SOC 2 Report Example
SOC 2 Report Example
2 Report
Altius Customer Services
Pvt. Ltd.
Report on Altius Customer Services Pvt Ltd. Description
of the [System Name] and on the Suitability of the
Design and Operating Effectiveness of Its Controls
Relevant to [TRUST SERVICES CRITERIA] Throughout
the Period [Start Date] to [End Date]
Table of Contents
Section I: Independent Service Auditor’s Report 03
2
Section I: Independent Service Auditor’s
Report
To the Management of Altius Customer Services Pvt. Ltd,
Scope
We have examined Altius’s accompanying description of its [System Name] titled
“[Company Name] Description of Its [System Name]” throughout the period
[Start Date] to [End Date], based on the criteria for a description of a service
organization’s system in DC Section 200, 2018 Description Criteria for a Description
of a Service Organization’s System in a SOC 2® Report (AICPA, Description Criteria)
(description criteria) and the suitability of the design and operating effectiveness of
controls stated in the description throughout the period [Start Date] to [End Date],
to provide reasonable assurance that [Company Name]’s service commitments
and system requirements were achieved based on the trust services criteria
relevant to [applicable trust services criteria] set forth in TSP section 100, 2017 Trust
Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and
Privacy (AICPA, Trust Services Criteria).
3
also responsible for:
4
● Selecting the applicable trust services criteria and stating the related
controls in the description; and
● Identifying the risks that threaten the achievement of the service
organization’s service commitments and system requirements.
5
considered necessary in the circumstances.
6
We are required to be independent and to meet our other ethical responsibilities in
accordance with relevant ethical requirements relating to the engagement.
Inherent Limitations
The description is prepared to meet the common needs of a broad range of
report users and may not, therefore, include every aspect of the system that
individual users may consider important to meet their informational needs. There
are inherent limitations in any system of internal control, including the possibility
of human error and the circumvention of controls. Because of their nature,
controls may not always operate effectively to provide reasonable assurance that
the service organization’s service commitments and system requirements are
achieved based on the applicable trust services criteria. Also, the projection to the
future of any conclusions about the suitability of the design and operating
effectiveness of controls is subject to the risk that controls may become inadequate
because of changes in conditions or that the degree of compliance with policies or
procedures may deteriorate.
Opinion
In our opinion, in all material respects—
a. The description presents [Company Name]’s [System Name] that was
designed and implemented throughout the period [Start Date] to [End
Date], in accordance with the description criteria.
b. The controls stated in the description were suitably designed throughout
the period [Start Date] to [End Date] to provide reasonable assurance
that [Company Name]'s service commitments and system
requirements would be achieved based on the applicable trust services
criteria, if its controls operated effectively throughout that period and if
the [Subservice Organization] and user entities applied the
complementary controls assumed in the design of [Company Name]
controls throughout that period.
c. The controls stated in the description operated effectively throughout the
period [Start Date] to [End Date] to provide reasonable assurance that
[Company Name]'s service commitments and system requirements were
achieved based on the applicable trust services criteria, if
7
complementary subservice organization controls and complementary
user entity controls assumed in the design of [Company Name] controls
operated effectively throughout that period.
8
Restricted Use
This report, including the description of tests of controls and results thereof in
Section IV, is intended solely for the information and use of [Company Name],
user entities of [Company Name]’s [System Name] during some or all of the
period [Start Date] to [End Date], business partners of [Company Name] subject to
risks arising from interactions with the [System Name], practitioners providing
services to such user entities and business partners, prospective user entities
and business partners, and regulators who have sufficient knowledge and
understanding of the following:
This report is not intended to be, and should not be, used by anyone other than these
specified parties.
G
Section II: [Company Name]’s Management
Assertion
[Company Name’s Letterhead]
Date: [Report Date]
7
met based on the applicable trust services criteria, if the complementary
subservice organization controls assumed in the design of [Company
Name]’s controls operated effectively during the same period.
8
Section III: [Company Name]’s Description
of the System
This description details the [System Name] and the related policies, procedures, and
control activities for the [System Name]. This description does not include any
other services or policies, procedures, and control activities at any subservice
organizations.
[Company Name] has established system requirements, which are communicated via
service agreements and consist of the following:
9
The components that directly support the services provided to user entities are as
follows:
Infrastructure
The [System Name] is comprised of the following components:
1
0
Component Description Location
Software
The software component consists of the applications, programs, and other
software that support the system. The list of software and ancillary software used to
build, support, secure, maintain, and monitor the system are as follows:
Data
Data consists of transaction streams, files, databases, tables, and output utilized or
processed by the system.
All data that is managed, processed and stored as a part of the [System Name] is
classified as per the Data Classification Policy which establishes a framework for
categorizing data based on its sensitivity, value, and criticality to achieving the
objectives of the organization.
Further, all customer data is treated as confidential. The availability of this data is
also limited by job function. All customer data storage and transmission follow
industry-standard encryption. The data is also regularly backed up as
documented in the Data Backup Policy.
People
The following functional key areas/groups are responsible for planning, directing, and
controlling operations:
1
1
[Organizational chart, table, or list outlining key areas of authority and responsibility]
1
2
Policies
[Company Name] has implemented the following policies, which serve as the
basis for Company procedures. These are made accessible to all relevant
employees and contractors, and are reviewed annually:
Control Environment
1
0
job descriptions and further defined in the Information Security Policy, promoting
clarity and consistency in personnel responsibilities.
1
0
New Personnel and Ongoing Training
To foster a culture of security awareness, [Company Name] requires new hires
to complete background checks, sign confidentiality agreements, and acknowledge
their obligations under the Code of Conduct. Personnel also undergo training
upon hiring and receive annual refreshers on topics critical to maintaining
information security. This training includes the appropriate use of system
resources, handling of confidential data, and responding to security incidents.
Additionally, training records are maintained to track compliance and reinforce
[Company Name]'s commitment to a secure and compliant environment.
[Company Name] provides detailed information on its systems and services via
internal documentation and its public website, ensuring transparency for
internal and external stakeholders. Communication channels include [Tool
Name], which allows personnel and users to report concerns related to [applicable
trust services criteria]. Any reported issues are addressed per the Security Incident
Response Plan. Policies like the Change Management Policy and Security
Incident Response Plan outline communication protocols for significant events,
such as system updates, incidents, or unauthorized disclosures.
Risk Management
The risk management framework at [Company Name] identifies, assesses, and
addresses risks relevant to the organization’s operational and security objectives.
The Chief Risk Officer (CRO) oversees risk management activities and ensures
11
alignment with the organization’s risk appetite and strategic goals. Regular risk
assessments are conducted across all departments to evaluate the evolving risk
landscape and identify areas for improvement. Risks identified in assessments
are addressed through policies, controls, or process modifications to prevent
potential incidents, data loss, or system unavailability.
12
Risk monitoring is supported by documented policies that provide guidance for high-
priority areas, including data protection, user access, and incident response.
These policies are reviewed periodically to ensure they remain relevant and
effective in mitigating risks.
Monitoring Activities
Monitoring controls are embedded within [Company Name]'s processes to
verify that all operational and security controls are functioning as designed.
The responsibility for monitoring lies with both line management and the Internal
Control group, which reports to the CRO. Monitoring activities include:
● Periodic review of key control metrics that are tracked and reported
automatically where feasible.
● Regular staff and departmental meetings to review operational and control
metrics and identify areas for corrective action.
● Quarterly control self-assessments by functional departments to evaluate
control effectiveness and address any deficiencies.
The Internal Control group consolidates monitoring outcomes, and the CRO
presents them quarterly to the Management Committee. Independent evaluations
by the internal audit team supplement these activities, assessing the adequacy of
controls, testing their effectiveness, and providing recommendations for
improvements.
Control Activities
Control activities within [Company Name] are implemented to ensure that
objectives regarding system security, data confidentiality, and operational
availability are achieved. These activities include policies, procedures, and
mechanisms to support access control, change management, vulnerability
management, and incident response.
Access Control
Access control measures at [Company Name] safeguard information systems
from unauthorized access. All system access is governed by an Access Control
Policy, which outlines user authentication, authorization, and privilege management
procedures. Role-based access is enforced, limiting system access based on job
responsibilities. New hires and internal transfers are required to have their
access rights reviewed to confirm alignment with their roles, and access is
removed promptly upon employee termination or role change.
13
permissions remain consistent with employee responsibilities, and any necessary
changes are addressed. User access is continuously monitored for unusual activity
through automated security information and event management (SIEM) alerts.
14
Change Management
The Change Management Policy at [Company Name] governs the process for
implementing changes to systems and applications. This policy ensures that
changes are documented, tested, reviewed, and approved before being deployed.
Any change that could impact system security or operations must go through a
formal review process, including risk assessment, to prevent disruptions or
unintended consequences.
Vulnerability Management
[Company Name] implements a proactive vulnerability management program that
includes regular scanning, patch management, and periodic penetration testing.
The vulnerability management process follows these steps:
Quarterly reports are generated to track the status of vulnerability remediation, and
findings are presented to the CRO and senior management for review.
Incident Response
[Company Name] maintains a robust Incident Response Plan (IRP) to ensure
that any security incidents are promptly identified, contained, and resolved. The IRP
outlines procedures for the detection, documentation, escalation, and resolution of
incidents. Incident response activities include:
Identification
The identification phase involves promptly detecting potential security incidents to
mitigate impact and begin the response process.[Company Name] uses
15
automated monitoring systems, such as a Security Information and Event
Management (SIEM) solution, which generates alerts for any suspicious activity,
anomalies, or potential threats within the
16
environment. Additionally, employees and third parties can report incidents through
established communication channels.
During this phase, security analysts at[Company Name] assess the alerts and
reports to determine if an incident has occurred. Once confirmed, the incident is
categorized by severity, type, and potential impact to prioritize response efforts.
Incident identification logs are documented and reviewed by the incident
response team, who initiate further actions according to the IRP.
Containment
Containment aims to limit the impact of the incident and prevent its spread while
maintaining system stability.[Company Name] employs two levels of
containment:
Containment efforts are continuously monitored, with logs documenting all actions
taken, and the incident is escalated if necessary.[Company Name] management
is updated regularly on containment status.
Eradication
In the eradication phase, the root cause of the incident is identified and addressed to
prevent recurrence. Security analysts at[Company Name] analyze compromised
systems, investigate vulnerabilities exploited by attackers, and remove any
malicious code or artifacts from the environment. Common eradication
measures include:
17
Recovery
In the recovery phase, [Company Name] implements measures to restore systems
and data to normal operations following the containment and eradication of the
incident. This phase is
18
designed to ensure that all affected assets are returned to a secure state, and
business processes can resume without additional risk of compromise.
1. System Restoration: After verifying that the threat has been fully
eradicated, impacted systems are restored from clean, trusted backups.
Recovery processes are executed in alignment with the organization’s
Business Continuity and Disaster Recovery (BCDR) plans to ensure
minimal downtime and data integrity.
2. System Validation: After restoration, [Company Name] conducts
comprehensive testing and validation of restored systems to confirm
that all security controls are functioning as expected. This includes
verifying patches, configurations, and updates applied during the
eradication phase.
3. User Access Restoration: Access to systems, applications, or data that
was restricted during containment is re-enabled for authorized users
following successful validation of the system’s security posture.
4. Post-Incident Monitoring: Enhanced monitoring of the affected systems
and networks is conducted for a defined period to detect any signs of
recurring issues or vulnerabilities related to the initial incident.
Monitoring helps verify that systems remain secure post-recovery.
5. Documentation and Review: Recovery activities, findings, and
lessons learned are documented to improve future incident response
efforts. The incident response team conducts a post-recovery analysis to
assess what worked effectively and what needs improvement, feeding
these insights into future response and recovery planning.
By following these recovery steps, [Company Name] ensures resilient operations and
builds stronger defenses to mitigate the impact of potential future incidents.
Testing
The IRP is tested semi-annually to ensure its effectiveness, with adjustments made
based on test results to continuously improve incident response capabilities.
19
User Entity Control Relevant Criteria
[Subservice Organization]
The services provided by XYZ Cloud Hosting, a subservice organization, are outside
the scope of this report. However, [Company Name] management assumes
that complementary subservice organization controls (CSOCs) are implemented
effectively. These are detailed in the table below.
System Incidents
During the reporting period from [Start Date] to [End Date], no significant
system incidents were identified that affected the effectiveness of the controls in
place or resulted in the failure to achieve service commitments.
1
G
from [Start Date] to [End Date].
1
G
Section IV: Trust Services Criteria, Related
Controls, and Tests of Controls
In addition to the above procedures, for tests of controls and system controls
based on Trust Services Criteria requiring management’s use of IPE in the
execution of the controls (e.g., periodic reviews of user access listings), [Auditor
Name] inspected management’s procedures to assess the validity of the IPE
source and the completeness, accuracy, and integrity of the source data or
inputs.
Testing Methods
The following methods were employed in testing the operating effectiveness of the
controls:
17
● Inquiry: The service auditor conducted interviews with management,
operations, administrative and other relevant personnel who are
responsible for developing, ensuring adherence to and applying
controls
● Observation: The service auditor observed the application of control
activities by the service organization’s personnel to validate
implementation.
● Inspection: The service auditor inspected source documents, reports,
system configurations, and other items as necessary to confirm the
performance of specified control activities.
● Re-performance: The service auditor independently executed procedures
or controls originally performed by the service organization to validate their
effectiveness.
18
19
Tests of Controls and Results
The following table outlines the tests of controls and the results thereof in relation to
the control activities specified above.
11
0