What is the purpose of a SOC 2 audit?
Many companies find it cost-efficient to outsource certain services, such as data hosting, colocation, data processing, and Software-as-a-Service (SaaS). The data that is transmitted, stored, maintained, processed and disposed by these service providers must be kept confidential, secure, private and available for use. In addition, a service provider’s system processing must be complete, accurate, timely and authorized. A SOC 2 Report ensures companies that the five Trust Service Principles of Security, Availability, Processing Integrity, Confidentiality, and Privacy are being addressed by their service organization’s controls.
What is the difference between a Type I audit and a Type II audit?
Do I need a SOC 2 report?
What types of SOC 2 audits are available?

Features

Process

Benifits

FAQ

Related links

Unlike PCI DSS, which has very rigid requirements, SOC 2 reports are unique to each organization

Read More

Testimonials

Praesent nec nisl a purus blandit viverra. Praesent ac massa at ligula laoreet iaculis. Nulla neque dolor, sagittis eget, iaculis quis, molestie non, velit. Mauris turpis nunc, blandit et, volutpat molestie, porta ut, ligula.