SOC Presentation Denver IIA
SOC Presentation Denver IIA
Reporting and
SSAE18
Denver IIA Chapter Meeting
July 18, 2017
kpmg.com
Agenda With you today
Nina Currigan
Managing Director, Advisory, IT Audit and Assurance
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
1
Evolution of SOC Reporting
SOC History
With the retirement of the
SAS 70 report in 2011,
Organizations are Service Organization
increasingly outsourcing Where we are Today
Control (SOC) reports
systems, business have been defined by the A broader suite of
processes, and data American Institute of “System and Organization
processing to service Certified Public Control” reports are now
providers in an effort to Accountants (AICPA) to offered which include
focus on core replace SAS 70 reports mapping to other
competencies, reduce and more clearly address frameworks, or opinions
costs, and more quickly the assurance needs of issued for other additional
deploy new application the users of outsourced SOC2®+ criteria and other
functionality. services. standards.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
3
System & Organization Controls (SOC)
SOC 1® - SOC for Service Organizations ICFR
• Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over
Financial Reporting (ICFR)
SOC 3® - SOC for Service Organizations: Trust Services Criteria for General Use Report
• These reports are designed to meet the needs of users who need assurance about the controls at a
service organization.
• A reporting framework for communicating information about the effectiveness of cybersecurity risk
management program to a broad range of stakeholders
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
4
Overview of SOC 1®, SOC 2®, and SOC 3® reports
SOC1® SOC2 ® SOC3 ®
— Internal control over financial
— Operational controls
reporting
— Detailed report for users and their — Detailed report for users, their — Short report that can be
Summary
auditors auditors, and specified parties more generally distributed
— Classes of transactions
— Procedures for processing and reporting
transactions — Infrastructure
— Accounting records of the system — Software
Defined scope of
— Handling of significant events and — Procedures
system
conditions other than transactions — People
— Report preparation for users — Data
— Other aspects relevant to processing and
reporting user transactions
— Security
— Availability
— Transaction processing controls
Control domain — Confidentiality
options — Supporting information technology
— Processing integrity
general controls
— Privacy
— SOC 2®+ additional criteria
— Control objectives are defined by the
— Principles are selected by the service provider.
Level of service provider, and may vary
standardization depending on the type of service — Specific predefined criteria are evaluated against rather than
provided. control objectives.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
5
SOC reports for different scenarios
SOC 1® Financial
SOC 2 ® and SOC 3 ®
Reporting Controls
Security
Availability
Financial/Business Process and
Confidentiality
Supporting System Controls
Processing Integrity
Privacy
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
6
Overview of SOC 2 ® and SOC 3 ® trust services
principles
Domain Principle
Availability — The system is available for operation and use as committed or agreed.
Processing Integrity — System processing is complete, valid, accurate, timely, and authorized.
— Personal information is collected, used, retained, disclosed, and destroyed in conformity with the
Privacy commitments in the entity’s privacy notice and with criteria set forth in generally accepted privacy
principles (GAPP) issued by the AICPA and CPA Canada.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
7
How companies are considering SOC 2® and SOC 3 ®
reports
Regulatory and
Client Due Electronic
Diligence HIPAA Business Banking
Data Management and Associates (Security,
Purposes
Analysis Services (Security, Confidentiality)
(Availability,
(Security, Availability, Confidentiality,
Security)
Confidentiality, SOC 2+ HITRUST)
Processing Integrity)
Asset Management
(Security,
Billing and Claim Confidentiality)
Payment Services
Cyber Security (Security, Corporate
(Security) Processing Services, Fiduciary
Integrity) Asset Management,
Third-party and Client Accounting
Relationships Services (Security and
Business Processing
Outsourcing (all)
SOC2 Over Integrity)
Services Processing Centers Data Center
(Security, (Security, Hosting
Processing Processing integrity) (Security and Infrastructure
Integrity) Availability) (Availability,
Security)
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
8
Enhanced Reporting / SOC 2® +
Option 1 Option 2
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
9
Example SOC 2® + CSA CCM
SOC 2® Common Criteria (Security)
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
10
Example SOC 2 + NIST 800-53 framework
SOC 2® Common Criteria (Security)
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
11
HITRUST
ISO
27001/2
COBIT
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
12
Example SOC 2® + HITRUST common security
framework
SOC 2® Common Criteria (Security)
The additional controls listed above are not intended to be all-compassing, and additional controls may be necessary based on each
organization’s environment.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
13
Cybersecurity Attestation
The AICPA has released guidance for attestation
services related to Cybersecurity in April 2017.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
14
SOC for Cybersecurity
— Based on two sets of criteria:
- Description Criteria
- Control Criteria
— Can be the SOC 2 criteria related to Security (Common Criteria),
Availability, and Confidentiality, or
— Other established control criteria such as:
- NIST Critical Infrastructure Cybersecurity Framework or
- ISO 27001/27002
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
15
Transition from SSAE 16 to SSAE 18
Change from SSAE 16 to SSAE 18
The Auditing Standards Board (ASB) has a multiyear project to redraft all of the standards
that it issues into a new “clarity format.” The intent of this format is to address concerns
over the clarity, length, and complexity of its standards.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
17
SSAE 18 – Scope and Effective Date
Scope of SSAE 18
• Impacts all attestation engagements except as noted in the previous
slide
• Will impact all System and Organization Control (SOC) reports (i.e.,
SOC 1®, SOC 2®, and SOC 3®)
Effective Date
• Service Auditor’s reports dated on or after May 1, 2017
• Early adoption permitted
• Since the required implementation is based on the date of the Service
Auditor’s Report, the new standards have the potential to impact a
wide range of reporting periods.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
18
SSAE 18 – Impact on SOC Reporting
The below summary includes the more significant revisions to the attestation standards that directly affect SOC 1® reporting. These
revisions include the following topics:
Summary of revisions
— Review of internal audit reports and regulatory — Obtaining evidence regarding the design of
examinations controls
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
19
A “How To” Guide on using a
SOC Report
Leading practices for user organization adoption of
SOC reports
Key Activities Criteria Descriptions
Inventory vendor — Inventory existing outsourced vendor relationships to determine where the organization has obtained, and
relationships requires third-party assurance going forward.
Assess vendor
— Assess the key risks associated with significant outsourced vendors (e.g., Security, Availability, other risks).
risks
— Determine whether a SOC 1® report is required for financial reporting purposes.
Identify relevant — Determine whether detailed SOC 2® reports or summary level SOC 3® reports are required for key service
reports providers. Also determine which principles should be covered within the SOC 2®/SOC 3® reports
(i.e., Security, Availability, Confidentiality, Processing Integrity, and/or Privacy).
— Assess what, if any, specific audit reports are required by contract, and whether contracts have right to
audit clauses.
Contractual
— Determine how any historical SAS 70 (now SSAE 16) references should be updated to the relevant types of
provisions
SOC report.
— Determine whether SOC 2®/SOC 3® reports should be required by contract.
— Determine the frequency with which key outsourced vendors will be assessed.
Vendor
monitoring — Build the process of obtaining and reviewing SOC reports, and following up on any areas of concern into
the vendor monitoring process.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
21
Leading practices for user organization adoption of
SOC reports (continued)
Key Activities Descriptions
Vendor due — Consider requesting relevant SOC reports as part of the due diligence process for assessing, and
diligence on-boarding new outsourced service providers.
— Where assurance reports are desirable, key points should be communicated, and confirmed with the
service providers:
- Scope of the system covered
- Specific report to be provided (SOC 1®, SOC 2®, SOC 3®)
- Type of report to be provided, and period covered (i.e., Type 2 for a specified period, or in certain cases,
Communication
Type 1 as of a specified point in time)
plan
- Control domains covered (included control objectives for SOC 1®, included principles for SOC 2®/SOC
3®)
- Existence of any key supporting subservice providers (e.g., data center providers, IaaS providers), and
whether they are included in scope
- Expected report delivery date.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
22
Leading practices for user organization evaluation
of SOC reports
Key Areas Description of Considerations to Evaluate
Results of Tests — Does the report need to include the service auditor’s test procedures and associated results?
(N/A for SOC 3®) — Were there exceptions noted by the service auditor; how might the exception(s) impact your risk assessments?
Changes noted during the — Have any significant changes in systems, subservice providers, or controls occurred during the examination
period period and, if so, do they have any impact on the user?
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
23
SOC 2 and SOC 3 adoption – Frequently asked
questions
— Identification and scoping of report subject matter and selection of criteria
— Define the scope of the system including infrastructure, software, people, procedures and data
What is the process to —
® ®
Perform SOC 2 /3 Diagnostic/Readiness Assessment
initiate a SOC 2®/3®?
— Remediate items identified during the Diagnostic Assessment
® ®
— Execute the SOC 2 /3 report engagement
— Cost depends on the scope of the report (selected principles, number of controls, locations, etc.)
How much do they —
®
Similar pricing structure to SOC 1 reports
cost?
— Ability to leverage dual purpose testing between reports
® ®
How long does it take to — Duration of a SOC 2 /3 engagement also depends on the scope of the report, but is similar to a
®
perform a SOC 2®/3®? SOC 1
— Firms issuing multiple SOC reports often select a central contact to administer their SOC
Who typically owns the
administration of SOC reporting program
reports from the service — Responsibilities may include inventorying reports, tracking distribution, approving requests for
provider? new reports, and monitoring customer inquiries.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
24
Conclusion
— SOC Reporting has evolved
- SOC 1 ® focuses on matters relevant to user entities’ internal control over financial reporting.
- SOC 2 ® and SOC 3 ® reports apply more broadly to operational controls covering security, availability, confidentiality, processing
integrity, and/or privacy across a variety of systems.
- SOC 2 ® and 3 ® can supplement a SOC 1 report by taking a “deeper dive” into key areas.
- Emerging OC options exist: SOC 2+, SOC 2 Enhanced, SOC for Cybersecurity, etc.
— In April 2016, the ASB issued SSAE 18 which replaces SSAE 16
- Has an impact on all SOC reports
- Impacts reports dated on or after May 1, 2017
- Several revisions to SOC reports will need to be made as a result of this change
— Using a SOC report should include consideration of:
- Report type (SOC 1, SOC 2, SOC 3, Type 1, Type 2, etc.)
- Report scope
- Report period
- Opinion (Unqualified, Qualified, Adverse)
- Testing Exceptions
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
25
Questions and Answers
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International
Cooperative (“KPMG International”), a Swiss entity. All rights reserved. NDPPS 551743
26
kpmg.com/socialmedia
Some or all of the services described herein may not be permissible for KPMG Audit clients and their affiliates.
The information contained herein is of a general nature and is not intended to address the circumstances of any particular
individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such
information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on
such information without appropriate professional advice after a thorough examination of the particular situation.
© 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of
independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity.
All rights reserved. NDPPS 551743
The KPMG name and logo are registered trademarks or trademarks of KPMG International.