SOC 2 Glossary
Comprehensive definitions and explanations of SOC 2 terms, concepts, and compliance jargon. Your complete reference guide for understanding SOC 2 compliance.
SOC 2
Audit ProcessService Organization Control 2 - An auditing procedure that ensures service companies securely manage data to protect the interests of their organization and client data.
Trust Service Criteria (TSC)
Trust Service CriteriaA framework developed by the AICPA that defines criteria for evaluating controls at service organizations.
Type I Report
Audit ProcessAn audit report that evaluates the design of controls at a specific point in time.
Type II Report
Audit ProcessAn audit report that evaluates both the design and operating effectiveness of controls over a period of time.
Security
Trust Service CriteriaProtection against unauthorized access to systems, applications, and data.
Availability
Trust Service CriteriaThe accessibility of systems, applications, and data for operation and use as committed or agreed.
Processing Integrity
Trust Service CriteriaSystem processing that is complete, valid, accurate, timely, and authorized.
Confidentiality
Trust Service CriteriaInformation designated as confidential is protected as committed or agreed.
Privacy
Trust Service CriteriaPersonal information is collected, used, retained, disclosed, and disposed of in conformity with privacy commitments.
Common Criteria (CC)
Trust Service CriteriaControl criteria that relate to all five trust service categories and form the foundation of SOC 2 audits.
Service Organization
Audit ProcessAn entity that provides services to user entities where those services are part of the user entities' information systems.
User Entity
Audit ProcessAn entity that uses a service organization and whose financial statements are being audited.
Control Deficiency
Controls & ProceduresA deficiency in the design or operation of a control that does not allow management to prevent or detect misstatements.
Material Weakness
Controls & ProceduresA deficiency or combination of deficiencies in internal control that is of such magnitude that there is a reasonable possibility of material noncompliance.
Complementary Controls
Controls & ProceduresControls that user entities should implement to complement the service organization's controls.
Control Activities
Controls & ProceduresPolicies and procedures that help ensure management directives are carried out.
Risk Assessment
Compliance & RiskThe identification and analysis of relevant risks to achievement of objectives.
Penetration Testing
TechnicalAuthorized simulated attacks on computer systems to evaluate security.
Encryption
TechnicalThe process of converting information into a coded format to prevent unauthorized access.
Access Controls
Controls & ProceduresSecurity measures that regulate who can view or use resources in a computing environment.
Incident Response
Controls & ProceduresOrganized approach to addressing and managing security breaches or cyber attacks.
Change Management
Controls & ProceduresProcess of controlling modifications to systems, applications, and infrastructure.
Vendor Management
Compliance & RiskProcess of evaluating, selecting, and overseeing third-party service providers.
Business Continuity
Compliance & RiskPlanning and preparation to ensure critical business functions can continue during and after a disaster.
Monitoring
Controls & ProceduresOngoing evaluation of the performance and effectiveness of controls.
Data Classification
Compliance & RiskProcess of organizing data by relevant categories so it can be used and protected more efficiently.
Logical Access
TechnicalAccess to computer systems, applications, and data through software-based controls.
Physical Access
TechnicalAccess to physical locations where systems and data are housed.
System Description
Audit ProcessDocument prepared by management that describes the service organization's system.
Complementary User Entity Controls (CUECs)
Controls & ProceduresControls that user entities should implement to complement service organization controls.
Control Environment
Controls & ProceduresThe foundation for all other components of internal control, providing discipline and structure.
Subservice Organization
Audit ProcessA service organization used by another service organization to perform some services.
Carve-Out Method
Audit ProcessAudit approach where subservice organization controls are excluded from the service auditor's testing.
Inclusive Method
Audit ProcessAudit approach where subservice organization controls are included in the service auditor's testing.
Bridge Letter
Audit ProcessLetter that extends the period covered by a SOC 2 report without performing a full audit.
Exception
Audit ProcessInstance where a control did not operate as designed during the audit period.
Sampling
Audit ProcessProcess of selecting a subset of items from a population for testing.
Walkthrough
Audit ProcessProcedure where the auditor traces a transaction from origination through the system.
Scoping
Audit ProcessProcess of defining what systems, applications, and processes are included in the SOC 2 audit.
Readiness Assessment
Audit ProcessPreliminary evaluation to determine an organization's preparedness for a SOC 2 audit.
Quick Access
Most Referenced Terms
Ready to Implement?
Get professionally written policies and procedures to implement these concepts.
Browse by Category
How to Use This Glossary
Finding Terms
- • Use the search box to find specific terms or concepts
- • Filter by category to browse related terms
- • Click on related terms to explore connections
- • Use quick access links for common lookups
Understanding Definitions
- • Each term includes a concise definition and detailed explanation
- • Examples show real-world applications
- • Related terms help you understand connections
- • Template suggestions show practical implementation tools