CYBERSECURITY SERVICES
Compliance and Security Audits: SOC 2 - Type I and Type II Assessment
We are experts in delivering Type I and Type II SOC 2 audits that meet the highest levels of user scrutiny and satisfy all service organization, user organization, and user auditor requirements.
- A SOC 2 compliance report meets the needs of a broad range of users who need information and assurance about controls at a service organization that affect the security, availability, or processing integrity of the systems that the service organization uses to process users data or the confidentiality or privacy of the information processed by these systems.
- SOC 2 reports can include from one to all five of the Trust Services Principles (TSPs), which are Security, Availability, Processing Integrity, Confidentiality, and Privacy. Each report is required to include at least Security.
- SOC 2 certification engagements are performed under AT Section 101, Attest Engagements (AICPA, Professional Standards), and the AICPA Guide, Reporting on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy.