{
    "id": 393,
    "date": "2024-05-15T14:18:27",
    "date_gmt": "2024-05-15T12:18:27",
    "guid": {
        "rendered": "https:\/\/techwize.io\/?p=393"
    },
    "modified": "2024-06-21T10:04:22",
    "modified_gmt": "2024-06-21T08:04:22",
    "slug": "soc2-le-garant-de-la-securite-et-de-la-conformite",
    "status": "publish",
    "type": "post",
    "link": "https:\/\/techwize.io\/en\/soc2-le-garant-de-la-securite-et-de-la-conformite\/",
    "title": {
        "rendered": "SOC2: The Security and Compliance Officer for Cloud and Technology Players"
    },
    "content": {
        "rendered": "<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"the-era-of-digital-compliance\"><strong>The Era of Digital Compliance<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-788ad8a2f8e8356d26a1ba7d1ac8a465\" style=\"\">The SAS70 standard has been a benchmark for the assessment of internal controls in organisations since its introduction in 1992. However, as data security and compliance needs have evolved, it has been replaced by System and Organization Controls (SOC) standards. This major transition occurred in 2011, ushering in the contemporary era with new challenges. Today, we take a closer look at SOC2 and its implications.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"understanding-the-soc-standards\"><strong>Understanding the SOC Standards<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-b79f3bc4dc5491ce46d685575ba56bbb\" style=\"\">Firstly, the SOC standards, developed by the <strong><a href=\"http:\/\/www.aicpa-cima.com\" target=\"_blank\" rel=\"noreferrer noopener\">American Institute of Certified Public Accountants (AICPA)<\/a><\/strong>, are essential for assessing customer data management. They are divided into three reports: SOC1, SOC2 and SOC3, each targeting specific aspects of internal controls. SOC2, in particular, is relevant to technology companies, as it focuses on trust services criteria relating to security, availability, processing integrity, confidentiality and privacy.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"the-five-trust-services-principles-of-soc2\">The Five Trust Services Principles of SOC2<\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-4d4c06bf24aa46805d7d41478e8e4ddd\" style=\"\">SOC2 is based on five fundamental principles:<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-4ba6383185de679faa9a1755d98f057a\" style=\"\"><strong>1- Security :<\/strong> You must implement robust controls to protect your resources from unauthorised access, using tools such as encryption, WAF, and intrusion detection systems. These measures ensure that only authorised people can access sensitive data, thereby reducing the risk of security breaches.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-883f8909921d7033881c6a7d6d069e58\" style=\"\"><strong>2- Availability<\/strong> : You must ensure the continuous availability of systems and services in accordance with contractual commitments. This involves using disaster recovery plans, redundancies and regular maintenance procedures to minimise service interruptions and ensure that customers can always access their data and services.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-bffc97e3869c4f8cb269cb4168c88405\" style=\"\"><strong>3- Integrity of processing<\/strong> : You need to guarantee that data is processed in a complete, valid, accurate and authorised manner. This includes data validation checks and verification processes to ensure that all transactions and operations are carried out correctly, without errors or unauthorised alterations.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-d73322ac94e489792d710b686f4bb30d\" style=\"\"><strong>4- Confidentiality<\/strong> : You have an obligation to protect information designated as confidential, through strict data management policies, confidentiality agreements and access controls. Companies must ensure that sensitive data is only accessible to authorised people and systems, protecting customer information from unauthorised disclosure.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-309937701294b980f9c4a5083d8375ee\" style=\"\"><strong>5- Privacy<\/strong> : You must manage personal information in compliance with privacy laws and regulations, such as the RGPD. This includes obtaining consent from users for the collection and processing of their data, as well as putting in place mechanisms to allow individuals to control the use of their personal information.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"what-does-this-mean-in-france\"><strong>What does this mean in France?<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\" style=\"\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"971\" src=\"https:\/\/techwize.io\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-15-at-14.04.35-1024x971.png\" alt=\"Les normes SOC en France\" class=\"wp-image-395\" style=\"width:361px;height:auto\" srcset=\"https:\/\/techwize.io\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-15-at-14.04.35-1024x971.png 1024w, https:\/\/techwize.io\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-15-at-14.04.35-300x284.png 300w, https:\/\/techwize.io\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-15-at-14.04.35-768x728.png 768w, https:\/\/techwize.io\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-15-at-14.04.35.png 1190w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-732d367dd6d4145b4fa849dd3fae3ce4\" style=\"\">In France, the SOC2 certification process generally follows the same stages as in other countries.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-238da96d5506cb6f19cd1ee7cb7133e3\" style=\"\">SOC2 certification has become an increasingly common practice for companies. Auditors and approved firms are available to carry out these audits, in accordance with the standards established by the American Institute of Certified Public Accountants (AICPA). Although SOC2 certification is not required by law, many French companies choose to go through this process for a variety of reasons. Firstly, it meets the growing demands of customers and business partners, who often require tangible proof of compliance and data security. Secondly, SOC2 certification boosts stakeholder confidence by demonstrating that the company has effective security controls in place. All in all, passing SOC2 certification helps businesses to manage the risks associated with data breaches and to strengthen their security posture in an ever-changing digital landscape.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-primary-500-color has-text-color has-24-font-size\" id=\"the-soc2-audit-process-prior-to-the-certification-process\">The SOC2 Audit Process (prior to the certification process).<\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-b0d3e04868169623c4b3566eb5bdeafa\" style=\"\">The SOC2 audit is carried out by a CPA or an accountancy firm. There are two types of report:<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-232688f1626a506d2b11fe94ec066dca\" style=\"\">Type 1 SOC2 report: This is an assessment of the design of controls at a given point in time.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-10efb073a26757672b0c531832259f51\" style=\"\">Type 2 SOC2 report: This is an assessment of the operating effectiveness of controls over a period of time.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-primary-500-color has-text-color has-18-font-size\" id=\"type-1-soc2-report\">Type 1 SOC2 report:<\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-95a9385cc7141dc36033bc0329e5b60c\" style=\"\">This examines whether the controls described by the organisation are adequately designed to meet security and confidentiality objectives. This report includes a detailed description of the organisation&#8217;s system, including its processes, policies and controls. It assesses the design of these controls as at a specific date. The organisation must provide full documentation of its systems and controls, and demonstrate that they are well designed to meet the security and confidentiality objectives.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-18-font-size\" id=\"type-2-soc2-report\">Type 2 SOC2 report:<\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-8830ccd7450785b1e2f989e3d704a89a\" style=\"\">The SOC2 Type 2 report goes beyond the design assessment and also examines the operational effectiveness of the controls over a specified period of time, typically at least six months. This report includes a description of the organisation&#8217;s system, the assessment of the design of the controls, and an assessment of the operating effectiveness of the controls over the period covered. It shows whether the controls have been implemented and are operating effectively. In addition to fully documenting the systems and controls, the organisation must demonstrate that the controls are not only well designed, but that they have been operational and effective over the specified period. This involves continuous monitoring and evidence of the operation of controls.<\/p>\n\n\n<figure class=\"wp-block-image aligncenter is-resized\" style=\"\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/MuVtsKHzgIiTAmu3fUYgiCqnpEq26lVNIATX3oKt_F-zEP_jtMlzxhmQiuX_Uu9cpZQrufG8FQHbaDqjR1IFuCcQIL2rcAEXcBVA9ra-MCBE-B1A-gZyRwQrNI48y0cOjwJevy04u-spv9EUF3K3JRw\" alt=\"Certification SOC2\" style=\"width:458px;height:auto\"><\/figure>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"soc2-certification-process\"><strong>SOC2 certification process:<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-082b9e69bcdabd3e85f310d33e3db848\" style=\"\">There are usually 4 main stages to SOC2 certification.<\/p>\n\n\n<p class=\"wp-block-paragraph has-primary-700-color has-text-color has-link-color has-18-font-size wp-elements-d2f47c9b7f16c171db9437efc6a06e7e\" style=\"\">Preparation:<\/p>\n\n\n<ul class=\"wp-block-list wp-block-list\">\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-9b67c60b24f71301314fbbb97663b00e\">You need to prepare documentation detailing its systems, policies, and internal controls.<\/li>\n\n\n\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-49fd959a48d90d8fa8514f189e9b655e\">Make sure that these controls meet the criteria for trusted services (security, availability, integrity of processing, confidentiality and privacy).<\/li>\n\n\n\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-4aca04a057c1dde5b7b04473b1d8165e\">An internal assessment is often carried out to identify and correct any shortcomings before the official audit.<\/li>\n<\/ul>\n\n\n<p class=\"wp-block-paragraph has-primary-700-color has-text-color has-link-color has-18-font-size wp-elements-4a41d8233b03ea0e6515fd3e3c05ba76\" style=\"\">Selecting an auditor :<\/p>\n\n\n<ul class=\"wp-block-list wp-block-list\">\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-48edb71d64426aade5a4f776b2f26f6f\">A qualified CPA or accountancy body is selected to carry out the audit.<\/li>\n<\/ul>\n\n\n<p class=\"wp-block-paragraph has-primary-700-color has-text-color has-link-color has-18-font-size wp-elements-579556a247a041090fddbeda9b6a82e3\" style=\"\">Type 1 audit:<\/p>\n\n\n<ul class=\"wp-block-list wp-block-list\">\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-bcb59391cb1aab063b90aa805d93bd30\">The auditor assesses the design of controls at a specific date.<\/li>\n\n\n\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-1bbf5faa89c38eb829db63a295e1fed8\">The auditor verifies that the controls are adequately designed to meet security and confidentiality objectives.<\/li>\n<\/ul>\n\n\n<p class=\"wp-block-paragraph has-primary-700-color has-text-color has-link-color has-18-font-size wp-elements-5a029c1694b6453f9b8e537a30e9dde9\" style=\"\"><strong>Type 2 audit:<\/strong><\/p>\n\n\n<ul class=\"wp-block-list wp-block-list\">\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-073b6b7fee6fb2e74814650bb8961c20\">The auditor assesses the operating effectiveness of the controls over a defined period, usually at least six months.<\/li>\n\n\n\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-27b17be980a1e720c02bead7a853e0d0\">This process includes tests of controls to verify their continued operation and effectiveness.<\/li>\n\n\n\n<li class=\"has-neutral-950-color has-text-color has-link-color wp-elements-a4d07528106106dd116ec3b7bf9124cd\">The auditor may perform periodic reviews and sampling to ensure that the controls are operating as intended.<\/li>\n<\/ul>\n\n\n<p class=\"wp-block-paragraph has-primary-700-color has-text-color has-link-color has-18-font-size wp-elements-7b1d07456d719e40207413b83f547dd9\" style=\"\">Final report:<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-fa9321740a2120ad88aa03bd4dd1d071\" style=\"\">After completing the audit, the CPA writes a final report detailing the findings on the design and operating effectiveness of the controls. This report includes a description of the system, the tests carried out and the results of the assessment. The report is then presented to the organisation and can be shared with customers and other stakeholders to demonstrate the compliance and security of data management practices.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"the-importance-of-soc2-for-businesses-and-their-customers\">The importance of SOC2 for businesses and their customers<\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-ed60b3a37166514296c426a3f6c20d75\" style=\"\">SOC2 is vital for building customer confidence, meeting contractual requirements, demonstrating compliance and preventing data breaches. It is a guarantee of security and reliability for technology companies and their partners. However, given the highly detailed nature of the report, it is preferable not to disclose it to the general public.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"soc3-a-public-and-simplified-version\">SOC3: A Public and Simplified Version<\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-6fd8610a0543631395ffa2a908d0783c\" style=\"\">The SOC3 report is a more concise and accessible version of the SOC1 and SOC2 reports, specially designed for public distribution. Unlike SOC2, which provides in-depth technical detail and is primarily aimed at a restricted audience (often business partners or regulators), SOC3 provides a summary of controls and their effectiveness without going into technical detail. This allows companies to easily share their security and compliance commitments with a wider audience, including potential customers and non-technical partners.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-c18bdc624d377181bc1966ea52309209\" style=\"\">SOC3 is based on the same trust services criteria as SOC2 (security, availability, integrity of processing, confidentiality and privacy) and uses the same control assessments. However, the final SOC3 report omits sensitive and technical details, confining itself to a confirmation of the organisation&#8217;s general compliance with the trusted services principles. This approach makes it easier to communicate compliance without disclosing specific information that could compromise security.<\/p>\n\n\n<h2 class=\"wp-block-heading is-style-sub-heading has-24-font-size\" id=\"soc2-and-beyond-navigating-the-cybersecurity-landscape\"><strong>SOC2 and Beyond: Navigating the Cybersecurity Landscape<\/strong><\/h2>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-83870421c620562a20267c23c92ee141\" style=\"\">SOC2 compliance is a commitment to data security and customer trust. For technology companies and cloud service providers, it is synonymous with integrity and success. Continuous assessment and improvement of internal controls are essential to maintain this compliance. This certification is obviously necessary, but not necessarily sufficient in the face of increasingly sophisticated and intelligent attacks (see: AI). It is imperative to recognise that digital security is a constantly evolving challenge.<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-6bf1d19bd3e6b3024bfab251bb5f616b\" style=\"\">The more your business grows, the more vulnerable it becomes. This vulnerability is amplified by the increasing complexity of its infrastructures, whether on site or in the cloud. It is advisable to engage with cybersecurity experts to ensure highly effective protection. To protect yourself, you can use agile solutions on niche themes such as APIs, CI\/CD, Software Supply Chain, WAF, IAM,<a href=\"https:\/\/techwize.io\/en\/la-revolution-des-reseaux-de-diffusion-de-contenu-cdn\/\" target=\"_blank\" rel=\"noreferrer noopener\">CDN<\/a> and <a href=\"https:\/\/techwize.io\/en\/gestion-financiere-des-kubernetes-une-solution-innovante-pour-optimiser-vos-couts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kubernetes<\/a>.&nbsp;<\/p>\n\n\n<p class=\"wp-block-paragraph has-neutral-950-color has-text-color has-link-color wp-elements-48adbf82fc9f4f8fc6aaa6b90bbc2413\" style=\"\">Failure to strengthen your security can have severe consequences and damage your company&#8217;s reputation. By implementing fortified cyber security, you can not only comply with regulations, but also consolidate resilience in the face of constantly evolving threats. Only an ongoing commitment to improving security can guarantee adequate protection over time.<\/p>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p>The Era of Digital Compliance The SAS70 standard has been a benchmark for the assessment of internal controls in organisations since its introduction in 1992. However, as data security and compliance needs have evolved, it has been replaced by System and Organization Controls (SOC) standards. This major transition occurred in 2011, ushering in the contemporary &hellip;<\/p>",
        "protected": false
    },
    "author": 2,
    "featured_media": 394,
    "comment_status": "closed",
    "ping_status": "open",
    "sticky": false,
    "template": "",
    "format": "standard",
    "meta": {
        "footnotes": ""
    },
    "categories": [
        21,
        70,
        33
    ],
    "tags": [],
    "class_list": [
        "post-393",
        "post",
        "type-post",
        "status-publish",
        "format-standard",
        "has-post-thumbnail",
        "hentry",
        "category-audit",
        "category-gouvernance",
        "category-uncategorized-fr"
    ],
    "_links": {
        "self": [
            {
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/posts\/393",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/posts"
            }
        ],
        "about": [
            {
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/types\/post"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/users\/2"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/comments?post=393"
            }
        ],
        "version-history": [
            {
                "count": 10,
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/posts\/393\/revisions"
            }
        ],
        "predecessor-version": [
            {
                "id": 808,
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/posts\/393\/revisions\/808"
            }
        ],
        "wp:featuredmedia": [
            {
                "embeddable": true,
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/media\/394"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/media?parent=393"
            }
        ],
        "wp:term": [
            {
                "taxonomy": "category",
                "embeddable": true,
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/categories?post=393"
            },
            {
                "taxonomy": "post_tag",
                "embeddable": true,
                "href": "https:\/\/techwize.io\/en\/wp-json\/wp\/v2\/tags?post=393"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}