S4, M1-M5 Flashcards
(159 cards)
What creates the need for a SOC engagement?
outsourcing
Who is the user entity?
the organization using outsourced services
A service organization provides the user entity with the benefits of what four things?
Personnel
Expertise
Equipment
Technology
SOC Reports generally support what operation for a user entity’s auditor?
risk assessment
SOC examinations are conducted according to what standards issued by whom?
attestation statndards, issued by AICPA
T/F: A SOC engagement is audit.
False, it is an attestation engagement.
What are the three main types of SOC engagements?
SOC 1, SOC 2, SOC 3
A SOC 1 report reports on what?
controls relevant to user entity’s ICFR
SOC 1 reports are restricted to what three groups?
- management of service org
- user entities of service organization’s system
- independent auditors of user entity
SOC 1 reports are not intended for what group?
potential users of the service organization
A SOC 2 reports on the ___, ___, or ___ of a system or the ____/____ of the information processed by the system.
security, availability, processing integrity
confidentiality, privacy
Who are the intended users of the SOC 2 report?
mngnt and service auditor agree on intended users of the report (people with sufficient knowledge and understanding)
Who are the intended users of a SOC 3 report?
general use report
What two items does a SOC 3 report NOT include?
- description of system (detailed)
- description of test of controls and results of tests
What does a SOC for Cybersecurity Engagement report on?
entiy’s description of its cybersecurity risk management program and effectiveness of controls in that program
What does a SOC for Supply Chain Engagement report on?
controls over trust services criteria used to produce, manufacture, or distribute products
How many potential SOC reports are there (SOC 1-3 only)?
5
T/F: A SOC 3 report can only be a Type 2 report.
True.
What is the difference between a Type 1 and Type 2 report (design/op eff, time period)?
Type 1: design of controls only, point of time
Type 2: design and op eff, over a period of time
Can trust services criteria be reported on individually in a SOC report, or do they all have to be reported on in combination?
They can be individually reported on.
Which of the trust services criteria is required to be reported on in a SOC 2 report?
security
Th Security Trust Services Criteria is supposed to protect against what three things?
A - Unauthorized Access
D - Unauthorized Disclosure of Information
D - Damage to Systems
SOC for cybersecurity reports on which trust services criteria (3)?
- security
- availability
- confidentiality
The trust services criteria has been alsigned with what principles?
COSO