SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Service Organization Control Reports
             An Overview
Agenda
• Service Organization Control Reporting
   – Definitions
   – Background
   – Report Types and Guidance
• Transitioning to SSAE 16/SOC 1
   – Similarities to SAS 70
   – Key Differences from SAS 70
• SOC 2 and 3 Reporting
• Reporting Options
• Summary
• Questions
Service Organization Control
Reporting
What are Service Organizations?
• Service Organization – provider of services that may
  impact a user’s financial reporting or pose a
  business risk
    Services such as:
       Cloud computing
       Managed security
       Financial services customer accounting
       Customer support
       Sales force automation
       Health care claims management and processing
       Enterprise IT outsourcing
Definition: Service Auditor

• Service auditor – a CPA who examines and
  reports on controls at a service organization
Who are Users?
• Users – typically considered clients of
  service organization
   May need assurance regarding controls over
    security, availability, processing integrity,
    confidentiality or privacy
• User Auditor – a CPA who performs a audit
  on the users financial statements
   Needs assurance regarding the controls in place at
    the service organization that impact user financial
    statements
Background
• Why change?
     • SAS 70 has become increasingly misused
     • Never intended to offer assurance on compliance or
       operations
     • No such thing as a SAS 70 “certification”
     • Convergence with International Standards
     • AICPA is seeking to address needs of the marketplace
Background
• Several important changes
   – December 2009
      • International Auditing and Assurance Standards Board
        issued new International Standards on Assurance
        Engagements (ISAE) 3402, Assurance Reports on Controls
        of Service Organizations
   – April 2010
      • AICPA issued SSAE 16 Reporting on Controls of Service
        Organizations (SOC 1)
      • First significant modification on topic since SAS 70 issued in
        1992
      • Effective for reporting periods on or after June 15, 2011
Background
• Several important changes
   – May 2011
      • AICPA issued a new guide for attestation engagements (AT
        101) using Trust Services Principles (SOC 2)
   – June 2011
      • Anticipated release of SSAE 16(SOC 1) reporting guide
Service Organization Control Reports
                                SOC 1                            SOC 2               SOC 3
Purpose                         Report on controls Report on controls                Report on controls
                                relevant to user   related to                        related to
                                entities ICFR 1    compliance and                    compliance and
                                                   operations                        operations
Use of Report                   Restricted 2                     Restricted 3        General
Report Detail                   Includes Testing                 Includes Testing    No Testing Detail
                                Detail                           Detail
AICPA                           SSAE 16                          AT 101 and          AT 101 and
Interpretive                    and AICPA Guide                  AICPA Trust         AICPA Trust
Guidance                        (forthcoming in                  Services            Services
                                June)                            Principles/AICPA    Principles
                                                                 Guide (SOC 2 just
                                                                 issued)
1InternalControl Over Financial Reporting
2Service Organization Management, Users, Users Auditor
3Service Organization Management, Users, Knowledgeable Parties
Transitioning to SSAE 16
    SOC 1 Reporting
Similarities
• SSAE 16 continues the focus on
  controls likely to be relevant to their user entities’
  internal control over financial reporting (ICFR)
• SSAE 16 will have SOC 1 reports similar in
  scope to the current SAS 70 reports
   – Type 1
   – Type 2
• The format of the reports will not be significantly
  different
Similarities
• Narrative description of controls:
  Basis for new description of the system
• Treatment of subservice organizations
   Included (inclusive method)
   Excluded (carve-out method)

• Intended users of the report
   Service organization’s management
   Users
   User auditors
Key Differences:
SAS vs. SSAE
• Attest standard (Assertion), not an audit
  standard (GAAP)
• Consistency with international standards and
  existing attestation standards
• Increased focus on service organizations with
  services relevant to a user organizations internal
  control over financial reporting (ICFR)
• Some SAS 70 reports will move to SOC 2 or
  SOC 3 reports
Key Differences:
Management Assertion
A Management Assertion will be included in or
attached to the SSAE 16 report
• States*:
     System fairly represented
     System suitably designed and implemented
     The related controls activities were suitably designed
      to achieve the stated control objectives
     That the control activities are operating effectively
      (Type 2 only)
*The auditor opinion attests to these statements. Type 1 specified
 date/Type 2 throughout the period
Key Differences:
Management Assertion
• The report will reference that management is
  responsible for:
   Preparing the system description
   Providing the stated services
   Specifying the control objectives
   Identifying the risks
   Selecting and stating the criteria for their assertion
    (e.g. monitoring activities)
   Designing, implementing and documenting controls
    that are suitably designed and operating effectively
Key Differences:
Management Assertion

• Auditor’s Opinion – remains in the role of
  providing assurance regarding management’s
  assertions (same but more emphasis)
• Auditor is not the entity responsible for the
  communication (same but more emphasis)
• Subservice organizations must provide a similar
  assertion when the inclusive method is used
Key Differences:
System Description
• Currently a narrative description of controls
• SSAE 16 requires a description of the system
    Infrastructure
    Software
    People
    Procedures
    Data
Key Differences:
System Description
• Components common to existing Descriptions
  of Controls
   Services covered
   Period covered
   Control objectives and related control activities
   Complementary user controls

• For inclusive subservice organizations, add
   Related control objectives
   Related control activities
Key Differences:
System Description

• Additional elements for the Description of the
  System
   Classes of transactions and details on related
    procedures and accounting records
   The capturing and addressing of significant events
    other than transactions
Key Differences:
System Description

• Additional elements for the Description of the
  System
   Report preparation processes
   Other relevant aspects of the organization’s:
     Control environment
     Risk assessment process
     Information and communication systems
     Control activities and monitoring controls
Key Differences:
Risks Assessment
• Management should:
   Identify the risks that threaten the achievement of the
    stated services
   Identify the risks that threaten the achievement of the
    stated control objectives
   Evaluate whether the identified controls sufficiently
    address the risks to achieving the control objectives
• Risks to Services       Control Objectives
• Risks to Control Objectives        Control Activities
Design of Controls: Based on Risk

       Risk Assessment Supporting Control Design

            Services Provided
        Assessment of risks to services leads to:

            Control Objectives
     Assessment of risk to control objective leads to:

              Control Activities
Other Key Differences
• Service auditor use of internal audit
   – Reliance on / must disclose
   – Direct use / no disclosure
• Certain aspects of opinion apply to entire period rather
  than a point in time
    Narrative

    Control design

    Control implementation
Trust Services Principles
    SOC 2 and 3 Reporting
SOC 2 Reporting
• Governed by AT 101 – Attestation service
• Criteria for evaluation is Trust Services Principles (TSP)
• SSAE 16 guidance to be used
• Intended for users seeking assurance around one or
  more of control areas not relevant to ICFR of User
• TSP Criteria
      •   Security
      •   Availability
      •   Processing Integrity of the system
      •   Confidentiality of information processed
      •   Privacy of information processed
SOC 2 Reporting
• Limited Use report
   – Users generally user entity management not user auditors
   – Service Organization
   – Knowledgeable parties
• Helps user entity management
   – Obtain information about service organization controls
   – Assess and address risks
   – Carry out its responsibility for monitoring
SOC 2 Reporting
• Two Types of SOC 2 Reports
  – Type 1
     • Reports on fairness of presentation of management’s description of
       the service organization’s system
     • The suitability of design of controls
     • Unlikely to provide sufficient information to assess risks
     • Provides an understanding system and controls
     • May be useful when:
         – Organization is new
         – Recently made significant changes
         – Other reason insufficient time or history to perform Type 2
SOC 2 Reporting
   – Type 2
      • Same as Type 1 plus
      • Service auditor opinion on operating effectiveness
      • A detailed description of service auditor’s tests of controls and
        results
      • Will be most used of SOC 2


• Both Types 1 and 2 include management’s assertion
   – Included
   – Attached
SOC 2 Reporting
• Report Components
  – Management’s written assertion about whether in all material
    respects and based on suitable criteria, the following:
     • Management’s description of the system fairly presents the system
       that was designed and implemented
     • Controls were suitably designed to meet criteria
     • Type 2 controls operated effectively
     • If addressing the privacy principle, management complied with the
       commitments in its statement of privacy
  – All components are for a period of time
  – Management must have a reasonable basis for assertion
SOC 3 Reporting
• Governed by AT 101 – Attestation service
• Criteria for evaluation is Trust Services Principles (TSP)
• Intended for users seeing assurance around one or more
  of control areas not relevant to ICFR of User
• TSP Criteria:
      •   Security
      •   Availability
      •   Processing Integrity of the system
      •   Confidentiality of information processed
      •   Privacy of information processed
SOC 3 Reporting
• General use report
   – Can be published
   – For current and prospective customers
   – One Type
• Report components like a SOC 2
   – Does include management’s written assertion
   – Does include a description of the system and its boundaries
   – Is for a period of time
• Differences from SOC 2 Report
   – Description of system less detailed and not covered by CPA’s report
   – No description of test of effectiveness or results
   – If privacy principle is addressed there is no description of compliance
     with or test results
SOC 3 Reporting
• Seal (SysTrust for Service Organizations)
   – Can be delivery vehicle for report
   – Seal displayed on service organizations website
   – SysTrust is registered by AICPA an Canadian Institute of
     Chartered Accountants (CICA)
   – Practitioners must be licensed with CICA to use seal
Reporting Options
• Multiple reports combinations
   – SOC 1 and SOC 2
      • Services impacting ICFR of user and other services with trust
        services principles concerns
   – SOC 2 and SOC 3
      • Services not impacting ICFR and need to use beyond current users
        such as marketing to prospects
   – SOC 1 and SOC 3
      • Services impacting ICFR of user and other services with trust
        services principles concerns or marketing needs
Transition Planning

     Action Items for Service Providers
Transition Planning

• Determine effective date for your organization
• Confirm Type of SOC Report
   ICFR – SOC 1 (SSAE 16)
   Limited Use / Trust Principles – SOC 2
   General Use / Trust Principles – SOC 3
Transition Planning

• Develop a Communication Plan
   Within your organization
   To your clients
      Client Internal Audit/Risk Management (i.e., other users of
       the report)
      Marketing material
      Web pages
      Contractual references
Transition Planning

• Review Scope
   Included/excluded services
   Services that impact your client’s financial reporting
   Key third parties (sub-service organizations)
      Identify all relevant 3rd party service organizations
      Existence and use of their SAS 70/SSAE 16/SOC 2 Report
      Commitments from 3rd party relative to carve out or inclusive
       method
      Contractual /SLA impacts
Transition Planning

• Review System Description
   Services
   Scope
   Classes of Transactions
   Third parties (inclusive or carve out)
   Risks
   Objectives
   Controls
Transition Planning

• Assess Control Design
   Risk based
   Will impact control objectives
   Will impact supporting control activities
   Consider current SOX or other compliance efforts/
    governance models and efforts
Transition Planning

• Consider Management Assertion
   Review basis for assertion
   Review sufficiency of current monitoring processes
   Need for direct testing of controls not sufficiently
    monitored
In Conclusion

• Develop a project plan
• Assign responsibilities
• Monitor the plan
• See Risk / Seek Help
Contact Information

Jeffrey Paulette
BKD – IT Risk Services
417.865.8701
jpaulette@bkd.com

Contenu connexe

Tendances

CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersNUS-ISS
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Donald E. Hester
 
Soc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationSoc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationVISTA InfoSec
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMShantanu Rai
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Everything You Need To Know About SOC 1
Everything You Need To Know About SOC 1Everything You Need To Know About SOC 1
Everything You Need To Know About SOC 1Schellman & Company
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 

Tendances (20)

SOC 1 Overview
SOC 1 OverviewSOC 1 Overview
SOC 1 Overview
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security Leaders
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Soc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organizationSoc 2 attestation or ISO 27001 certification - Which is better for organization
Soc 2 attestation or ISO 27001 certification - Which is better for organization
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
PCI-DSS_Overview
PCI-DSS_OverviewPCI-DSS_Overview
PCI-DSS_Overview
 
Cissp Training PPT
Cissp Training PPTCissp Training PPT
Cissp Training PPT
 
Everything You Need To Know About SOC 1
Everything You Need To Know About SOC 1Everything You Need To Know About SOC 1
Everything You Need To Know About SOC 1
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 

Similaire à SSAE 16 Transitions Overview

Evaluating Service Organization Control Reports
Evaluating Service Organization Control ReportsEvaluating Service Organization Control Reports
Evaluating Service Organization Control ReportsJay Crossland
 
Auditor Reporting on Controls at Service Organizations
Auditor Reporting on Controls at Service OrganizationsAuditor Reporting on Controls at Service Organizations
Auditor Reporting on Controls at Service OrganizationsUniversity of Waterloo
 
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...NAFCU Services Corporation
 
Navigating the new Trust Services Criteria
Navigating the new Trust Services CriteriaNavigating the new Trust Services Criteria
Navigating the new Trust Services CriteriaMcKonly & Asbury, LLP
 
How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsSalvi Jansen
 
Asset Manager’s Guide to SOC 1
Asset Manager’s Guide to SOC 1Asset Manager’s Guide to SOC 1
Asset Manager’s Guide to SOC 1Grant Thornton LLP
 
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...Nancy Ideker
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 
A Beginner's Guide to SOC 2 Certification
A Beginner's Guide to SOC 2 CertificationA Beginner's Guide to SOC 2 Certification
A Beginner's Guide to SOC 2 CertificationShyamMishra72
 
Quality manual for small and medium companies
Quality manual for small and medium companiesQuality manual for small and medium companies
Quality manual for small and medium companiesbillwillis66
 
BKMSH Basics of SOC II
BKMSH Basics of SOC IIBKMSH Basics of SOC II
BKMSH Basics of SOC IIMojoFinancial
 
NQA - ISO 13485 Gap Guide
NQA - ISO 13485 Gap GuideNQA - ISO 13485 Gap Guide
NQA - ISO 13485 Gap GuideNA Putra
 
NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?NQA
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementationIITSW Company
 

Similaire à SSAE 16 Transitions Overview (20)

Evaluating Service Organization Control Reports
Evaluating Service Organization Control ReportsEvaluating Service Organization Control Reports
Evaluating Service Organization Control Reports
 
Auditor Reporting on Controls at Service Organizations
Auditor Reporting on Controls at Service OrganizationsAuditor Reporting on Controls at Service Organizations
Auditor Reporting on Controls at Service Organizations
 
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
 
Isae 3402 Abstract
Isae 3402   AbstractIsae 3402   Abstract
Isae 3402 Abstract
 
Due dilligence on a cpa firm or other accounting services provdier
Due dilligence on a cpa firm or other accounting services provdierDue dilligence on a cpa firm or other accounting services provdier
Due dilligence on a cpa firm or other accounting services provdier
 
Navigating the new Trust Services Criteria
Navigating the new Trust Services CriteriaNavigating the new Trust Services Criteria
Navigating the new Trust Services Criteria
 
How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 Reports
 
Asset Manager’s Guide to SOC 1
Asset Manager’s Guide to SOC 1Asset Manager’s Guide to SOC 1
Asset Manager’s Guide to SOC 1
 
New ISO 20000-1:2018 Changes, Implementation Steps
New ISO 20000-1:2018 Changes, Implementation StepsNew ISO 20000-1:2018 Changes, Implementation Steps
New ISO 20000-1:2018 Changes, Implementation Steps
 
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
 
ISO 22000 2018 -- what has changed
ISO 22000   2018 -- what has changedISO 22000   2018 -- what has changed
ISO 22000 2018 -- what has changed
 
Overview of ISO 19011:2018 Guidelines for Auditing Management Systems
Overview of ISO 19011:2018 Guidelines for Auditing Management SystemsOverview of ISO 19011:2018 Guidelines for Auditing Management Systems
Overview of ISO 19011:2018 Guidelines for Auditing Management Systems
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
SMKI vs SMAP vs SMM vs SML v04
SMKI vs SMAP vs SMM vs SML v04SMKI vs SMAP vs SMM vs SML v04
SMKI vs SMAP vs SMM vs SML v04
 
A Beginner's Guide to SOC 2 Certification
A Beginner's Guide to SOC 2 CertificationA Beginner's Guide to SOC 2 Certification
A Beginner's Guide to SOC 2 Certification
 
Quality manual for small and medium companies
Quality manual for small and medium companiesQuality manual for small and medium companies
Quality manual for small and medium companies
 
BKMSH Basics of SOC II
BKMSH Basics of SOC IIBKMSH Basics of SOC II
BKMSH Basics of SOC II
 
NQA - ISO 13485 Gap Guide
NQA - ISO 13485 Gap GuideNQA - ISO 13485 Gap Guide
NQA - ISO 13485 Gap Guide
 
NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementation
 

Plus de Jeffrey Paulette

Financial Reporting Tools for Dynamics GP Shootout
Financial Reporting Tools for Dynamics GP ShootoutFinancial Reporting Tools for Dynamics GP Shootout
Financial Reporting Tools for Dynamics GP ShootoutJeffrey Paulette
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Modern Healthcare Information Technology
Modern Healthcare Information TechnologyModern Healthcare Information Technology
Modern Healthcare Information TechnologyJeffrey Paulette
 
Sage MAS 90 Payment Solutions
Sage MAS 90 Payment SolutionsSage MAS 90 Payment Solutions
Sage MAS 90 Payment SolutionsJeffrey Paulette
 
Business Activity Monitoring in MAS 90 With KnowledgeSync
Business Activity Monitoring in MAS 90 With KnowledgeSyncBusiness Activity Monitoring in MAS 90 With KnowledgeSync
Business Activity Monitoring in MAS 90 With KnowledgeSyncJeffrey Paulette
 
Sage MAS 500 Version 7.4 Sneak Peak
Sage MAS 500 Version 7.4 Sneak PeakSage MAS 500 Version 7.4 Sneak Peak
Sage MAS 500 Version 7.4 Sneak PeakJeffrey Paulette
 
Sage MAS Intelligence for MAS 90 & MAS 200
Sage MAS Intelligence for MAS 90 & MAS 200Sage MAS Intelligence for MAS 90 & MAS 200
Sage MAS Intelligence for MAS 90 & MAS 200Jeffrey Paulette
 
Business Portal for Dynamics GP
Business Portal for Dynamics GPBusiness Portal for Dynamics GP
Business Portal for Dynamics GPJeffrey Paulette
 
Management Reporter for Dynamics GP
Management Reporter for Dynamics GPManagement Reporter for Dynamics GP
Management Reporter for Dynamics GPJeffrey Paulette
 
Dynamics GP Year End Closing Procedures 2010
Dynamics GP Year End Closing Procedures 2010Dynamics GP Year End Closing Procedures 2010
Dynamics GP Year End Closing Procedures 2010Jeffrey Paulette
 
Microsoft Dynamics GP 2010 Sneak Peak
Microsoft Dynamics GP 2010 Sneak PeakMicrosoft Dynamics GP 2010 Sneak Peak
Microsoft Dynamics GP 2010 Sneak PeakJeffrey Paulette
 
Workflows For Microsoft Dynamics GP 2010
Workflows For Microsoft Dynamics GP 2010Workflows For Microsoft Dynamics GP 2010
Workflows For Microsoft Dynamics GP 2010Jeffrey Paulette
 
Help Achieve Compliance Objectives with Microsoft Dynamics GP
Help Achieve Compliance Objectives with Microsoft Dynamics GPHelp Achieve Compliance Objectives with Microsoft Dynamics GP
Help Achieve Compliance Objectives with Microsoft Dynamics GPJeffrey Paulette
 
Sage MAS 90 Year End Payroll Closing For 2010
Sage MAS 90 Year End Payroll Closing For 2010Sage MAS 90 Year End Payroll Closing For 2010
Sage MAS 90 Year End Payroll Closing For 2010Jeffrey Paulette
 
Sage MAS 90 Year End Closing Procedures 2010
Sage MAS 90 Year End Closing Procedures 2010Sage MAS 90 Year End Closing Procedures 2010
Sage MAS 90 Year End Closing Procedures 2010Jeffrey Paulette
 
Sage MAS Intelligence vs. Biz Insights
Sage MAS Intelligence vs. Biz InsightsSage MAS Intelligence vs. Biz Insights
Sage MAS Intelligence vs. Biz InsightsJeffrey Paulette
 

Plus de Jeffrey Paulette (20)

Financial Reporting Tools for Dynamics GP Shootout
Financial Reporting Tools for Dynamics GP ShootoutFinancial Reporting Tools for Dynamics GP Shootout
Financial Reporting Tools for Dynamics GP Shootout
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Modern Healthcare Information Technology
Modern Healthcare Information TechnologyModern Healthcare Information Technology
Modern Healthcare Information Technology
 
Sage MAS 90 Payment Solutions
Sage MAS 90 Payment SolutionsSage MAS 90 Payment Solutions
Sage MAS 90 Payment Solutions
 
Business Activity Monitoring in MAS 90 With KnowledgeSync
Business Activity Monitoring in MAS 90 With KnowledgeSyncBusiness Activity Monitoring in MAS 90 With KnowledgeSync
Business Activity Monitoring in MAS 90 With KnowledgeSync
 
Sage MAS 500 Version 7.4 Sneak Peak
Sage MAS 500 Version 7.4 Sneak PeakSage MAS 500 Version 7.4 Sneak Peak
Sage MAS 500 Version 7.4 Sneak Peak
 
Sage MAS 90 with Doc-Link
Sage MAS 90 with Doc-LinkSage MAS 90 with Doc-Link
Sage MAS 90 with Doc-Link
 
Sage MAS Intelligence for MAS 90 & MAS 200
Sage MAS Intelligence for MAS 90 & MAS 200Sage MAS Intelligence for MAS 90 & MAS 200
Sage MAS Intelligence for MAS 90 & MAS 200
 
Business Portal for Dynamics GP
Business Portal for Dynamics GPBusiness Portal for Dynamics GP
Business Portal for Dynamics GP
 
Management Reporter for Dynamics GP
Management Reporter for Dynamics GPManagement Reporter for Dynamics GP
Management Reporter for Dynamics GP
 
Dynamics GP Year End Closing Procedures 2010
Dynamics GP Year End Closing Procedures 2010Dynamics GP Year End Closing Procedures 2010
Dynamics GP Year End Closing Procedures 2010
 
Microsoft Dynamics GP 2010 Sneak Peak
Microsoft Dynamics GP 2010 Sneak PeakMicrosoft Dynamics GP 2010 Sneak Peak
Microsoft Dynamics GP 2010 Sneak Peak
 
Workflows For Microsoft Dynamics GP 2010
Workflows For Microsoft Dynamics GP 2010Workflows For Microsoft Dynamics GP 2010
Workflows For Microsoft Dynamics GP 2010
 
Help Achieve Compliance Objectives with Microsoft Dynamics GP
Help Achieve Compliance Objectives with Microsoft Dynamics GPHelp Achieve Compliance Objectives with Microsoft Dynamics GP
Help Achieve Compliance Objectives with Microsoft Dynamics GP
 
Sage MAS 90 Year End Payroll Closing For 2010
Sage MAS 90 Year End Payroll Closing For 2010Sage MAS 90 Year End Payroll Closing For 2010
Sage MAS 90 Year End Payroll Closing For 2010
 
Sage MAS 90 Year End Closing Procedures 2010
Sage MAS 90 Year End Closing Procedures 2010Sage MAS 90 Year End Closing Procedures 2010
Sage MAS 90 Year End Closing Procedures 2010
 
Sage MAS Intelligence vs. Biz Insights
Sage MAS Intelligence vs. Biz InsightsSage MAS Intelligence vs. Biz Insights
Sage MAS Intelligence vs. Biz Insights
 
What's New In Sage MAS 90
What's New In Sage MAS 90What's New In Sage MAS 90
What's New In Sage MAS 90
 
What's new in sage mas 90
What's new in sage mas 90What's new in sage mas 90
What's new in sage mas 90
 
Sage MAS 90 Tips & Tricks
Sage MAS 90 Tips & TricksSage MAS 90 Tips & Tricks
Sage MAS 90 Tips & Tricks
 

Dernier

FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 

Dernier (20)

FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 

SSAE 16 Transitions Overview

  • 1. Service Organization Control Reports An Overview
  • 2. Agenda • Service Organization Control Reporting – Definitions – Background – Report Types and Guidance • Transitioning to SSAE 16/SOC 1 – Similarities to SAS 70 – Key Differences from SAS 70 • SOC 2 and 3 Reporting • Reporting Options • Summary • Questions
  • 4. What are Service Organizations? • Service Organization – provider of services that may impact a user’s financial reporting or pose a business risk  Services such as:  Cloud computing  Managed security  Financial services customer accounting  Customer support  Sales force automation  Health care claims management and processing  Enterprise IT outsourcing
  • 5. Definition: Service Auditor • Service auditor – a CPA who examines and reports on controls at a service organization
  • 6. Who are Users? • Users – typically considered clients of service organization  May need assurance regarding controls over security, availability, processing integrity, confidentiality or privacy • User Auditor – a CPA who performs a audit on the users financial statements  Needs assurance regarding the controls in place at the service organization that impact user financial statements
  • 7. Background • Why change? • SAS 70 has become increasingly misused • Never intended to offer assurance on compliance or operations • No such thing as a SAS 70 “certification” • Convergence with International Standards • AICPA is seeking to address needs of the marketplace
  • 8. Background • Several important changes – December 2009 • International Auditing and Assurance Standards Board issued new International Standards on Assurance Engagements (ISAE) 3402, Assurance Reports on Controls of Service Organizations – April 2010 • AICPA issued SSAE 16 Reporting on Controls of Service Organizations (SOC 1) • First significant modification on topic since SAS 70 issued in 1992 • Effective for reporting periods on or after June 15, 2011
  • 9. Background • Several important changes – May 2011 • AICPA issued a new guide for attestation engagements (AT 101) using Trust Services Principles (SOC 2) – June 2011 • Anticipated release of SSAE 16(SOC 1) reporting guide
  • 10. Service Organization Control Reports SOC 1 SOC 2 SOC 3 Purpose Report on controls Report on controls Report on controls relevant to user related to related to entities ICFR 1 compliance and compliance and operations operations Use of Report Restricted 2 Restricted 3 General Report Detail Includes Testing Includes Testing No Testing Detail Detail Detail AICPA SSAE 16 AT 101 and AT 101 and Interpretive and AICPA Guide AICPA Trust AICPA Trust Guidance (forthcoming in Services Services June) Principles/AICPA Principles Guide (SOC 2 just issued) 1InternalControl Over Financial Reporting 2Service Organization Management, Users, Users Auditor 3Service Organization Management, Users, Knowledgeable Parties
  • 11. Transitioning to SSAE 16 SOC 1 Reporting
  • 12. Similarities • SSAE 16 continues the focus on controls likely to be relevant to their user entities’ internal control over financial reporting (ICFR) • SSAE 16 will have SOC 1 reports similar in scope to the current SAS 70 reports – Type 1 – Type 2 • The format of the reports will not be significantly different
  • 13. Similarities • Narrative description of controls: Basis for new description of the system • Treatment of subservice organizations  Included (inclusive method)  Excluded (carve-out method) • Intended users of the report  Service organization’s management  Users  User auditors
  • 14. Key Differences: SAS vs. SSAE • Attest standard (Assertion), not an audit standard (GAAP) • Consistency with international standards and existing attestation standards • Increased focus on service organizations with services relevant to a user organizations internal control over financial reporting (ICFR) • Some SAS 70 reports will move to SOC 2 or SOC 3 reports
  • 15. Key Differences: Management Assertion A Management Assertion will be included in or attached to the SSAE 16 report • States*:  System fairly represented  System suitably designed and implemented  The related controls activities were suitably designed to achieve the stated control objectives  That the control activities are operating effectively (Type 2 only) *The auditor opinion attests to these statements. Type 1 specified date/Type 2 throughout the period
  • 16. Key Differences: Management Assertion • The report will reference that management is responsible for:  Preparing the system description  Providing the stated services  Specifying the control objectives  Identifying the risks  Selecting and stating the criteria for their assertion (e.g. monitoring activities)  Designing, implementing and documenting controls that are suitably designed and operating effectively
  • 17. Key Differences: Management Assertion • Auditor’s Opinion – remains in the role of providing assurance regarding management’s assertions (same but more emphasis) • Auditor is not the entity responsible for the communication (same but more emphasis) • Subservice organizations must provide a similar assertion when the inclusive method is used
  • 18. Key Differences: System Description • Currently a narrative description of controls • SSAE 16 requires a description of the system  Infrastructure  Software  People  Procedures  Data
  • 19. Key Differences: System Description • Components common to existing Descriptions of Controls  Services covered  Period covered  Control objectives and related control activities  Complementary user controls • For inclusive subservice organizations, add  Related control objectives  Related control activities
  • 20. Key Differences: System Description • Additional elements for the Description of the System  Classes of transactions and details on related procedures and accounting records  The capturing and addressing of significant events other than transactions
  • 21. Key Differences: System Description • Additional elements for the Description of the System  Report preparation processes  Other relevant aspects of the organization’s: Control environment Risk assessment process Information and communication systems Control activities and monitoring controls
  • 22. Key Differences: Risks Assessment • Management should:  Identify the risks that threaten the achievement of the stated services  Identify the risks that threaten the achievement of the stated control objectives  Evaluate whether the identified controls sufficiently address the risks to achieving the control objectives • Risks to Services Control Objectives • Risks to Control Objectives Control Activities
  • 23. Design of Controls: Based on Risk Risk Assessment Supporting Control Design Services Provided Assessment of risks to services leads to: Control Objectives Assessment of risk to control objective leads to: Control Activities
  • 24. Other Key Differences • Service auditor use of internal audit – Reliance on / must disclose – Direct use / no disclosure • Certain aspects of opinion apply to entire period rather than a point in time  Narrative  Control design  Control implementation
  • 25. Trust Services Principles SOC 2 and 3 Reporting
  • 26. SOC 2 Reporting • Governed by AT 101 – Attestation service • Criteria for evaluation is Trust Services Principles (TSP) • SSAE 16 guidance to be used • Intended for users seeking assurance around one or more of control areas not relevant to ICFR of User • TSP Criteria • Security • Availability • Processing Integrity of the system • Confidentiality of information processed • Privacy of information processed
  • 27. SOC 2 Reporting • Limited Use report – Users generally user entity management not user auditors – Service Organization – Knowledgeable parties • Helps user entity management – Obtain information about service organization controls – Assess and address risks – Carry out its responsibility for monitoring
  • 28. SOC 2 Reporting • Two Types of SOC 2 Reports – Type 1 • Reports on fairness of presentation of management’s description of the service organization’s system • The suitability of design of controls • Unlikely to provide sufficient information to assess risks • Provides an understanding system and controls • May be useful when: – Organization is new – Recently made significant changes – Other reason insufficient time or history to perform Type 2
  • 29. SOC 2 Reporting – Type 2 • Same as Type 1 plus • Service auditor opinion on operating effectiveness • A detailed description of service auditor’s tests of controls and results • Will be most used of SOC 2 • Both Types 1 and 2 include management’s assertion – Included – Attached
  • 30. SOC 2 Reporting • Report Components – Management’s written assertion about whether in all material respects and based on suitable criteria, the following: • Management’s description of the system fairly presents the system that was designed and implemented • Controls were suitably designed to meet criteria • Type 2 controls operated effectively • If addressing the privacy principle, management complied with the commitments in its statement of privacy – All components are for a period of time – Management must have a reasonable basis for assertion
  • 31. SOC 3 Reporting • Governed by AT 101 – Attestation service • Criteria for evaluation is Trust Services Principles (TSP) • Intended for users seeing assurance around one or more of control areas not relevant to ICFR of User • TSP Criteria: • Security • Availability • Processing Integrity of the system • Confidentiality of information processed • Privacy of information processed
  • 32. SOC 3 Reporting • General use report – Can be published – For current and prospective customers – One Type • Report components like a SOC 2 – Does include management’s written assertion – Does include a description of the system and its boundaries – Is for a period of time • Differences from SOC 2 Report – Description of system less detailed and not covered by CPA’s report – No description of test of effectiveness or results – If privacy principle is addressed there is no description of compliance with or test results
  • 33. SOC 3 Reporting • Seal (SysTrust for Service Organizations) – Can be delivery vehicle for report – Seal displayed on service organizations website – SysTrust is registered by AICPA an Canadian Institute of Chartered Accountants (CICA) – Practitioners must be licensed with CICA to use seal
  • 34. Reporting Options • Multiple reports combinations – SOC 1 and SOC 2 • Services impacting ICFR of user and other services with trust services principles concerns – SOC 2 and SOC 3 • Services not impacting ICFR and need to use beyond current users such as marketing to prospects – SOC 1 and SOC 3 • Services impacting ICFR of user and other services with trust services principles concerns or marketing needs
  • 35. Transition Planning Action Items for Service Providers
  • 36. Transition Planning • Determine effective date for your organization • Confirm Type of SOC Report  ICFR – SOC 1 (SSAE 16)  Limited Use / Trust Principles – SOC 2  General Use / Trust Principles – SOC 3
  • 37. Transition Planning • Develop a Communication Plan  Within your organization  To your clients  Client Internal Audit/Risk Management (i.e., other users of the report)  Marketing material  Web pages  Contractual references
  • 38. Transition Planning • Review Scope  Included/excluded services  Services that impact your client’s financial reporting  Key third parties (sub-service organizations)  Identify all relevant 3rd party service organizations  Existence and use of their SAS 70/SSAE 16/SOC 2 Report  Commitments from 3rd party relative to carve out or inclusive method  Contractual /SLA impacts
  • 39. Transition Planning • Review System Description  Services  Scope  Classes of Transactions  Third parties (inclusive or carve out)  Risks  Objectives  Controls
  • 40. Transition Planning • Assess Control Design  Risk based  Will impact control objectives  Will impact supporting control activities  Consider current SOX or other compliance efforts/ governance models and efforts
  • 41. Transition Planning • Consider Management Assertion  Review basis for assertion  Review sufficiency of current monitoring processes  Need for direct testing of controls not sufficiently monitored
  • 42. In Conclusion • Develop a project plan • Assign responsibilities • Monitor the plan • See Risk / Seek Help
  • 43. Contact Information Jeffrey Paulette BKD – IT Risk Services 417.865.8701 jpaulette@bkd.com