AICPA SOC Certification Logo 300x300

SOC 2 Compliance

Service Organization Controls (SOC) 2 is a compliance report standard defined by the American Institute of Certified Public Accountants (AICPA). These SOC 2 compliance reports provide users with an assurance about the controls at a service organization relevant to security availability, and processing integrity of the systems used to process users’ data and the confidentiality and privacy of the information processed by these systems.

What is the goal of SOC 2® compliance?

The main purpose of earning SOC 2 compliance is to demonstrate to customers that a respected third party has examined your services and found that they meet five “trust service principles”.

Security

Security

Information and systems are protected against unauthorized access and disclosure of information.

Availability

Availability

Information and systems are for operation and use to meet the entity’s objectives.

Processing Integrity

Processing Integrity

System processing is complete, valid, accurate, timely, and authorized.

Confidentiality

Confidentiality

Information designated as confidential is adequately protected.

Privacy

Privacy

Personal information is collected, used, retained, disclosed, and disposed to meet the entity’s objectives.

What is SOC 2 Type II Certification?

A SOC 2 report is the result of an audit conducted by an independent auditing and accounting firm based on the criteria defined by the AICPA. The audit can take three to six months to complete.

There are two types of SOC 2 reports: a Type I report on management’s description of the systems in place and the suitability of the design of controls; and Type II report on the suitability of the design and operating effectiveness of the controls described therein to meet the applicable trust services criteria. The responsibility of the auditing firm is to build the report by expressing an opinion on the fairness of the presentation of the descriptions, the suitability and the effectiveness of the control measures.

During the audit period, the stated controls for Check Point CloudGuard Dome9, Threat Emulation and Mobile Threat Defense services operated effectively to meet the applicable trust services criteria.

Try it now

Talk to a specialist

Get pricing

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO