SOC Reports
SOC Readiness
If your organization is new to SOC reporting, SOC readiness assessments can be instrumental in preparing you for a successful examination. Our readiness assessment will walk you through key business processes and control elements, help you identify gaps in controls, uncover policies that need to be remediated, and verify that your necessary documentation and evidence of controls is available.
SOC 1®
A SOC 1® report evaluates the controls at your company that are relevant to your customer's internal controls over financial reporting. This report is particularly useful for third-party organizations involved in activities like initiating, processing, transmitting, recording, and reporting financial transactions. Examples of service organizations include third-party administrators (TPA), payroll processors, claims processors, and loan servicing companies.
SOC 2®
A SOC 2® report focuses on your company's controls as they relate to security, availability, processing integrity, confidentiality, or privacy (trust services criteria). This report is often requested by customers of companies providing technology related services such as cloud providers (SaaS, IaaS, PaaS), data center/colocation services, online security services, data analytics, or any other services where security, availability, processing integrity, confidentiality, or privacy are important.
SOC 3®
A SOC 3® report has the same purpose as a SOC 2® report but provides a less detailed description of the controls of the service organization. Typically, these reports are unrestricted and can be a great marketing tool to use for your business.
SOC for Supply Chain
This report provides transparency into your organization's supply chain risk management efforts. Its purpose is to communicate relevant information to stakeholders about your supply chain risk management processes and controls to detect, prevent, and respond to supply chain risks.
SOC for Cybersecurity
This report provides transparency into your organization's cybersecurity risk management program. Applicable to all organizations and industries, SOC for Cybersecurity is essential for demonstrating your commitment to managing cybersecurity risks effectively. The report is intended for organization management, directors, and a broad range of general users including analysts, investors, and others whose decisions might be affected by the effectiveness of the entity’s cybersecurity risk management program.