Webinar

Video: Couch to SOC 2

The SOC 2 audit is growing in popularity and is quickly becoming the de-facto standard for independent assessments of security controls. It is designed for a broad range of technology hosting environments, software applications and cloud computing entities. Get up to speed fast, watch our video.

Contact Us
< Back to Insights
Insights  <  [Video] Couch to SOC 2 Audit

The SOC 2 audit is growing in popularity and is quickly becoming the de-facto standard for independent assessments of security controls. It is designed for a broad range of technology hosting environments, software applications and cloud computing entities. Get up to speed fast, watch our video.

Watch our video: Couch to SOC 2 Audit by clicking the video image below.

 

What is a SOC 2 Report?

The SOC 2 audit is growing in popularity and is quickly becoming the de-facto standard for independent assessments of security controls. It is designed for a broad range of technology hosting environments, software applications and cloud computing entities. A SOC 2 reports on controls relevant to the security of data and systems across five trust service principles (also known as “TSPs”) and associated criteria. The TSPs include: Security, Availability, Confidentiality, Processing Integrity and Privacy. A service organization determines which TSPs (and criteria) are most meaningful to their company and customers, and constructs unique controls to meet those criteria.  An auditor provides an opinion on whether the company’s controls fit the requirements.

Continue the Conversation with Our Team
Get in touch with us.

Contact Us