SlideShare a Scribd company logo
Page 1 of 5 Crossland Advisors, Inc.
http://crosslandadvisors.com/
610-365-4852
Copyright © 2016
Evaluating Service Organization Control Reports (SOC1, SOC2, SOC3)
Even though Service Organization Control (SOC) reports have been available since
1992, their actual usage and importance has increased significantly with the Sarbanes-
Oxley (SOX) Act in 2002. Prior to SOX, contractual obligations for service
organizations to provide a SOC report were generally not specific or not included (it is
noted that prior to 2002, contractual requirements for SOC reports were typically
found in the government sector, but not for commercial companies). Also, the client
organization (aka the user entity) requesting and receiving the report seldom
evaluated the report; often, it was a “check-the-box” compliance exercise only to
make sure a report was received.
With the advent of SOX, financial auditors realized that controls at service
organizations needed to be thoroughly evaluated to make sure they were
comprehensive, appropriate and operating effectively. The increased focus by
financial auditors forced user entity management to also evaluate the controls at
their service organization(s) since these services are an extension of the user entity’s
processes and internal controls and could have a direct impact on other user entity
controls and financial statements. The user entity should expect their service
organization(s) to have at least the same level of controls as if those services were
provided in-house. Unfortunately, most user entities do not have a thorough
understanding of SOC reports and thus do not know how to effectively evaluate the
report(s) they receive from their service organization(s).
A comprehensive evaluation of a SOC report will ascertain whether:
• The report as of a date or period is appropriate for user entity purposes
• The standard under which the SOC report was issued is appropriate
• The report identifies the use of subservice organizations
• The intended users of the report are appropriate
• The report addresses the “System”, which includes the IT applications, policies
and procedures and service organization locations, used by the entity. “System”
refers to the policies and procedures designed, implemented and documented
by management of the service organization, including IT components, to
provide user entities with the services covered by the service auditor's report.
The term “System” does not refer to just the IT applications.
• The evidence provided by the report is sufficient and appropriate for
understanding the service organization's relevant processes and risks
• The report identifies issues with the processes or controls at the service
organization
Page 2 of 5 Crossland Advisors, Inc.
http://crosslandadvisors.com/
610-365-4852
Copyright © 2016
The first step in evaluating a SOC report is to understand the sections of the report:
 SOC1
o Report cover
o Auditor’s opinion
o Management assertion
o Description of the system
o Control objectives, controls, tests and results
 SOC2
o Report cover
o Auditor’s opinion
o Management assertion
o Description of the system
o Criteria, controls, tests and results
 SOC3
o Report cover
o Auditor’s opinion
o Management assertion
o Short description of the system
Auditor’s opinion
The Auditor’s opinion summaries the scope and conclusion of the report. The opinion
includes:
 The system(s) included in scope and the period being audited
 An identification of subservice organizations included or carved-out
 Whether or not the system description fairly presents what was designed and
implemented, the controls related to the control objectives were suitably
designed to reasonably achieve the control objectives and the controls tested
were operating effectively throughout the period
 The intended users of the report
Management assertion
The service organization makes an assertion regarding its description of the system
and the operation of the system. Management asserts that:
 The description presents how the service organization’s system was designed
and implemented
Page 3 of 5 Crossland Advisors, Inc.
http://crosslandadvisors.com/
610-365-4852
Copyright © 2016
 The description of the service organization’s system includes relevant details
of changes to the service organization’s system during the period covered by
the description
 The description of the service organization’s system does not omit or distort
information relevant to the service organization’s system, while
acknowledging that management’s description of the service organization’s
system is prepared to meet the common needs of a broad range of user
entities and their user auditors, and may not, therefore, include every aspect
of the service organization’s system that each individual user entity and its
user auditor may consider important in its own particular environment
 The risks that threaten the achievement of the control objectives/criteria
stated in management’s description of the service organization’s system have
been identified by management
 The controls identified in management’s description of the service
organization’s system would, if operating as described, provide reasonable
assurance that those risks would not prevent the control objectives/criteria
stated in the description from being achieved
 The controls were consistently applied as designed, throughout the specified
period, including whether manual controls were applied by individuals who
have the appropriate competence and authority
An assertion should be included for any service organization whose control objectives
and controls have been included in the Auditor’s opinion, system description and
control objectives/ criteria, controls, tests and results. The assertion may include the
name of the authorizing official at the service organization, but such naming is not
required.
Description of the system
The system description identifies the services that are likely to affect a user entity’s
internal controls, including applications, technology and supporting IT processes. The
description will identify and document:
 The control environment, risk assessment and monitoring performed as part of
internal control
 Each business process/principle being included as part of the service overview
along with the processes owner(s), process description and related controls
 The control objectives/criteria associated with each business process/principle
and document the risks that threaten the achievement of the control
objectives/criteria, the controls that address the risks, and the service
organization’s basis for its assertion that each control was implemented
throughout the report period. While IT controls do not directly affect the
financial statement assertions of user entities, they are almost always
Page 4 of 5 Crossland Advisors, Inc.
http://crosslandadvisors.com/
610-365-4852
Copyright © 2016
necessary for the proper functioning of the business process controls that do
directly affect these assertions.
 The physical location(s) where processing occurs
 Subservice organizations and the services they provide
 Complementary user entity controls (CUECs). CUECs are controls assumed to
be in place at the user entity in order for the specified control objectives and
related controls to be achieved
Control objectives/criteria, controls, tests and results
The control objectives/criteria in scope are detailed in a matrix that includes a
description of the tests performed to determine the operating effectiveness of the
controls along with any control deviations noted during testing. The description of
the tests performed should include the nature, timing and extent of the testing
performed.
Areas for follow-up when reviewing a report:
 The report date or period is not appropriate for the intended use
 The report type is not appropriate for the intended use
 The reporting standard is not appropriate for the intended use
 Subservice organizations are noted in the Auditor’s opinion and system
description
 The auditor is not independent and competent
 The Auditor’s opinion is qualified
 The report has restricted usage
 There is not a Management Assertion for each subservice organization whose
control objectives and controls have been included in the Auditor’s opinion,
system description and control objectives/ criteria, controls, tests and results
 The Description of the system does not address, in detail, the processes and
controls expected
 The processing location(s) listed are not the same as those contracted for with
the service organization
 Complementary user entity controls (CUECs) will need to be assessed for
applicability and testing
 The tests performed do not address all aspects of the control objectives/
criteria
 Testing deviations are noted
Page 5 of 5 Crossland Advisors, Inc.
http://crosslandadvisors.com/
610-365-4852
Copyright © 2016
Crossland Advisors provides IT risk and control services to a number of industries,
including:
 Manufacturing
 Pharmaceuticals
 Healthcare
 Financial Services
 Insurance
 Government
 Retail
 Utilities
Our extensive experience allows us to develop real world solutions to complex
challenges. We use a process-focused risk-based approach and are able to relate
leading practices and improvements to understand, anticipate and address a wide
variety of information system risk and process issues.
Crossland Advisors is ready to work with you to satisfy your IT risk and control needs.

More Related Content

PPTX
Auditor Reporting on Controls at Service Organizations
PPTX
information system and computers
PDF
Dimension data pursuing compliance in public cloud white paper
PPTX
BKMSH Basics of SOC II
PPTX
Achieving SSAE 16 Certification
PDF
ISO/DIS 45001:2017 OH&S manual (preview)
PDF
Internal audit ( pdf drive )
DOCX
Audit Checklist for Information Systems
Auditor Reporting on Controls at Service Organizations
information system and computers
Dimension data pursuing compliance in public cloud white paper
BKMSH Basics of SOC II
Achieving SSAE 16 Certification
ISO/DIS 45001:2017 OH&S manual (preview)
Internal audit ( pdf drive )
Audit Checklist for Information Systems

What's hot (20)

PDF
NQA ISO 13485 Gap Guide – what’s changed?
PDF
SOX 2016 - PART I - COSO 2013
PDF
NQA ISO 9001 to ISO 27001 Gap Guide
PPTX
Building a QMS for Your SaMD
PPTX
Computer system validation
PDF
Computer System Validation Training
PDF
VFD_QAM_1-_AAR_M-1003_Rev_B_-_04_AUG_2014
PDF
Computer-System-Validation
PPTX
PDF
SSAE 16 Transitions Overview
PPTX
Computerized system validation
PDF
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
PPTX
Tugas mandiri audit novita dewi 11353202277
PDF
Understanding changes of ISO 9001-2008 to ISO 9001-2015
PDF
System Analysts_CSV
PPT
Overview on “Computer System Validation” CSV
PDF
Computer system validation review article by-mahesh b wazade
PDF
Use Of Techniques And Technology In Internal Audit
PPTX
Overview of computer system validation
NQA ISO 13485 Gap Guide – what’s changed?
SOX 2016 - PART I - COSO 2013
NQA ISO 9001 to ISO 27001 Gap Guide
Building a QMS for Your SaMD
Computer system validation
Computer System Validation Training
VFD_QAM_1-_AAR_M-1003_Rev_B_-_04_AUG_2014
Computer-System-Validation
SSAE 16 Transitions Overview
Computerized system validation
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
Tugas mandiri audit novita dewi 11353202277
Understanding changes of ISO 9001-2008 to ISO 9001-2015
System Analysts_CSV
Overview on “Computer System Validation” CSV
Computer system validation review article by-mahesh b wazade
Use Of Techniques And Technology In Internal Audit
Overview of computer system validation
Ad

Similar to Evaluating Service Organization Control Reports (20)

PPTX
SOC2loc_finalCompliance_-Checklist (2).pptx
PPTX
Due dilligence on a cpa firm or other accounting services provdier
PDF
CISSP Domain 06 Security Assessment and Testing.pdf
PPTX
Auditor Report on Controls to be used as Template.pptx
PPT
Isae 3402 Abstract
PDF
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
PPTX
Account Right SOC Services brochure.pptx
PDF
Planning for a new Service Organization Control (SOC) report
PDF
Navigating Compliance for MSPs From First Audit to Monetization
PPT
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
PPT
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
PPT
Technology Controls in Business - End User Computing
PDF
Key Principles for SOC Certificate
PDF
Asset Manager’s Guide to SOC 1
PDF
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
PDF
September article SSAE 16 the SAS 70 Final Version (mp)
PDF
SMKI vs SMAP vs SMM vs SML v04
PDF
Understanding SOC Certification: Ensuring Trust and Security in Your Business
PDF
SOC Certification for Service Providers: Securing Customer Data
PDF
Crafting an End-to-End Pharma GRC Strategy
SOC2loc_finalCompliance_-Checklist (2).pptx
Due dilligence on a cpa firm or other accounting services provdier
CISSP Domain 06 Security Assessment and Testing.pdf
Auditor Report on Controls to be used as Template.pptx
Isae 3402 Abstract
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Account Right SOC Services brochure.pptx
Planning for a new Service Organization Control (SOC) report
Navigating Compliance for MSPs From First Audit to Monetization
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
Technology Controls in Business - End User Computing
Key Principles for SOC Certificate
Asset Manager’s Guide to SOC 1
Internal Control Certification – It’s Not Just an Accounting Thing (Credit Un...
September article SSAE 16 the SAS 70 Final Version (mp)
SMKI vs SMAP vs SMM vs SML v04
Understanding SOC Certification: Ensuring Trust and Security in Your Business
SOC Certification for Service Providers: Securing Customer Data
Crafting an End-to-End Pharma GRC Strategy
Ad

Recently uploaded (20)

PPTX
operations management : demand supply ch
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
How to Get Funding for Your Trucking Business
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
How to Get Approval for Business Funding
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Comments on Crystal Cloud and Energy Star.pdf
PPTX
Principles of Marketing, Industrial, Consumers,
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
Introduction to Generative Engine Optimization (GEO)
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
IFRS Notes in your pocket for study all the time
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
operations management : demand supply ch
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
How to Get Funding for Your Trucking Business
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
How to Get Approval for Business Funding
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Ôn tập tiếng anh trong kinh doanh nâng cao
Tata consultancy services case study shri Sharda college, basrur
Comments on Crystal Cloud and Energy Star.pdf
Principles of Marketing, Industrial, Consumers,
Slide gioi thieu VietinBank Quy 2 - 2025
Introduction to Generative Engine Optimization (GEO)
Deliverable file - Regulatory guideline analysis.pdf
Solaris Resources Presentation - Corporate August 2025.pdf
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
IFRS Notes in your pocket for study all the time
NEW - FEES STRUCTURES (01-july-2024).pdf

Evaluating Service Organization Control Reports

  • 1. Page 1 of 5 Crossland Advisors, Inc. http://crosslandadvisors.com/ 610-365-4852 Copyright © 2016 Evaluating Service Organization Control Reports (SOC1, SOC2, SOC3) Even though Service Organization Control (SOC) reports have been available since 1992, their actual usage and importance has increased significantly with the Sarbanes- Oxley (SOX) Act in 2002. Prior to SOX, contractual obligations for service organizations to provide a SOC report were generally not specific or not included (it is noted that prior to 2002, contractual requirements for SOC reports were typically found in the government sector, but not for commercial companies). Also, the client organization (aka the user entity) requesting and receiving the report seldom evaluated the report; often, it was a “check-the-box” compliance exercise only to make sure a report was received. With the advent of SOX, financial auditors realized that controls at service organizations needed to be thoroughly evaluated to make sure they were comprehensive, appropriate and operating effectively. The increased focus by financial auditors forced user entity management to also evaluate the controls at their service organization(s) since these services are an extension of the user entity’s processes and internal controls and could have a direct impact on other user entity controls and financial statements. The user entity should expect their service organization(s) to have at least the same level of controls as if those services were provided in-house. Unfortunately, most user entities do not have a thorough understanding of SOC reports and thus do not know how to effectively evaluate the report(s) they receive from their service organization(s). A comprehensive evaluation of a SOC report will ascertain whether: • The report as of a date or period is appropriate for user entity purposes • The standard under which the SOC report was issued is appropriate • The report identifies the use of subservice organizations • The intended users of the report are appropriate • The report addresses the “System”, which includes the IT applications, policies and procedures and service organization locations, used by the entity. “System” refers to the policies and procedures designed, implemented and documented by management of the service organization, including IT components, to provide user entities with the services covered by the service auditor's report. The term “System” does not refer to just the IT applications. • The evidence provided by the report is sufficient and appropriate for understanding the service organization's relevant processes and risks • The report identifies issues with the processes or controls at the service organization
  • 2. Page 2 of 5 Crossland Advisors, Inc. http://crosslandadvisors.com/ 610-365-4852 Copyright © 2016 The first step in evaluating a SOC report is to understand the sections of the report:  SOC1 o Report cover o Auditor’s opinion o Management assertion o Description of the system o Control objectives, controls, tests and results  SOC2 o Report cover o Auditor’s opinion o Management assertion o Description of the system o Criteria, controls, tests and results  SOC3 o Report cover o Auditor’s opinion o Management assertion o Short description of the system Auditor’s opinion The Auditor’s opinion summaries the scope and conclusion of the report. The opinion includes:  The system(s) included in scope and the period being audited  An identification of subservice organizations included or carved-out  Whether or not the system description fairly presents what was designed and implemented, the controls related to the control objectives were suitably designed to reasonably achieve the control objectives and the controls tested were operating effectively throughout the period  The intended users of the report Management assertion The service organization makes an assertion regarding its description of the system and the operation of the system. Management asserts that:  The description presents how the service organization’s system was designed and implemented
  • 3. Page 3 of 5 Crossland Advisors, Inc. http://crosslandadvisors.com/ 610-365-4852 Copyright © 2016  The description of the service organization’s system includes relevant details of changes to the service organization’s system during the period covered by the description  The description of the service organization’s system does not omit or distort information relevant to the service organization’s system, while acknowledging that management’s description of the service organization’s system is prepared to meet the common needs of a broad range of user entities and their user auditors, and may not, therefore, include every aspect of the service organization’s system that each individual user entity and its user auditor may consider important in its own particular environment  The risks that threaten the achievement of the control objectives/criteria stated in management’s description of the service organization’s system have been identified by management  The controls identified in management’s description of the service organization’s system would, if operating as described, provide reasonable assurance that those risks would not prevent the control objectives/criteria stated in the description from being achieved  The controls were consistently applied as designed, throughout the specified period, including whether manual controls were applied by individuals who have the appropriate competence and authority An assertion should be included for any service organization whose control objectives and controls have been included in the Auditor’s opinion, system description and control objectives/ criteria, controls, tests and results. The assertion may include the name of the authorizing official at the service organization, but such naming is not required. Description of the system The system description identifies the services that are likely to affect a user entity’s internal controls, including applications, technology and supporting IT processes. The description will identify and document:  The control environment, risk assessment and monitoring performed as part of internal control  Each business process/principle being included as part of the service overview along with the processes owner(s), process description and related controls  The control objectives/criteria associated with each business process/principle and document the risks that threaten the achievement of the control objectives/criteria, the controls that address the risks, and the service organization’s basis for its assertion that each control was implemented throughout the report period. While IT controls do not directly affect the financial statement assertions of user entities, they are almost always
  • 4. Page 4 of 5 Crossland Advisors, Inc. http://crosslandadvisors.com/ 610-365-4852 Copyright © 2016 necessary for the proper functioning of the business process controls that do directly affect these assertions.  The physical location(s) where processing occurs  Subservice organizations and the services they provide  Complementary user entity controls (CUECs). CUECs are controls assumed to be in place at the user entity in order for the specified control objectives and related controls to be achieved Control objectives/criteria, controls, tests and results The control objectives/criteria in scope are detailed in a matrix that includes a description of the tests performed to determine the operating effectiveness of the controls along with any control deviations noted during testing. The description of the tests performed should include the nature, timing and extent of the testing performed. Areas for follow-up when reviewing a report:  The report date or period is not appropriate for the intended use  The report type is not appropriate for the intended use  The reporting standard is not appropriate for the intended use  Subservice organizations are noted in the Auditor’s opinion and system description  The auditor is not independent and competent  The Auditor’s opinion is qualified  The report has restricted usage  There is not a Management Assertion for each subservice organization whose control objectives and controls have been included in the Auditor’s opinion, system description and control objectives/ criteria, controls, tests and results  The Description of the system does not address, in detail, the processes and controls expected  The processing location(s) listed are not the same as those contracted for with the service organization  Complementary user entity controls (CUECs) will need to be assessed for applicability and testing  The tests performed do not address all aspects of the control objectives/ criteria  Testing deviations are noted
  • 5. Page 5 of 5 Crossland Advisors, Inc. http://crosslandadvisors.com/ 610-365-4852 Copyright © 2016 Crossland Advisors provides IT risk and control services to a number of industries, including:  Manufacturing  Pharmaceuticals  Healthcare  Financial Services  Insurance  Government  Retail  Utilities Our extensive experience allows us to develop real world solutions to complex challenges. We use a process-focused risk-based approach and are able to relate leading practices and improvements to understand, anticipate and address a wide variety of information system risk and process issues. Crossland Advisors is ready to work with you to satisfy your IT risk and control needs.