🎉 Welcome to our newly redesigned site!If you notice any issues, pleaselet us know.
SOC 2 Document Templates - Get compliant faster with proven templates and guidance
Reference Guide

SOC 2 Glossary

Comprehensive definitions and explanations of SOC 2 terms, concepts, and compliance jargon. Your complete reference guide for understanding SOC 2 compliance.

45 Terms
Searchable
All Levels
Showing 40 of 40 terms

SOC 2

Audit Process

Service Organization Control 2 - An auditing procedure that ensures service companies securely manage data to protect the interests of their organization and client data.

Trust Service CriteriaType I ReportType II Report+1 more

Trust Service Criteria (TSC)

Trust Service Criteria

A framework developed by the AICPA that defines criteria for evaluating controls at service organizations.

Common CriteriaSecurityAvailability+3 more

Type I Report

Audit Process

An audit report that evaluates the design of controls at a specific point in time.

Type II ReportPoint-in-TimeControl Design

Type II Report

Audit Process

An audit report that evaluates both the design and operating effectiveness of controls over a period of time.

Type I ReportOperating EffectivenessAudit Period

Security

Trust Service Criteria

Protection against unauthorized access to systems, applications, and data.

Access ControlsAuthenticationAuthorization+1 more

Availability

Trust Service Criteria

The accessibility of systems, applications, and data for operation and use as committed or agreed.

UptimeBusiness ContinuityDisaster Recovery+1 more

Processing Integrity

Trust Service Criteria

System processing that is complete, valid, accurate, timely, and authorized.

Data ValidationError HandlingData Quality+1 more

Confidentiality

Trust Service Criteria

Information designated as confidential is protected as committed or agreed.

Data ClassificationInformation HandlingEncryption+1 more

Privacy

Trust Service Criteria

Personal information is collected, used, retained, disclosed, and disposed of in conformity with privacy commitments.

Personal InformationPrivacy PolicyData Retention+1 more

Common Criteria (CC)

Trust Service Criteria

Control criteria that relate to all five trust service categories and form the foundation of SOC 2 audits.

Control EnvironmentRisk AssessmentControl Activities

Service Organization

Audit Process

An entity that provides services to user entities where those services are part of the user entities' information systems.

User EntitySubservice OrganizationService Auditor

User Entity

Audit Process

An entity that uses a service organization and whose financial statements are being audited.

Service OrganizationUser AuditorComplementary Controls

Control Deficiency

Controls & Procedures

A deficiency in the design or operation of a control that does not allow management to prevent or detect misstatements.

Significant DeficiencyMaterial WeaknessException

Material Weakness

Controls & Procedures

A deficiency or combination of deficiencies in internal control that is of such magnitude that there is a reasonable possibility of material noncompliance.

Control DeficiencySignificant DeficiencyRemediation

Complementary Controls

Controls & Procedures

Controls that user entities should implement to complement the service organization's controls.

User EntityService OrganizationControl Objectives

Control Activities

Controls & Procedures

Policies and procedures that help ensure management directives are carried out.

PoliciesProceduresAutomated Controls+1 more

Risk Assessment

Compliance & Risk

The identification and analysis of relevant risks to achievement of objectives.

Risk ManagementThreat AssessmentVulnerability Management

Penetration Testing

Technical

Authorized simulated attacks on computer systems to evaluate security.

Vulnerability AssessmentSecurity TestingEthical Hacking

Encryption

Technical

The process of converting information into a coded format to prevent unauthorized access.

CryptographyData ProtectionKey Management

Access Controls

Controls & Procedures

Security measures that regulate who can view or use resources in a computing environment.

AuthenticationAuthorizationMulti-Factor Authentication+1 more

Incident Response

Controls & Procedures

Organized approach to addressing and managing security breaches or cyber attacks.

Security IncidentIncident ManagementBusiness Continuity

Change Management

Controls & Procedures

Process of controlling modifications to systems, applications, and infrastructure.

Change ControlConfiguration ManagementVersion Control

Vendor Management

Compliance & Risk

Process of evaluating, selecting, and overseeing third-party service providers.

Third-Party RiskDue DiligenceVendor Assessment

Business Continuity

Compliance & Risk

Planning and preparation to ensure critical business functions can continue during and after a disaster.

Disaster RecoveryBusiness Impact AnalysisRecovery Time Objective

Monitoring

Controls & Procedures

Ongoing evaluation of the performance and effectiveness of controls.

Continuous MonitoringLog AnalysisPerformance Metrics

Data Classification

Compliance & Risk

Process of organizing data by relevant categories so it can be used and protected more efficiently.

Information HandlingData ProtectionSensitivity Levels

Logical Access

Technical

Access to computer systems, applications, and data through software-based controls.

Physical AccessUser AuthenticationAccess Rights

Physical Access

Technical

Access to physical locations where systems and data are housed.

Logical AccessFacility SecurityEnvironmental Controls

System Description

Audit Process

Document prepared by management that describes the service organization's system.

Management AssertionService DescriptionControl Environment

Complementary User Entity Controls (CUECs)

Controls & Procedures

Controls that user entities should implement to complement service organization controls.

User EntityComplementary ControlsShared Responsibility

Control Environment

Controls & Procedures

The foundation for all other components of internal control, providing discipline and structure.

Tone at the TopGovernanceOrganizational Structure

Subservice Organization

Audit Process

A service organization used by another service organization to perform some services.

Service OrganizationCarve-Out MethodInclusive Method

Carve-Out Method

Audit Process

Audit approach where subservice organization controls are excluded from the service auditor's testing.

Inclusive MethodSubservice OrganizationHybrid Method

Inclusive Method

Audit Process

Audit approach where subservice organization controls are included in the service auditor's testing.

Carve-Out MethodSubservice OrganizationHybrid Method

Bridge Letter

Audit Process

Letter that extends the period covered by a SOC 2 report without performing a full audit.

Gap PeriodLimited ProceduresReport Extension

Exception

Audit Process

Instance where a control did not operate as designed during the audit period.

Control DeficiencyTestingControl Failure

Sampling

Audit Process

Process of selecting a subset of items from a population for testing.

Sample SizePopulationTesting Procedures

Walkthrough

Audit Process

Procedure where the auditor traces a transaction from origination through the system.

Process DocumentationControl TestingTransaction Flow

Scoping

Audit Process

Process of defining what systems, applications, and processes are included in the SOC 2 audit.

Audit BoundarySystem ComponentsService Description

Readiness Assessment

Audit Process

Preliminary evaluation to determine an organization's preparedness for a SOC 2 audit.

Gap AnalysisPre-Audit AssessmentCompliance Review

Quick Access

Most Referenced Terms

Ready to Implement?

Get professionally written policies and procedures to implement these concepts.

Browse by Category

How to Use This Glossary

Finding Terms

  • • Use the search box to find specific terms or concepts
  • • Filter by category to browse related terms
  • • Click on related terms to explore connections
  • • Use quick access links for common lookups

Understanding Definitions

  • • Each term includes a concise definition and detailed explanation
  • • Examples show real-world applications
  • • Related terms help you understand connections
  • • Template suggestions show practical implementation tools

Legal Disclaimer: These templates are starting points that require customization. Learn more about our legal disclaimer →