes to identify, develop, and implement policies, procedures, communications, monitoring activities, and alternative processing solutions to mitigate and recover from business disruptions, including financial impact considerations through insurance. 2025-04-10
CC9.2 Common Criteria The entity assesses and manages risks associated with vendors and business partners. Establishes Requirements for Vendor and Business Partner Engagements (scope of services, roles, compliance requirements, service levels); Assesses Vendor and Business Partner Risks; Assigns Responsibility and Accountability for Managing Vendors and Business Partners; Establishes Communication Protocols; Establishes Exception Handling Procedures; Assesses Vendor and Business Partner Performance; Addresses Issues Identified in Assessments; Implements Procedures for Terminating Relationships Vendor Risk Management Evaluate the entity's processes for managing vendor and business partner risks, including engagement requirements, performance assessments, communication, exception handling, issue resolution, and termination procedures. 2025-04-10
C1.1 Confidentiality The entity identifies and maintains confidential information to meet the entity’s objectives related to confidentiality. Identifies Confidential Information (procedures for designation, identification, retention period determination); Protects Confidential Information From Destruction During Retention Period Information Protection Evaluate the entity's procedures for identifying, classifying, retaining, and protecting confidential information from unauthorized erasure or destruction. 2025-04-10
C1.2 Confidentiality The entity disposes of confidential information to meet the entity’s objectives related to confidentiality. Identifies Confidential Information for Destruction; Destroys Confidential Information Information Disposal Evaluate the entity’s procedures to identify confidential information requiring disposal and ensure secure destruction at the end of its retention period. 2025-04-10
P1.1 Privacy The entity provides notice to data subjects about its privacy practices to meet the entity’s objectives related to privacy. The notice is updated and communicated to data subjects timely when privacy practices change. Communicates to Data Subjects (purpose, choice and consent, types of personal information collected, methods of collection, use/retention/disposal, access, disclosure to third parties, security for privacy, data quality responsibilities, monitoring and enforcement, sources if not directly collected); Provides Notice Timely; Covers Entities and Activities; Uses Clear and Conspicuous Language Privacy Notice Evaluate the completeness, clarity, timeliness, and accuracy of the privacy notices provided to data subjects, including all required elements. 2025-04-10
P2.1 Privacy The entity communicates choices available regarding the collection, use, retention, disclosure, and disposal of personal information, obtains consent when required, and ensures such consent aligns with intended purposes related to privacy. Communicates Choices and Consent Requirements; Communicates Consequences of Denying or Withdrawing Consent; Obtains Explicit or Implicit Consent; Documents and Obtains Consent for New Purposes and Uses; Obtains Explicit Consent for Sensitive Information; Obtains Consent for Data Transfers Consent and Choice Evaluate processes to inform data subjects of privacy choices, obtain explicit or implicit consent appropriately, document consent, and ensure adherence to consent preferences. 2025-04-10
P3.1 Privacy Personal information is collected consistent with the entity’s objectives related to privacy. Limits the Collection of Personal Information; Collects Information by Fair and Lawful Means; Collects Information from Reliable Sources; Informs Data Subjects When Additional Information Is Acquired Information Collection Evaluate processes for ensuring personal information collection is limited, fair, lawful, from reliable sources, and properly communicated to data subjects when new information is obtained. 2025-04-10
P4.1 Privacy The entity limits the use of personal information to the purposes identified in the entity’s objectives related to privacy. Uses Personal Information for Intended Purposes (information is used only as intended, with explicit or implicit consent, unless otherwise required by law or regulation) Information Use Evaluate procedures ensuring personal information is used exclusively for specified purposes, aligned with obtained consent and applicable regulations. 2025-04-10
P4.2 Privacy The entity retains personal information consistent with the entity’s objectives related to privacy. Retains Personal Information Only for Required Period; Protects Personal Information From Erasure or Destruction During Retention Period Information Retention Evaluate processes ensuring personal information is retained only as long as necessary, with effective protections against unauthorized erasure or destruction. 2025-04-10
P4.3 Privacy The entity disposes of personal information to meet the entity’s objectives related to privacy. Captures, Identifies, and Flags Requests for Deletion; Disposes of Personal Information Securely to Prevent Unauthorized Access, Theft, Loss, or Misuse; Implements Policies and Procedures to Erase or Destroy Personal Information Information Disposal Evaluate processes for secure disposal of personal information, including handling deletion requests and ensuring effective data destruction. 2025-04-10
P5.1 Privacy The entity grants identified and authenticated data subjects access to their personal information and informs them of denials and reasons for denials, as appropriate. Authenticates Data Subjects’ Identity; Provides Data Subjects Access to Personal Information; Responds in Reasonable Timeframe and at Reasonable Cost; Informs Data Subjects If Access Is Denied (including reasons, unless prohibited by law or regulation) Access and Authentication Evaluate processes ensuring data subjects' identity is authenticated, personal information access requests are addressed timely, and proper communication occurs when access is denied. 2025-04-10
P5.2 Privacy The entity corrects or updates personal information based on data subject requests and communicates updates or denials as required to meet the entity’s objectives related to privacy. Communicates Denial of Correction Requests (including legal basis and appeal rights if applicable); Permits Data Subjects to Update or Correct Personal Information; Communicates Updates to Third Parties as Required Information Correction and Update Evaluate processes enabling data subjects to update or correct personal information, including effective communication of corrections to third parties or appropriate handling and communication of denial requests. 2025-04-10
P6.1 Privacy The entity discloses personal information to third parties with the explicit consent of data subjects obtained prior to disclosure, to meet the entity’s objectives related to privacy. Communicates Privacy Policies to Third Parties; Discloses Personal Information Only When Appropriate and Consent Obtained; Discloses Personal Information Only to Appropriate Third Parties (with privacy agreements and control evaluations); Discloses Information to Third Parties for New Purposes and Uses Only With Prior Consent Information Disclosure Evaluate procedures for obtaining consent prior to disclosure, communicating privacy policies to third parties, and ensuring third-party protection and control effectiveness for personal information disclosure. 2025-04-10
P6.2 Privacy The entity creates and maintains records of authorized disclosures of personal information, ensuring completeness, accuracy, and timeliness to meet the entity’s objectives related to privacy. Creates and Retains Complete, Accurate, and Timely Records of Authorized Disclosures of Personal Information Information Disclosure Evaluate processes for accurately recording, documenting, and retaining timely records of authorized disclosures of personal information. 2025-04-10
P6.3 Privacy The entity creates and retains a complete, accurate, and timely record of detected or reported unauthorized disclosures (including breaches) of personal information. Creates and Retains Complete, Accurate, and Timely Record of Unauthorized Disclosures of Personal Information Incident Management (Privacy) Evaluate procedures ensuring complete, accurate, and timely documentation of unauthorized disclosures or breaches of personal information. 2025-04-10
P6.4 Privacy The entity obtains privacy commitments from vendors and third parties accessing personal information, and assesses their compliance periodically or as needed, to meet the entity’s privacy objectives. Discloses Personal Information Only to Third Parties with Privacy Commitments and Effective Controls; Remediates Misuse or Unauthorized Disclosure by Third Parties Through Evaluation Procedures and Controls Assessment; Periodically Assesses Third-Party Compliance with Privacy Commitments Third-Party Privacy Management Evaluate entity's procedures for obtaining, maintaining, and assessing third-party privacy commitments and compliance, including periodic assessments and remediation of issues. 2025-04-10
P6.5 Privacy The entity obtains commitments from vendors and third parties with access to personal information and ensures notification and remediation in case of misuse to meet the entity’s privacy objectives. Remediates Misuse of Personal Information by a Third Party; Obtains Commitments from Third Parties Regarding Privacy Incident Response and Notification; Evaluates Third-Party Compliance with Notification and Remediation Requirements Third-Party Privacy Management Evaluate the entity's processes to secure privacy-related commitments from third parties, ensure third-party compliance, and respond effectively to unauthorized disclosures or misuse of personal information. 2025-04-10
P6.6 Privacy The entity provides timely notification of breaches and incidents affecting personal information to data subjects, regulators, and others, consistent with privacy objectives. Provides Notice of Breaches and Incidents to Data Subjects, Regulators, and Others; Remediates Misuse of Personal Information by Third Parties Through Notification and Corrective Action Incident Response and Notification Evaluate the entity's procedures for timely notification of privacy breaches or incidents to affected parties, regulators, and appropriate personnel, including remediation of third-party misuse. 2025-04-10
P6.7 Privacy The entity provides data subjects, upon request, an accounting of personal information held and disclosures made, meeting privacy objectives. Identifies Types of Personal Information and Handling Processes (including sensitive data, systems, and third parties involved); Captures, Identifies, and Communicates Requests for Personal Information and Disclosures Information Disclosure Requests Evaluate processes enabling accurate accounting of personal information held, and timely, clear responses to data subjects' requests regarding disclosures of their personal information. 2025-04-10
P7.1 Privacy The entity collects and maintains accurate, up-to-date, complete, and relevant personal information to meet privacy objectives. Ensures Accuracy and Completeness of Personal Information; Ensures Relevance of Personal Information to Intended Purposes Information Quality Evaluate processes ensuring personal information collected is accurate, complete, up-to-date, and relevant to specified uses. 2025-04-10
P8.1 Privacy The entity implements a process for receiving, addressing, resolving, and communicating inquiries, complaints, and disputes from data subjects, monitors compliance, and corrects deficiencies timely. Communicates Contact Methods to Data Subjects; Addresses Inquiries, Complaints, and Disputes; Documents and Communicates Resolution to Individuals; Reviews and Reports Compliance Results to Management; Documents and Reports Instances of Noncompliance with Privacy Objectives; Performs Ongoing Monitoring of Privacy Controls and Implements Timely Corrective Actions Monitoring and Enforcement Evaluate the entity’s procedures for receiving, resolving, and communicating resolutions of privacy-related inquiries, complaints, disputes, and monitoring compliance, including documentation and timely correction of deficiencies. 2025-04-10