SOC 2 Compliance by the AICPA

Developed by the American Institute of CPAs (AICPA), SOC 2 remains the most popular cyber security auditing standard embraced by industry today. SOC 2 demonstrates to customers that you take cyber security and privacy seriously. Its universal applicability has fueled its popularity amongst service providers that process data in the cloud. With the right SOC 2 Report in hand, customers can be assured that the companies they work with are doing everything they can to protect their data from compromise.

Unlike other cyber security and privacy standards, which have very rigid requirements, SOC 2 reports are unique to each organization. In line with specific business practices, each designs its own controls to comply with one or more of the trust service criteria. Ensuring a cost effective balance between business needs and SOC 2 requirements is a true art form. 38North consultants are masters of striking the right balance for your organization based on years of supporting SOC 2 engagements for a multitude of clients across every industry. Trust Us to Get You There.

38North logo

What is SOC 2 Compliance?

SOC, which stands for System and Organizational Controls, is a framework developed by the American Institute of Certified Public Accountants (AICPA) for the purpose of providing regular, independent attestation of the controls that a company has implemented to mitigate information-related risk.

In a SOC 2 audit, you describe the policies, procedures, and systems you have in place to protect information across five categories called Trust Services Criteria. Your independent auditor evaluates the evidence you supply for the controls in each category, and when completed you receive your official SOC 2 report that you can share with customers and business partners to assure them that their data will be handled securely.

Types of SOC 2 Reports

There are two types of SOC reports:

Type I describes a vendor’s systems and whether their design is suitable to meet relevant trust principles. In a type I report, the auditor will attest to the design of controls at a single point in time.

Type II details the operational effectiveness of those systems. In a type II report, the auditor will attest to both the design and the operating effectiveness of those controls over a period of time, typically between 6-12 months.

SOC 2 Trust Services Criteria

Understanding SOC 2 compliance begins with understanding the Trust Services Criteria. SOC 2 defines criteria for managing customer data based on five criteria: security, availability, processing integrity, confidentiality and privacy. Choosing which criteria to pursue should be based on the nature of your service offerings, customer expectations, market demands and competitive landscape. Trust 38North to ensure just the right amount of services and criteria are selected while allowing you to maximize your competitive advantage.

Trust service criteria are broken down as follows:

SOC 2 Benefits

  • Demonstrates that customer data in the cloud is adequately protected
  • Allows customers to quickly evaluate security protections 
  • Promotes competitive advantage enabling greater sales
  • Assures customers that you operate services in the cloud in a secure manner
  • Protect reputation by helping prevent data breaches and infiltrations
  • Streamlines regulatory oversight and compliance

38North SOC 2 Services

No matter your industry, every organization can use the eye of an experienced team to speed up the SOC2 audit process. From getting ahead of the full audit and guiding post-assessment remediation and implementation, trust us to help you protect your customers.

Obtain SOC 2 Compliance with 38North

Book an initial SOC 2 compliance conversation with one of our global security experts today, and we’ll show you how SOC 2 compliance can help open new markets and provide industry-leading assurance.

Contact Us

Name(Required)
(Please do not provide additional PII in this box)
This field is for validation purposes and should be left unchanged.