Security assurance via ISAE 3402 SOC 2 reports and ISO 27001:2013 standard implementation are mechanisms that can help you meet your clients’ expectations (around securing client data and processes).
ISO 27001 enables organisations to implement an ISMS (Information Security Management System) framework. This framework includes a requirement for detailed documentation of IT policy and procedures. Once an organisation is compliant to ISO 27001 standard, you are assured of having a strong foundation of Information Security principles that are designed and implemented. The framework can then be used to build upon other regulatory or client requirements including Cyber Essentials Plus, ISAE 3402 SOC2, Sarbanes Oxley Act IT controls, etc. A high level view of ISO 27001 could be similar to the image below -
ISAE 3402 is a third party (mainly suppliers) assurance mechanism in the form of SOC (Service Organisation Controls). There are three kinds of SOC reports:
SOC1 report - Relates to assurance on controls that could impact financial statements.
SOC2 report - Relates to assurance on IT controls.
SOC3 report - Relates to assurance on IT controls. Usually, these reports are not detailed and are generic in nature.
It should be noted that SOC2 and SOC3 report IT controls are based on a set of five Trust Services Principles - security, availability, processing integrity, confidentiality and privacy.
Clients expect suppliers to have assurance that demonstrates a period under consideration (at least 6 months) and a reasonable completeness around the controls considered to provide assurance. Supplier’s lack clarity on various options that are available today and don't know which ones are the best to optimise and meet clients assurance requirements.
There are two objectives of this blog:
In this blog, we will answer three basic questions:
This will get straight into your proposal and budgeting piece).
The above may sound a bit complex - contact Cyber Management Alliance for more information on how we can help.
The ISO certification is merely proof of your organisation’s ability to maintain an effective Information Security Management System at a certain point in time. It is comparable to getting a house inspected. The house may be very clean on the day of inspection but once the inspection is complete, there is no real way to verify the cleanliness standard of the house.
This lack of long-term assurance has caused many organisations to look to a Service Organisation Control attestation in order to demonstrate their ability to maintain an effective IT security control environment. A SOC2 audit examines the actual technology and processes behind your security, thus proving your ability to maintain your controls, as opposed to simply being able to execute them.
The difference lies in the methodology of the achievement of control objective. SOC2 could make the “audit criteria” for a particular control more prescriptive. (Example: the auditor confirms passwords should be eight characters across the firm irrespective of application criticality). In some cases, based on your ISO 27001 Risk Assessment, you may feel that you don’t need a very robust control implementation to manage a risk (example: you are ok for passwords to be six characters long in certain operational applications). However, the preliminary guidance you will receive from your SOC2 auditor is more “prescriptive”.
In our opinion, ISO 27001:2013 is a good practice framework for establishing an Information Security Management System. It is an excellent guide for implementing a security program at an organisation. In contrast, the ISAE 3402 SOC2 Security best use is to provide an organisation with a way to demonstrate that good security practices are in place and operating effectively. An organisation may have a need for both.
The author is CMA's experienced Third Party Information Security Risk advisor within CMA's consultant pool of experienced resources. He is CMA’s ISO 27001 LI/ SOC2/CISSP/CISA/SOX/PCIRM/SAP Cyber security professional trainer.
He has an MBA (Finance), Third Party Risk Management qualification, Computer Engineering, CISSP, CISA, ITIL (expert), COBIT (foundations), and SAP security qualifications. This article also has valuable contributions from our Intern MBA student Nikhil Kawale.
If you are interested in exploring our ISO 27001 service offerings, email us via our contact us page.