SlideShare a Scribd company logo
1 of 16
Download to read offline
Achieving SOC Certification
Integration Runbook V 2.2
Planning, Design, Execution & Testing of Critical Controls
Prepared By:
Mark S Mahre
Managing Partner US
Mobile 678-641-0390
mark.mahre@clearcost.us
March 2018
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #2
TABLE OF CONTENTS
SOC PROJECT ENGAGEMENT..................................................................................................................................................................................................................................4
Engagement Process ..........................................................................................................................................................................................................................................5
Critical Controls Process.....................................................................................................................................................................................................................................6
Areas of Required Critical Controls ....................................................................................................................................................................................................................7
Five Principles of Critical Controls......................................................................................................................................................................................................................8
Types of Reporting .............................................................................................................................................................................................................................................8
CLIENT Leadership Meetings..............................................................................................................................................................................................................................8
Project Approach and Execution........................................................................................................................................................................................................................9
ClearCost Responsibilities ................................................................................................................................................................................................................................10
CLIENT Responsibilities ....................................................................................................................................................................................................................................10
MAJOR COMPOMENTS OF PROJECT ENGAGMENT..............................................................................................................................................................................................11
Project Deliverables & Documentation............................................................................................................................................................................................................12
SOC Compliance & Readiness Templates.........................................................................................................................................................................................................13
SOC INTEGRATION FRAMEWORK.........................................................................................................................................................................................................................14
Task Owners:....................................................................................................................................................................................................................................................14
Recording Tasks and Key Objectives: ...................................................................................................................................................................................................................15
Mapping & Approach:..................................................................................................................................................................................................................................15
Readiness & Resources: ...............................................................................................................................................................................................................................15
Analysis, Architecture & Processes: .............................................................................................................................................................................................................15
Suitability, Remediate & Pre-Testing: ..........................................................................................................................................................................................................15
Execution, Sustainability & Reporting:.........................................................................................................................................................................................................15
Testing, Sampling, and Fairness: ..................................................................................................................................................................................................................15
IN CLOSING...........................................................................................................................................................................................................................................................16
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #3
Version Control
Created By: Mark S Mahre Title: Managing Partner US
Ver # Revised By Date Revised Notes
1.0 Mark S Mahre January 2017 Template Creation
1.1 Mark S Mahre March 2018 Added more SOC Project Engagement Details
2.0 Mark S Mahre March 2018 Made for generic ‘CLIENT’ for sending for Marketing
2.1 Mark S Mahre April 2018 Modified for Partners
2.2 Mark S Mahre April 2018 Modified for LinkedIn
QA Approval Date Approved By:
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #4
SOC PROJECT ENGAGEMENT
ClearCost US will provide professional services (or “Consulting Services”) for the purpose of a Service Organization Controls 2 (“SOC”) engagement covering the System
Description, Information Security and the Critical Controls Table and other components within SOC. This engagement will NOT cover any Out-of-Scope Areas of Control
shown in table below. ClearCost may also provide guidance on building a central repository for housing all the supporting SOC documentation.
Specific SOC components for SOC Compliance:
SOC Component Critical Control Area
System Description Company & Services In Scope
Information Security IT Operations & Controls In Scope
Readiness Planning & Strategy On-Going Meetings with Audit Firm and Setting Target Requirements In Scope
Critical Controls Section Security In Scope
Critical Controls Section Availability In Scope
Critical Controls Section Processing Integrity In Scope
Critical Controls Section Confidentiality In Scope
Critical Controls Section Privacy (includes PHI & HIPAA) In Scope
Governance, Policies & Procedures Repository, Processes, Training & Documentation In Scope
Infrastructure & Monitoring All Items Technical Services In Scope
Evidence & Audit Procedures, Timing, Expectations, Resources In Scope
Management Assertion Performed by Audit Firm Out of Scope
Fairness & Evidence Report Performed by Audit Firm Out of Scope
ClearCost consulting services will include guidance and readiness for the SOC audit, however ClearCost will not include any legal advice or direction for implementing
controls, procedures or policies within the CLIENT data center facility, meaning that CLIENT employees will be responsible for creating the proper governance, controls
and procedures for each component of Critical Control Targets within the Critical Controls Criteria. The Audit Firm will provide services marked in Light Blue, ClearCost
consultant(s) will Lead for the following components in Red, with the CLIENT Lead subjects noted in Dark Blue.
Assertion
System
Description
Critical Control
Targets & Execution
SOC
Reporting
Fairness &
Evidence
Strategy &
Planning
Policies &
Procedures
Information
Security
Readiness
Assessment
SOC
Training
Infrastructure
& Monitoring
Uploading
Evidence
Providing
Evidence
Fairness Meetings, Status Meetings, Critical Control Target Reviews,
and Compliance Documentation Reviews
Assertion
Approvals
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #5
Engagement Process
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #6
Critical Controls Process
This engagement will include guidance and framework for the System Description, Information Security and Critical Controls Table (Five Areas) that are suitable for Type 1
or Type 2 reporting. Services will also identify risk assessment gaps within the control domains and remediation recommendations before the pre-audit and audit
process. ClearCost services will include reviewing controls related to Change Management, Breach Compliance, Help Desk, Client SLA’s, Change Authorization Board
Governance, SOC Training, Quarterly SOC Leadership Meetings and HR Controls for meeting compliance.
The diagram covers the Lead Responsibilities for setting the Critical Controls Language and Targets.
Critical Controls:
Assessments, Language
& Targets
Define Governance,
Security, Policies &
Controls
Execute Governance,
Security, Policies &
Contols
Achieve Compliance &
Evidence Gathering
Evidence Review &
Evidence Uploads
ClearCost Lead Joint Efforts CLIENT Lead
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #7
Areas of Required Critical Controls
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #8
Five Principles of Critical Controls
SOC 2 reports focus on controls at a service organization relevant to the following principles:
• Security: The system is protected against unauthorized access (both physical and logical); end-point security, Network, DC’s and Cloud environments,
• Availability: The system is available for operation and use as committed or agreed SLA’s,
• Processing Integrity: System processing is complete, accurate, timely, and authorized,
• Confidentiality: Information designated as confidential is protected as committed or agreed, and
• Privacy: Personal information collected, used, retained, disclosed, and destroyed in conformity with the commitments by CLIENT criteria set forth with regards
to Health Insurance Portability & Accountability Act of 1996 (“HIPAA”) and Personal Health Information (“PHI”) privacy principles.
Types of Reporting
The types of reporting are:
• Type I or Report 1 - A report on management’s description of the service organization’s system and the suitability of the design of the critical controls - at one-
point-in-time,
• Type 2 or Report 2 - A report on management’s description of the service organization’s system and the suitability of the design and operating effectiveness of
the controls – during the duration of time,
• Fairness and Evidence Process – What controls and required, how controls are defined, who is responsible for controls, maintain service levels per client
contracts, adhere to standards, and produce evidence during the audit period.
CLIENT Leadership Meetings
Quarterly Meetings with the CLIENT Leadership Team for meeting compliance:
• Predict, Monitor, Identify, Mitigate and Address areas of Risk and implement a proper Risk Mitigation strategy
• Controls for understanding the Compliance and Risk associated with the data and metadata that:
✓ operates,
✓ collects,
✓ processes,
✓ transmits,
✓ stores,
✓ organizes,
✓ maintains and
✓ disposes of information for our client’s entities.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #9
Project Approach and Execution
Below is a systematic approach to our SOC Strategy, Analysis, Design, Governance, Readiness, Testing, Execution and Audit criteria and controls for the project.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #10
ClearCost Responsibilities
This assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment.
ClearCost will not perform any evidence gathering or write in documentation for the CLIENT environment outside of the noted areas of services shown in the deliverables
table on next page.
Consultant will be responsible for leading the following:
• Project Kick-Off Meeting,
• Project Status Meetings,
• SOC Overview Status Reporting,
• System Description Delivery,
• Information Security Delivery,
• Critical Controls Targets,
• Change Management, Infrastructure & Compliance Meetings,
• Pre-Audit Run Through,
• Evidence Uploading and,
• SOC Leadership Management DAR’s.
CLIENT Responsibilities
Because this assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment,
ClearCost will not perform any examinations of systems, data or application transactions within the CLIENT environment, and not responsible for any breaches outside of
the noted areas of services in project scope section.
In addition, the assessment services cannot be relied on for any instances of non-compliance with laws of regulations, fraud or material errors attributed to CLIENT
personnel. CLIENT will understand its responsibility to inform, train and clearly communicate the security, availability, confidentiality and privacy that fall under the SOC
regulations and responsibilities. Meaning that CLIENT understands its responsibilities to proper training and testing systems within the user community.
CLIENT will be responsible for the following:
• Maintaining the content for System Description and Information Security documentation,
• Managing content of Critical Controls Table throughout the consulting engagement period and then until the final term after the official audit,
• Providing all services to support and compliance of the Critical Controls Table functions,
• Having personnel available for designing, implementing, documenting the controls suitable for operation effectiveness to fulfill the trust services criteria,
• Providing supporting documentation for the following; governance, workflow, organization structure, information systems, and third-party contracts,
• Participating in interviews, walk though reviews and evidence support to understand the elements within the Critical Controls Table,
• Provide ClearCost consultants with proper and reasonable access to resources in a timely manner, and
• Provide personnel for recording meeting notes, minutes and documenting recommendations during the consulting engagement.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #11
MAJOR COMPOMENTS OF PROJECT ENGAGMENT
The following tasks are major components of deliverables for the consulting services engagement:
(Contact ClearCost for receiving IP information within the following sections)
Subject Task Est. Dates
(*) Estimates are based on very limited information on the CLIENT Organization’s Capability Maturity Level Integration (aka “CMM” or “CMMI”) and what is currently
available at the time of engagement. However, after the Project Kick-Off Meeting a ‘High-Leve’ Project Plan will be created to provide better accuracy and only ACTUAL
time worked on the specific tasks will invoiced for the project.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #12
Project Deliverables & Documentation
ClearCost Consultant(s) deliverables for the project include:
Documents Format
Project Planning (modification of this template) MS Word
Monthly Project Status Reports PDF
SOC Project Kickoff PDF
System Description Template MS Word
Information Security Template MS Word
Critical Controls Table MS Excel
Change Management Controls MS Word and/or Visio
SOC Training Template PPTX
SOC Integration Framework Poster 24”x 48” Poster
Compliance & Readiness Templates MS Word
Risk Assessment Quarterly Meeting Agenda Template PPTX
Risk Assessment Worksheet Excel
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #13
SOC Compliance & Readiness Templates
Project templates may Include the following:
✓ Employee Handbook
✓ Employee Training Manuals
✓ Employee Job Descriptions
✓ Consultant or 3-Party Contractor NDA’s & Contracts
✓ Client, Vendor and 3-Party MSA’s
✓ Cloud or DC Infrastructure Diagrams
✓ Monitoring & Escalation Policy
✓ Asset Manage (CMDB) Table
✓ Risk Assessment Quarterly Agenda
✓ Risk Assessment Worksheet
✓ Breach Notification
✓ HIPAA Privacy Policy
✓ Terms of Acceptable Use Policy
✓ Incident Response Process
✓ Change Management Process
✓ Help Desk Process
✓ HIPAA / PHI Security Practice and Certification Manuals
✓ SOC Training Certifications
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #14
SOC INTEGRATION FRAMEWORK
The following SOC Integration Framework will be used for the Project Execution.
Business Objectives Project Execution & Milestone Tracking
Analysis, Strategy,
Architecture, Apps
& Processes
Mapping,
Approach &
Budgeting
Mark SMahre
SOC-2 Integration Framework
PLANINITIATE
Suitability,
Remediate &
Pre-Testing
AUDIT
C-Level , Security Officer, Analysts, Subject Matter Experts, Project Managers & Consultants
Assessment,
Resources &
Templates
Sponsors
Strategy,
Requirements
& Roadmap
Business Case
Project Scope
Success Criteria
HIPPA Req.
Road Map
Approvals
Project Design
Project Tasks
Risk Assessment
As-Is Assessment
Financials
Scheduling
Project Timeline
Resource Requirements
Gap Analysis
To-Be Requirements
Create Templates
Identify Partnerships
SOC Governance
HIPPA Mandates
Status Reporting
Change Controls
Authentication
Encryption Controls
Project Kick-Off
Auditor Assessment
Employee Awareness
Critical Controls
System Description
Information Security
Operational Effectiveness
Controls Testing
Readiness Reviews
Quarterly Meetings
Monitor Results
Lessons Learned
Upload Evidence
Audit Procedures
Sampling Process
SOC Compliance Report
Auditor s Letter
SOC Gap Letter
DESIGN CONTROLS OPERATIONAL
Execution,
Sustainability &
Reporting
Risk Mitigations
Suitability of Design
Data RPO/RTO
DR/BCP Strategy
Incident Response
Cloud Services
Mahre & Schweizer 2017
Auditor
Analysis
Testing,
Sampling &
Fairness
Task Owners:
Assigning the Task Owners (Stakeholders / SPOC) for each task in the tables below.
CXO & Leadership CISO CIO COO Legal CFO PMO
SOC Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #15
RECORDING TASKS AND KEY OBJECTIVES:
(Contact ClearCost for receiving IP information within the following sections)
Mapping & Approach:
Readiness & Resources:
Analysis, Architecture & Processes:
Suitability, Remediate & Pre-Testing:
Execution, Sustainability & Reporting:
Testing, Sampling, and Fairness:
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #16
IN CLOSING
Comments and Next Steps
Analyze, Predict, Plan, Test, Implement and Improve
End of Document

More Related Content

What's hot

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSchellman & Company
 
Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedVISTA InfoSec
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterTuan Phan
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopLife Cycle Engineering
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 

What's hot (20)

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
SOC 2: Build Trust and Confidence
SOC 2: Build Trust and ConfidenceSOC 2: Build Trust and Confidence
SOC 2: Build Trust and Confidence
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-converted
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 

Similar to SOC Certification Runbook Template

SOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete GuideSOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete GuideBrielle Aria
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 
Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5Jay T Sexton
 
Description of Methodology
Description of MethodologyDescription of Methodology
Description of MethodologyDavid Facter
 
Sample audit plan
Sample audit planSample audit plan
Sample audit planMaher Manan
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowShyamMishra72
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAHTommy Seah
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityShyamMishra72
 
Internal audit manual template
Internal audit manual templateInternal audit manual template
Internal audit manual templateCenapSerdarolu
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataKashish Trivedi
 
Safety management report of electrical engineering
Safety management report of electrical engineeringSafety management report of electrical engineering
Safety management report of electrical engineeringManeAbhijeet1
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixNix Inc.,
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxjeffsrosalyn
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information SecurityJohnHPazEMCPMPITIL5G
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Cap_Labor_Publication
Cap_Labor_PublicationCap_Labor_Publication
Cap_Labor_Publicationlijithomasswa
 

Similar to SOC Certification Runbook Template (20)

SOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete GuideSOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete Guide
 
Trackment
TrackmentTrackment
Trackment
 
Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5
 
Description of Methodology
Description of MethodologyDescription of Methodology
Description of Methodology
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to Know
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
 
Internal audit manual template
Internal audit manual templateInternal audit manual template
Internal audit manual template
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp Drata
 
Safety management report of electrical engineering
Safety management report of electrical engineeringSafety management report of electrical engineering
Safety management report of electrical engineering
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
 
SOC Certification.pdf
SOC Certification.pdfSOC Certification.pdf
SOC Certification.pdf
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Cap_Labor_Publication
Cap_Labor_PublicationCap_Labor_Publication
Cap_Labor_Publication
 

More from Mark S. Mahre

Technology Alignment Framework
Technology Alignment FrameworkTechnology Alignment Framework
Technology Alignment FrameworkMark S. Mahre
 
Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment FrameworkMark S. Mahre
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyMark S. Mahre
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesMark S. Mahre
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0Mark S. Mahre
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsMark S. Mahre
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case StudyMark S. Mahre
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KMark S. Mahre
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015Mark S. Mahre
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015Mark S. Mahre
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015Mark S. Mahre
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S. Mahre
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4Mark S. Mahre
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2Mark S. Mahre
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process HandbookMark S. Mahre
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2BMark S. Mahre
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33Mark S. Mahre
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03Mark S. Mahre
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Mark S. Mahre
 

More from Mark S. Mahre (20)

Technology Alignment Framework
Technology Alignment FrameworkTechnology Alignment Framework
Technology Alignment Framework
 
Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment Framework
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional Services
 
SOC-2 Compliance Status Report sample v10.0
SOC-2 Compliance Status Report   sample v10.0SOC-2 Compliance Status Report   sample v10.0
SOC-2 Compliance Status Report sample v10.0
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50K
 
ClearCost
ClearCostClearCost
ClearCost
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech final
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process Handbook
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2B
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010
 

Recently uploaded

Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girladitipandeya
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 

Recently uploaded (20)

Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Kondapur high-profile Call Girl
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 

SOC Certification Runbook Template

  • 1. Achieving SOC Certification Integration Runbook V 2.2 Planning, Design, Execution & Testing of Critical Controls Prepared By: Mark S Mahre Managing Partner US Mobile 678-641-0390 mark.mahre@clearcost.us March 2018
  • 2. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #2 TABLE OF CONTENTS SOC PROJECT ENGAGEMENT..................................................................................................................................................................................................................................4 Engagement Process ..........................................................................................................................................................................................................................................5 Critical Controls Process.....................................................................................................................................................................................................................................6 Areas of Required Critical Controls ....................................................................................................................................................................................................................7 Five Principles of Critical Controls......................................................................................................................................................................................................................8 Types of Reporting .............................................................................................................................................................................................................................................8 CLIENT Leadership Meetings..............................................................................................................................................................................................................................8 Project Approach and Execution........................................................................................................................................................................................................................9 ClearCost Responsibilities ................................................................................................................................................................................................................................10 CLIENT Responsibilities ....................................................................................................................................................................................................................................10 MAJOR COMPOMENTS OF PROJECT ENGAGMENT..............................................................................................................................................................................................11 Project Deliverables & Documentation............................................................................................................................................................................................................12 SOC Compliance & Readiness Templates.........................................................................................................................................................................................................13 SOC INTEGRATION FRAMEWORK.........................................................................................................................................................................................................................14 Task Owners:....................................................................................................................................................................................................................................................14 Recording Tasks and Key Objectives: ...................................................................................................................................................................................................................15 Mapping & Approach:..................................................................................................................................................................................................................................15 Readiness & Resources: ...............................................................................................................................................................................................................................15 Analysis, Architecture & Processes: .............................................................................................................................................................................................................15 Suitability, Remediate & Pre-Testing: ..........................................................................................................................................................................................................15 Execution, Sustainability & Reporting:.........................................................................................................................................................................................................15 Testing, Sampling, and Fairness: ..................................................................................................................................................................................................................15 IN CLOSING...........................................................................................................................................................................................................................................................16
  • 3. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #3 Version Control Created By: Mark S Mahre Title: Managing Partner US Ver # Revised By Date Revised Notes 1.0 Mark S Mahre January 2017 Template Creation 1.1 Mark S Mahre March 2018 Added more SOC Project Engagement Details 2.0 Mark S Mahre March 2018 Made for generic ‘CLIENT’ for sending for Marketing 2.1 Mark S Mahre April 2018 Modified for Partners 2.2 Mark S Mahre April 2018 Modified for LinkedIn QA Approval Date Approved By:
  • 4. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #4 SOC PROJECT ENGAGEMENT ClearCost US will provide professional services (or “Consulting Services”) for the purpose of a Service Organization Controls 2 (“SOC”) engagement covering the System Description, Information Security and the Critical Controls Table and other components within SOC. This engagement will NOT cover any Out-of-Scope Areas of Control shown in table below. ClearCost may also provide guidance on building a central repository for housing all the supporting SOC documentation. Specific SOC components for SOC Compliance: SOC Component Critical Control Area System Description Company & Services In Scope Information Security IT Operations & Controls In Scope Readiness Planning & Strategy On-Going Meetings with Audit Firm and Setting Target Requirements In Scope Critical Controls Section Security In Scope Critical Controls Section Availability In Scope Critical Controls Section Processing Integrity In Scope Critical Controls Section Confidentiality In Scope Critical Controls Section Privacy (includes PHI & HIPAA) In Scope Governance, Policies & Procedures Repository, Processes, Training & Documentation In Scope Infrastructure & Monitoring All Items Technical Services In Scope Evidence & Audit Procedures, Timing, Expectations, Resources In Scope Management Assertion Performed by Audit Firm Out of Scope Fairness & Evidence Report Performed by Audit Firm Out of Scope ClearCost consulting services will include guidance and readiness for the SOC audit, however ClearCost will not include any legal advice or direction for implementing controls, procedures or policies within the CLIENT data center facility, meaning that CLIENT employees will be responsible for creating the proper governance, controls and procedures for each component of Critical Control Targets within the Critical Controls Criteria. The Audit Firm will provide services marked in Light Blue, ClearCost consultant(s) will Lead for the following components in Red, with the CLIENT Lead subjects noted in Dark Blue. Assertion System Description Critical Control Targets & Execution SOC Reporting Fairness & Evidence Strategy & Planning Policies & Procedures Information Security Readiness Assessment SOC Training Infrastructure & Monitoring Uploading Evidence Providing Evidence Fairness Meetings, Status Meetings, Critical Control Target Reviews, and Compliance Documentation Reviews Assertion Approvals
  • 5. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #5 Engagement Process
  • 6. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #6 Critical Controls Process This engagement will include guidance and framework for the System Description, Information Security and Critical Controls Table (Five Areas) that are suitable for Type 1 or Type 2 reporting. Services will also identify risk assessment gaps within the control domains and remediation recommendations before the pre-audit and audit process. ClearCost services will include reviewing controls related to Change Management, Breach Compliance, Help Desk, Client SLA’s, Change Authorization Board Governance, SOC Training, Quarterly SOC Leadership Meetings and HR Controls for meeting compliance. The diagram covers the Lead Responsibilities for setting the Critical Controls Language and Targets. Critical Controls: Assessments, Language & Targets Define Governance, Security, Policies & Controls Execute Governance, Security, Policies & Contols Achieve Compliance & Evidence Gathering Evidence Review & Evidence Uploads ClearCost Lead Joint Efforts CLIENT Lead
  • 7. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #7 Areas of Required Critical Controls
  • 8. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #8 Five Principles of Critical Controls SOC 2 reports focus on controls at a service organization relevant to the following principles: • Security: The system is protected against unauthorized access (both physical and logical); end-point security, Network, DC’s and Cloud environments, • Availability: The system is available for operation and use as committed or agreed SLA’s, • Processing Integrity: System processing is complete, accurate, timely, and authorized, • Confidentiality: Information designated as confidential is protected as committed or agreed, and • Privacy: Personal information collected, used, retained, disclosed, and destroyed in conformity with the commitments by CLIENT criteria set forth with regards to Health Insurance Portability & Accountability Act of 1996 (“HIPAA”) and Personal Health Information (“PHI”) privacy principles. Types of Reporting The types of reporting are: • Type I or Report 1 - A report on management’s description of the service organization’s system and the suitability of the design of the critical controls - at one- point-in-time, • Type 2 or Report 2 - A report on management’s description of the service organization’s system and the suitability of the design and operating effectiveness of the controls – during the duration of time, • Fairness and Evidence Process – What controls and required, how controls are defined, who is responsible for controls, maintain service levels per client contracts, adhere to standards, and produce evidence during the audit period. CLIENT Leadership Meetings Quarterly Meetings with the CLIENT Leadership Team for meeting compliance: • Predict, Monitor, Identify, Mitigate and Address areas of Risk and implement a proper Risk Mitigation strategy • Controls for understanding the Compliance and Risk associated with the data and metadata that: ✓ operates, ✓ collects, ✓ processes, ✓ transmits, ✓ stores, ✓ organizes, ✓ maintains and ✓ disposes of information for our client’s entities.
  • 9. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #9 Project Approach and Execution Below is a systematic approach to our SOC Strategy, Analysis, Design, Governance, Readiness, Testing, Execution and Audit criteria and controls for the project.
  • 10. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #10 ClearCost Responsibilities This assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment. ClearCost will not perform any evidence gathering or write in documentation for the CLIENT environment outside of the noted areas of services shown in the deliverables table on next page. Consultant will be responsible for leading the following: • Project Kick-Off Meeting, • Project Status Meetings, • SOC Overview Status Reporting, • System Description Delivery, • Information Security Delivery, • Critical Controls Targets, • Change Management, Infrastructure & Compliance Meetings, • Pre-Audit Run Through, • Evidence Uploading and, • SOC Leadership Management DAR’s. CLIENT Responsibilities Because this assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment, ClearCost will not perform any examinations of systems, data or application transactions within the CLIENT environment, and not responsible for any breaches outside of the noted areas of services in project scope section. In addition, the assessment services cannot be relied on for any instances of non-compliance with laws of regulations, fraud or material errors attributed to CLIENT personnel. CLIENT will understand its responsibility to inform, train and clearly communicate the security, availability, confidentiality and privacy that fall under the SOC regulations and responsibilities. Meaning that CLIENT understands its responsibilities to proper training and testing systems within the user community. CLIENT will be responsible for the following: • Maintaining the content for System Description and Information Security documentation, • Managing content of Critical Controls Table throughout the consulting engagement period and then until the final term after the official audit, • Providing all services to support and compliance of the Critical Controls Table functions, • Having personnel available for designing, implementing, documenting the controls suitable for operation effectiveness to fulfill the trust services criteria, • Providing supporting documentation for the following; governance, workflow, organization structure, information systems, and third-party contracts, • Participating in interviews, walk though reviews and evidence support to understand the elements within the Critical Controls Table, • Provide ClearCost consultants with proper and reasonable access to resources in a timely manner, and • Provide personnel for recording meeting notes, minutes and documenting recommendations during the consulting engagement.
  • 11. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #11 MAJOR COMPOMENTS OF PROJECT ENGAGMENT The following tasks are major components of deliverables for the consulting services engagement: (Contact ClearCost for receiving IP information within the following sections) Subject Task Est. Dates (*) Estimates are based on very limited information on the CLIENT Organization’s Capability Maturity Level Integration (aka “CMM” or “CMMI”) and what is currently available at the time of engagement. However, after the Project Kick-Off Meeting a ‘High-Leve’ Project Plan will be created to provide better accuracy and only ACTUAL time worked on the specific tasks will invoiced for the project.
  • 12. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #12 Project Deliverables & Documentation ClearCost Consultant(s) deliverables for the project include: Documents Format Project Planning (modification of this template) MS Word Monthly Project Status Reports PDF SOC Project Kickoff PDF System Description Template MS Word Information Security Template MS Word Critical Controls Table MS Excel Change Management Controls MS Word and/or Visio SOC Training Template PPTX SOC Integration Framework Poster 24”x 48” Poster Compliance & Readiness Templates MS Word Risk Assessment Quarterly Meeting Agenda Template PPTX Risk Assessment Worksheet Excel
  • 13. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #13 SOC Compliance & Readiness Templates Project templates may Include the following: ✓ Employee Handbook ✓ Employee Training Manuals ✓ Employee Job Descriptions ✓ Consultant or 3-Party Contractor NDA’s & Contracts ✓ Client, Vendor and 3-Party MSA’s ✓ Cloud or DC Infrastructure Diagrams ✓ Monitoring & Escalation Policy ✓ Asset Manage (CMDB) Table ✓ Risk Assessment Quarterly Agenda ✓ Risk Assessment Worksheet ✓ Breach Notification ✓ HIPAA Privacy Policy ✓ Terms of Acceptable Use Policy ✓ Incident Response Process ✓ Change Management Process ✓ Help Desk Process ✓ HIPAA / PHI Security Practice and Certification Manuals ✓ SOC Training Certifications
  • 14. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #14 SOC INTEGRATION FRAMEWORK The following SOC Integration Framework will be used for the Project Execution. Business Objectives Project Execution & Milestone Tracking Analysis, Strategy, Architecture, Apps & Processes Mapping, Approach & Budgeting Mark SMahre SOC-2 Integration Framework PLANINITIATE Suitability, Remediate & Pre-Testing AUDIT C-Level , Security Officer, Analysts, Subject Matter Experts, Project Managers & Consultants Assessment, Resources & Templates Sponsors Strategy, Requirements & Roadmap Business Case Project Scope Success Criteria HIPPA Req. Road Map Approvals Project Design Project Tasks Risk Assessment As-Is Assessment Financials Scheduling Project Timeline Resource Requirements Gap Analysis To-Be Requirements Create Templates Identify Partnerships SOC Governance HIPPA Mandates Status Reporting Change Controls Authentication Encryption Controls Project Kick-Off Auditor Assessment Employee Awareness Critical Controls System Description Information Security Operational Effectiveness Controls Testing Readiness Reviews Quarterly Meetings Monitor Results Lessons Learned Upload Evidence Audit Procedures Sampling Process SOC Compliance Report Auditor s Letter SOC Gap Letter DESIGN CONTROLS OPERATIONAL Execution, Sustainability & Reporting Risk Mitigations Suitability of Design Data RPO/RTO DR/BCP Strategy Incident Response Cloud Services Mahre & Schweizer 2017 Auditor Analysis Testing, Sampling & Fairness Task Owners: Assigning the Task Owners (Stakeholders / SPOC) for each task in the tables below. CXO & Leadership CISO CIO COO Legal CFO PMO SOC Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants
  • 15. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #15 RECORDING TASKS AND KEY OBJECTIVES: (Contact ClearCost for receiving IP information within the following sections) Mapping & Approach: Readiness & Resources: Analysis, Architecture & Processes: Suitability, Remediate & Pre-Testing: Execution, Sustainability & Reporting: Testing, Sampling, and Fairness:
  • 16. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #16 IN CLOSING Comments and Next Steps Analyze, Predict, Plan, Test, Implement and Improve End of Document