SOC 2®

Personalized engagements for your digital future.

SOC 2®
SOC 2®

Get started today

SOC 2®

MORE THAN AUDITORS. IT EXPERTS AT THE FOREFRONT OF SOC 2® REPORTING FOR OVER 15 YEARS

Information security and data privacy is top of mind for most companies. Ensuring security throughout the data path has become a significant part of many organizations vendor management practices. The Association of International Certified Professional Accountants (AICPA) developed the SOC 2® framework to give management, clients and stakeholders comfort over the internal controls at service organizations.

SOC 2® FOR SERVICE ORGANIZATIONS
TRUST SERVICES CRITERIA

SOC 2® reports provide detailed information and assurance about the controls at a service organization relevant to security, availability, and integrity of the systems used to process data, as well as the confidentiality and privacy of the information processed. 

There are two types of SOC 2® reports:

Type 1

Type 1 reports on management’s description of a service organization’s system and the suitability of the design of controls related to the applicable trust services criteria description as of a specified date.  

Type 2

Type 2 reports on management’s description of a service organization’s system and the suitability of the design and operating effectiveness of the controls related to the applicable trust services criteria throughout a specified period. 

What type of SOC report do I need? Download our free tool.​

TRUST SERVICES CRITERIA

Security

Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity’s ability to meet its objectives.

Confidentiality

Information designated as confidential is protected to meet the entity’s objectives.  Confidentiality is distinguished from privacy in that privacy applies only to personal information, whereas confidentiality applies to various types of sensitive information. 

Availability

Information and systems are available for operation and use to meet the entity’s objectives.

Processing Integrity

System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.

Privacy

Personal information is collected, used, retained, disclosed, and disposed to meet the entity’s objectives. 

Why Is Auditwerx the Best
SOC 2® Partner for Your Organization?

Leading Industry Certifications.

Our SOC 2® team possess a vast array of technical credentials. We are professionals with industry-based compliance experience as well as information security auditing. 

Tailored Solutions.

We take the time to get to know our clients, understand their needs, and provide innovative solutions to help them accomplish their goals.  We do this by conducting a comprehensive analysis, moving past just compliance and enabling a competitive reporting advantage. 

Value Based Reporting.

Our goal is to provide a service that will improve our clients operations and result in a significant ROI.  Our clients typically see a return that is multiple times greater than the investment they make in our professional fees.  That is what contributes to having long-term relationships with our clients. 

going above
and beyond

We pride ourselves on going above and beyond to provide the added value and personalized attention to our services and deliver reports in an efficient, professional and quality product while providing the value added business process and operational recommendations to improve the control environment currently in place.

Get Started

Get Started