SOC 2®* Trust Services Criteria

Table of Contents

Compliance Questions?

Key Takeaways

  1. Five Core Principles: SOC 2® reports provide detailed assurance regarding controls in five categories, known as the Trust Services Criteria (TSC): Security, Availability, Processing Integrity, Confidentiality, and Privacy.

  2. Security is Mandatory: The Security criterion is the baseline requirement for every SOC 2® report. It focuses on protecting information and systems from unauthorized access, unauthorized disclosure, and damage.

  3. Customized Compliance: Organizations should work with their assessor to select the most applicable criteria (beyond Security) to ensure the final report best supports their specific compliance goals and client assurance needs.

Understanding SOC 2® Reports

SOC 2® reports provide detailed information and assurance about the controls at a service organization relevant to security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed. These are called the SOC 2® Trust Services Criteria.

It’s important to understand the SOC 2® Trust Services Criteria so you can choose the most applicable criteria for your organization. Your assessor can work with you to help ensure that your report best supports your organization and compliance goals.

SOC 2®* Trust Services Criteria

  1. Security: Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems. 
  2. Availability: Information and systems are available for operation and use to meet the entity’s objectives.
  3. Confidentiality: Information designated as confidential is protected to meet the entity’s objectives. 
  4. Processing Integrity: System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.
  5. Privacy: Personal information is collected, used, retained, disclosed, and disposed to meet the entity’s objectives. 

Speak to a Compliance Specialist.

Book a free consultation with a specialist to check off your compliance needs. Secure your spot today.

Turn to Auditwerx for SOC 2®* Compliance

Our simple SOC 2® process makes it easy for any size organization to receive the accreditation they need to build trust with their clients. Our experienced team will help you align your compliance efforts across frameworks, working around your business needs for an easy and efficient assessment experience. If you’re ready to get started, contact us today.

FAQs

The five Trust Services Criteria (TSC) are:

  • Security: Protecting systems and information from unauthorized access or damage.

  • Availability: Ensuring systems are operational and usable as required to meet objectives.

  • Processing Integrity: Confirming system processing is complete, valid, accurate, timely, and authorized.

  • Confidentiality: Protecting information designated as confidential to meet objectives.

  • Privacy: Managing the collection, use, retention, disclosure, and disposal of personal information.

The goal of the Processing Integrity criterion is to assure clients that the service organization’s system processing is reliable. This involves verifying that all system processing is conducted completely, is valid, is accurate, is timely, and has been properly authorized to meet all relevant objectives.

While both deal with protection, Confidentiality focuses on protecting any information that the entity designates as confidential (like trade secrets or proprietary data). Privacy specifically relates to the protection of personal information—how it is collected, used, retained, disclosed, and ultimately disposed of, to meet regulatory and entity objectives.

The Availability criterion assures that the service organization’s information and systems are consistently available for operation and use. This criterion addresses concerns related to system performance, monitoring, and recovery from disruptions, ensuring clients can rely on the service to meet their own business objectives.

About the Author

Picture of Auditwerx Team
Auditwerx Team
Tampa-based Auditwerx has provided over 3,500 security compliance reports to clients nationally and internationally since 2009, leveraging the specialized resources and experts of a top accounting firm for high-quality, personalized service. As a division of Carr, Riggs & Ingram Capital, LLC, Auditwerx offers clients the skills of a large firm—including CISSPs and CISAs—combined with the accessibility of a niche, boutique firm, dedicated to building long-term, transparent partnerships.

Related Content

Gain Deeper Insights