SlideShare a Scribd company logo
1 of 16
Download to read offline
Achieving SOC Certification
Integration Runbook V 2.2
Planning, Design, Execution & Testing of Critical Controls
Prepared By:
Mark S Mahre
Managing Partner US
Mobile 678-641-0390
mark.mahre@clearcost.us
March 2018
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #2
TABLE OF CONTENTS
SOC PROJECT ENGAGEMENT..................................................................................................................................................................................................................................4
Engagement Process ..........................................................................................................................................................................................................................................5
Critical Controls Process.....................................................................................................................................................................................................................................6
Areas of Required Critical Controls ....................................................................................................................................................................................................................7
Five Principles of Critical Controls......................................................................................................................................................................................................................8
Types of Reporting .............................................................................................................................................................................................................................................8
CLIENT Leadership Meetings..............................................................................................................................................................................................................................8
Project Approach and Execution........................................................................................................................................................................................................................9
ClearCost Responsibilities ................................................................................................................................................................................................................................10
CLIENT Responsibilities ....................................................................................................................................................................................................................................10
MAJOR COMPOMENTS OF PROJECT ENGAGMENT..............................................................................................................................................................................................11
Project Deliverables & Documentation............................................................................................................................................................................................................12
SOC Compliance & Readiness Templates.........................................................................................................................................................................................................13
SOC INTEGRATION FRAMEWORK.........................................................................................................................................................................................................................14
Task Owners:....................................................................................................................................................................................................................................................14
Recording Tasks and Key Objectives: ...................................................................................................................................................................................................................15
Mapping & Approach:..................................................................................................................................................................................................................................15
Readiness & Resources: ...............................................................................................................................................................................................................................15
Analysis, Architecture & Processes: .............................................................................................................................................................................................................15
Suitability, Remediate & Pre-Testing: ..........................................................................................................................................................................................................15
Execution, Sustainability & Reporting:.........................................................................................................................................................................................................15
Testing, Sampling, and Fairness: ..................................................................................................................................................................................................................15
IN CLOSING...........................................................................................................................................................................................................................................................16
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #3
Version Control
Created By: Mark S Mahre Title: Managing Partner US
Ver # Revised By Date Revised Notes
1.0 Mark S Mahre January 2017 Template Creation
1.1 Mark S Mahre March 2018 Added more SOC Project Engagement Details
2.0 Mark S Mahre March 2018 Made for generic ‘CLIENT’ for sending for Marketing
2.1 Mark S Mahre April 2018 Modified for Partners
2.2 Mark S Mahre April 2018 Modified for LinkedIn
QA Approval Date Approved By:
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #4
SOC PROJECT ENGAGEMENT
ClearCost US will provide professional services (or “Consulting Services”) for the purpose of a Service Organization Controls 2 (“SOC”) engagement covering the System
Description, Information Security and the Critical Controls Table and other components within SOC. This engagement will NOT cover any Out-of-Scope Areas of Control
shown in table below. ClearCost may also provide guidance on building a central repository for housing all the supporting SOC documentation.
Specific SOC components for SOC Compliance:
SOC Component Critical Control Area
System Description Company & Services In Scope
Information Security IT Operations & Controls In Scope
Readiness Planning & Strategy On-Going Meetings with Audit Firm and Setting Target Requirements In Scope
Critical Controls Section Security In Scope
Critical Controls Section Availability In Scope
Critical Controls Section Processing Integrity In Scope
Critical Controls Section Confidentiality In Scope
Critical Controls Section Privacy (includes PHI & HIPAA) In Scope
Governance, Policies & Procedures Repository, Processes, Training & Documentation In Scope
Infrastructure & Monitoring All Items Technical Services In Scope
Evidence & Audit Procedures, Timing, Expectations, Resources In Scope
Management Assertion Performed by Audit Firm Out of Scope
Fairness & Evidence Report Performed by Audit Firm Out of Scope
ClearCost consulting services will include guidance and readiness for the SOC audit, however ClearCost will not include any legal advice or direction for implementing
controls, procedures or policies within the CLIENT data center facility, meaning that CLIENT employees will be responsible for creating the proper governance, controls
and procedures for each component of Critical Control Targets within the Critical Controls Criteria. The Audit Firm will provide services marked in Light Blue, ClearCost
consultant(s) will Lead for the following components in Red, with the CLIENT Lead subjects noted in Dark Blue.
Assertion
System
Description
Critical Control
Targets & Execution
SOC
Reporting
Fairness &
Evidence
Strategy &
Planning
Policies &
Procedures
Information
Security
Readiness
Assessment
SOC
Training
Infrastructure
& Monitoring
Uploading
Evidence
Providing
Evidence
Fairness Meetings, Status Meetings, Critical Control Target Reviews,
and Compliance Documentation Reviews
Assertion
Approvals
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #5
Engagement Process
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #6
Critical Controls Process
This engagement will include guidance and framework for the System Description, Information Security and Critical Controls Table (Five Areas) that are suitable for Type 1
or Type 2 reporting. Services will also identify risk assessment gaps within the control domains and remediation recommendations before the pre-audit and audit
process. ClearCost services will include reviewing controls related to Change Management, Breach Compliance, Help Desk, Client SLA’s, Change Authorization Board
Governance, SOC Training, Quarterly SOC Leadership Meetings and HR Controls for meeting compliance.
The diagram covers the Lead Responsibilities for setting the Critical Controls Language and Targets.
Critical Controls:
Assessments, Language
& Targets
Define Governance,
Security, Policies &
Controls
Execute Governance,
Security, Policies &
Contols
Achieve Compliance &
Evidence Gathering
Evidence Review &
Evidence Uploads
ClearCost Lead Joint Efforts CLIENT Lead
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #7
Areas of Required Critical Controls
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #8
Five Principles of Critical Controls
SOC 2 reports focus on controls at a service organization relevant to the following principles:
• Security: The system is protected against unauthorized access (both physical and logical); end-point security, Network, DC’s and Cloud environments,
• Availability: The system is available for operation and use as committed or agreed SLA’s,
• Processing Integrity: System processing is complete, accurate, timely, and authorized,
• Confidentiality: Information designated as confidential is protected as committed or agreed, and
• Privacy: Personal information collected, used, retained, disclosed, and destroyed in conformity with the commitments by CLIENT criteria set forth with regards
to Health Insurance Portability & Accountability Act of 1996 (“HIPAA”) and Personal Health Information (“PHI”) privacy principles.
Types of Reporting
The types of reporting are:
• Type I or Report 1 - A report on management’s description of the service organization’s system and the suitability of the design of the critical controls - at one-
point-in-time,
• Type 2 or Report 2 - A report on management’s description of the service organization’s system and the suitability of the design and operating effectiveness of
the controls – during the duration of time,
• Fairness and Evidence Process – What controls and required, how controls are defined, who is responsible for controls, maintain service levels per client
contracts, adhere to standards, and produce evidence during the audit period.
CLIENT Leadership Meetings
Quarterly Meetings with the CLIENT Leadership Team for meeting compliance:
• Predict, Monitor, Identify, Mitigate and Address areas of Risk and implement a proper Risk Mitigation strategy
• Controls for understanding the Compliance and Risk associated with the data and metadata that:
✓ operates,
✓ collects,
✓ processes,
✓ transmits,
✓ stores,
✓ organizes,
✓ maintains and
✓ disposes of information for our client’s entities.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #9
Project Approach and Execution
Below is a systematic approach to our SOC Strategy, Analysis, Design, Governance, Readiness, Testing, Execution and Audit criteria and controls for the project.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #10
ClearCost Responsibilities
This assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment.
ClearCost will not perform any evidence gathering or write in documentation for the CLIENT environment outside of the noted areas of services shown in the deliverables
table on next page.
Consultant will be responsible for leading the following:
• Project Kick-Off Meeting,
• Project Status Meetings,
• SOC Overview Status Reporting,
• System Description Delivery,
• Information Security Delivery,
• Critical Controls Targets,
• Change Management, Infrastructure & Compliance Meetings,
• Pre-Audit Run Through,
• Evidence Uploading and,
• SOC Leadership Management DAR’s.
CLIENT Responsibilities
Because this assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment,
ClearCost will not perform any examinations of systems, data or application transactions within the CLIENT environment, and not responsible for any breaches outside of
the noted areas of services in project scope section.
In addition, the assessment services cannot be relied on for any instances of non-compliance with laws of regulations, fraud or material errors attributed to CLIENT
personnel. CLIENT will understand its responsibility to inform, train and clearly communicate the security, availability, confidentiality and privacy that fall under the SOC
regulations and responsibilities. Meaning that CLIENT understands its responsibilities to proper training and testing systems within the user community.
CLIENT will be responsible for the following:
• Maintaining the content for System Description and Information Security documentation,
• Managing content of Critical Controls Table throughout the consulting engagement period and then until the final term after the official audit,
• Providing all services to support and compliance of the Critical Controls Table functions,
• Having personnel available for designing, implementing, documenting the controls suitable for operation effectiveness to fulfill the trust services criteria,
• Providing supporting documentation for the following; governance, workflow, organization structure, information systems, and third-party contracts,
• Participating in interviews, walk though reviews and evidence support to understand the elements within the Critical Controls Table,
• Provide ClearCost consultants with proper and reasonable access to resources in a timely manner, and
• Provide personnel for recording meeting notes, minutes and documenting recommendations during the consulting engagement.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #11
MAJOR COMPOMENTS OF PROJECT ENGAGMENT
The following tasks are major components of deliverables for the consulting services engagement:
(Contact ClearCost for receiving IP information within the following sections)
Subject Task Est. Dates
(*) Estimates are based on very limited information on the CLIENT Organization’s Capability Maturity Level Integration (aka “CMM” or “CMMI”) and what is currently
available at the time of engagement. However, after the Project Kick-Off Meeting a ‘High-Leve’ Project Plan will be created to provide better accuracy and only ACTUAL
time worked on the specific tasks will invoiced for the project.
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #12
Project Deliverables & Documentation
ClearCost Consultant(s) deliverables for the project include:
Documents Format
Project Planning (modification of this template) MS Word
Monthly Project Status Reports PDF
SOC Project Kickoff PDF
System Description Template MS Word
Information Security Template MS Word
Critical Controls Table MS Excel
Change Management Controls MS Word and/or Visio
SOC Training Template PPTX
SOC Integration Framework Poster 24”x 48” Poster
Compliance & Readiness Templates MS Word
Risk Assessment Quarterly Meeting Agenda Template PPTX
Risk Assessment Worksheet Excel
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #13
SOC Compliance & Readiness Templates
Project templates may Include the following:
✓ Employee Handbook
✓ Employee Training Manuals
✓ Employee Job Descriptions
✓ Consultant or 3-Party Contractor NDA’s & Contracts
✓ Client, Vendor and 3-Party MSA’s
✓ Cloud or DC Infrastructure Diagrams
✓ Monitoring & Escalation Policy
✓ Asset Manage (CMDB) Table
✓ Risk Assessment Quarterly Agenda
✓ Risk Assessment Worksheet
✓ Breach Notification
✓ HIPAA Privacy Policy
✓ Terms of Acceptable Use Policy
✓ Incident Response Process
✓ Change Management Process
✓ Help Desk Process
✓ HIPAA / PHI Security Practice and Certification Manuals
✓ SOC Training Certifications
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #14
SOC INTEGRATION FRAMEWORK
The following SOC Integration Framework will be used for the Project Execution.
Business Objectives Project Execution & Milestone Tracking
Analysis, Strategy,
Architecture, Apps
& Processes
Mapping,
Approach &
Budgeting
Mark SMahre
SOC-2 Integration Framework
PLANINITIATE
Suitability,
Remediate &
Pre-Testing
AUDIT
C-Level , Security Officer, Analysts, Subject Matter Experts, Project Managers & Consultants
Assessment,
Resources &
Templates
Sponsors
Strategy,
Requirements
& Roadmap
Business Case
Project Scope
Success Criteria
HIPPA Req.
Road Map
Approvals
Project Design
Project Tasks
Risk Assessment
As-Is Assessment
Financials
Scheduling
Project Timeline
Resource Requirements
Gap Analysis
To-Be Requirements
Create Templates
Identify Partnerships
SOC Governance
HIPPA Mandates
Status Reporting
Change Controls
Authentication
Encryption Controls
Project Kick-Off
Auditor Assessment
Employee Awareness
Critical Controls
System Description
Information Security
Operational Effectiveness
Controls Testing
Readiness Reviews
Quarterly Meetings
Monitor Results
Lessons Learned
Upload Evidence
Audit Procedures
Sampling Process
SOC Compliance Report
Auditor s Letter
SOC Gap Letter
DESIGN CONTROLS OPERATIONAL
Execution,
Sustainability &
Reporting
Risk Mitigations
Suitability of Design
Data RPO/RTO
DR/BCP Strategy
Incident Response
Cloud Services
Mahre & Schweizer 2017
Auditor
Analysis
Testing,
Sampling &
Fairness
Task Owners:
Assigning the Task Owners (Stakeholders / SPOC) for each task in the tables below.
CXO & Leadership CISO CIO COO Legal CFO PMO
SOC Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #15
RECORDING TASKS AND KEY OBJECTIVES:
(Contact ClearCost for receiving IP information within the following sections)
Mapping & Approach:
Readiness & Resources:
Analysis, Architecture & Processes:
Suitability, Remediate & Pre-Testing:
Execution, Sustainability & Reporting:
Testing, Sampling, and Fairness:
Methodology Created and Documented by Written Mark S Mahre
ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #16
IN CLOSING
Comments and Next Steps
Analyze, Predict, Plan, Test, Implement and Improve
End of Document

More Related Content

What's hot

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onJustin Henderson
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) Priyanka Aash
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationExigent Technologies LLC
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfHaris Chughtai
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptxInfosec
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Celonis_TISAX_Compliance_1_.pdf
Celonis_TISAX_Compliance_1_.pdfCelonis_TISAX_Compliance_1_.pdf
Celonis_TISAX_Compliance_1_.pdfChandra Rao
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CKArpan Raval
 
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationApache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationKai Wähner
 

What's hot (20)

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is on
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Celonis_TISAX_Compliance_1_.pdf
Celonis_TISAX_Compliance_1_.pdfCelonis_TISAX_Compliance_1_.pdf
Celonis_TISAX_Compliance_1_.pdf
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR ModernizationApache Kafka for Cybersecurity and SIEM / SOAR Modernization
Apache Kafka for Cybersecurity and SIEM / SOAR Modernization
 

Similar to SOC Certification Runbook Template

SOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete GuideSOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete GuideBrielle Aria
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 
Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5Jay T Sexton
 
Description of Methodology
Description of MethodologyDescription of Methodology
Description of MethodologyDavid Facter
 
Sample audit plan
Sample audit planSample audit plan
Sample audit planMaher Manan
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowShyamMishra72
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAHTommy Seah
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityShyamMishra72
 
Internal audit manual template
Internal audit manual templateInternal audit manual template
Internal audit manual templateCenapSerdarolu
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataKashish Trivedi
 
Safety management report of electrical engineering
Safety management report of electrical engineeringSafety management report of electrical engineering
Safety management report of electrical engineeringManeAbhijeet1
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixNix Inc.,
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxjeffsrosalyn
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information SecurityJohnHPazEMCPMPITIL5G
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 

Similar to SOC Certification Runbook Template (20)

SOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete GuideSOC 2 for Startups – A Complete Guide
SOC 2 for Startups – A Complete Guide
 
Trackment
TrackmentTrackment
Trackment
 
Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5Sexton_Jay_MPM357_IP5
Sexton_Jay_MPM357_IP5
 
Description of Methodology
Description of MethodologyDescription of Methodology
Description of Methodology
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to Know
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
 
Internal audit manual template
Internal audit manual templateInternal audit manual template
Internal audit manual template
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
SOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp DrataSOC 2 Compliance Made Easy with Process Street amp Drata
SOC 2 Compliance Made Easy with Process Street amp Drata
 
Safety management report of electrical engineering
Safety management report of electrical engineeringSafety management report of electrical engineering
Safety management report of electrical engineering
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
 
SOC Certification.pdf
SOC Certification.pdfSOC Certification.pdf
SOC Certification.pdf
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 

More from Mark S. Mahre

Technology Alignment Framework
Technology Alignment FrameworkTechnology Alignment Framework
Technology Alignment FrameworkMark S. Mahre
 
Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment FrameworkMark S. Mahre
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyMark S. Mahre
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesMark S. Mahre
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case StudyMark S. Mahre
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KMark S. Mahre
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015Mark S. Mahre
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015Mark S. Mahre
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015Mark S. Mahre
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S. Mahre
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4Mark S. Mahre
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2Mark S. Mahre
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process HandbookMark S. Mahre
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2BMark S. Mahre
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33Mark S. Mahre
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03Mark S. Mahre
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Mark S. Mahre
 

More from Mark S. Mahre (18)

Technology Alignment Framework
Technology Alignment FrameworkTechnology Alignment Framework
Technology Alignment Framework
 
Technology Assessment Framework
Technology Assessment FrameworkTechnology Assessment Framework
Technology Assessment Framework
 
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, TechnologyAprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
Aprio Consulting Services - Cloud, ITFM, Compliance, Innovation, Technology
 
Governance - Project Management Office Professional Services
Governance - Project Management Office Professional ServicesGovernance - Project Management Office Professional Services
Governance - Project Management Office Professional Services
 
US State Government Case Study
US State Government Case StudyUS State Government Case Study
US State Government Case Study
 
ClearCost License & Implementation under $50K
ClearCost License & Implementation under $50KClearCost License & Implementation under $50K
ClearCost License & Implementation under $50K
 
ClearCost
ClearCostClearCost
ClearCost
 
VP Reference Letter_Oct2015
VP Reference Letter_Oct2015VP Reference Letter_Oct2015
VP Reference Letter_Oct2015
 
CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015CFO Reference Letter_Sept2015
CFO Reference Letter_Sept2015
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
Mark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech finalMark S Mahre - Info-Tech final
Mark S Mahre - Info-Tech final
 
Spending Request Example V4
Spending Request Example V4Spending Request Example V4
Spending Request Example V4
 
IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2IT Dashboard User Manual V2.2
IT Dashboard User Manual V2.2
 
Capacity Management Process Handbook
Capacity Management Process HandbookCapacity Management Process Handbook
Capacity Management Process Handbook
 
PMO Framework Corus360 V2B
PMO Framework Corus360 V2BPMO Framework Corus360 V2B
PMO Framework Corus360 V2B
 
Data Migrations Framework V33
Data Migrations Framework V33Data Migrations Framework V33
Data Migrations Framework V33
 
FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03FundFlow V3.6 Overview (Printable) 08-18-03
FundFlow V3.6 Overview (Printable) 08-18-03
 
Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010Enterprise Project Process Diagram May 2010
Enterprise Project Process Diagram May 2010
 

Recently uploaded

Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingGiuseppe De Simone
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...CIToolkit
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsHannah Smith
 
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsMind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsCIToolkit
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project ManagementCIToolkit
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionCIToolkit
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramCIToolkit
 
Chapter 1 Performance Management HRM.ppt
Chapter 1 Performance Management HRM.pptChapter 1 Performance Management HRM.ppt
Chapter 1 Performance Management HRM.ppt2020102713
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentCIToolkit
 
THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...
THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...
THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...PROF. PAUL ALLIEU KAMARA
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Giuseppe De Simone
 
Choosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptxChoosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptxMadan Karki
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsCIToolkit
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 

Recently uploaded (18)

Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful Thinking
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
 
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsMind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project Management
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem Resolution
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
 
Chapter 1 Performance Management HRM.ppt
Chapter 1 Performance Management HRM.pptChapter 1 Performance Management HRM.ppt
Chapter 1 Performance Management HRM.ppt
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
 
THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...
THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...
THE LEADERSHIP TO CHANGE THE WOLRD THIS IS YOUR HOUR PURSUES YOUR GIFT, TALEN...
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
 
Choosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptxChoosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptx
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 

SOC Certification Runbook Template

  • 1. Achieving SOC Certification Integration Runbook V 2.2 Planning, Design, Execution & Testing of Critical Controls Prepared By: Mark S Mahre Managing Partner US Mobile 678-641-0390 mark.mahre@clearcost.us March 2018
  • 2. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #2 TABLE OF CONTENTS SOC PROJECT ENGAGEMENT..................................................................................................................................................................................................................................4 Engagement Process ..........................................................................................................................................................................................................................................5 Critical Controls Process.....................................................................................................................................................................................................................................6 Areas of Required Critical Controls ....................................................................................................................................................................................................................7 Five Principles of Critical Controls......................................................................................................................................................................................................................8 Types of Reporting .............................................................................................................................................................................................................................................8 CLIENT Leadership Meetings..............................................................................................................................................................................................................................8 Project Approach and Execution........................................................................................................................................................................................................................9 ClearCost Responsibilities ................................................................................................................................................................................................................................10 CLIENT Responsibilities ....................................................................................................................................................................................................................................10 MAJOR COMPOMENTS OF PROJECT ENGAGMENT..............................................................................................................................................................................................11 Project Deliverables & Documentation............................................................................................................................................................................................................12 SOC Compliance & Readiness Templates.........................................................................................................................................................................................................13 SOC INTEGRATION FRAMEWORK.........................................................................................................................................................................................................................14 Task Owners:....................................................................................................................................................................................................................................................14 Recording Tasks and Key Objectives: ...................................................................................................................................................................................................................15 Mapping & Approach:..................................................................................................................................................................................................................................15 Readiness & Resources: ...............................................................................................................................................................................................................................15 Analysis, Architecture & Processes: .............................................................................................................................................................................................................15 Suitability, Remediate & Pre-Testing: ..........................................................................................................................................................................................................15 Execution, Sustainability & Reporting:.........................................................................................................................................................................................................15 Testing, Sampling, and Fairness: ..................................................................................................................................................................................................................15 IN CLOSING...........................................................................................................................................................................................................................................................16
  • 3. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #3 Version Control Created By: Mark S Mahre Title: Managing Partner US Ver # Revised By Date Revised Notes 1.0 Mark S Mahre January 2017 Template Creation 1.1 Mark S Mahre March 2018 Added more SOC Project Engagement Details 2.0 Mark S Mahre March 2018 Made for generic ‘CLIENT’ for sending for Marketing 2.1 Mark S Mahre April 2018 Modified for Partners 2.2 Mark S Mahre April 2018 Modified for LinkedIn QA Approval Date Approved By:
  • 4. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #4 SOC PROJECT ENGAGEMENT ClearCost US will provide professional services (or “Consulting Services”) for the purpose of a Service Organization Controls 2 (“SOC”) engagement covering the System Description, Information Security and the Critical Controls Table and other components within SOC. This engagement will NOT cover any Out-of-Scope Areas of Control shown in table below. ClearCost may also provide guidance on building a central repository for housing all the supporting SOC documentation. Specific SOC components for SOC Compliance: SOC Component Critical Control Area System Description Company & Services In Scope Information Security IT Operations & Controls In Scope Readiness Planning & Strategy On-Going Meetings with Audit Firm and Setting Target Requirements In Scope Critical Controls Section Security In Scope Critical Controls Section Availability In Scope Critical Controls Section Processing Integrity In Scope Critical Controls Section Confidentiality In Scope Critical Controls Section Privacy (includes PHI & HIPAA) In Scope Governance, Policies & Procedures Repository, Processes, Training & Documentation In Scope Infrastructure & Monitoring All Items Technical Services In Scope Evidence & Audit Procedures, Timing, Expectations, Resources In Scope Management Assertion Performed by Audit Firm Out of Scope Fairness & Evidence Report Performed by Audit Firm Out of Scope ClearCost consulting services will include guidance and readiness for the SOC audit, however ClearCost will not include any legal advice or direction for implementing controls, procedures or policies within the CLIENT data center facility, meaning that CLIENT employees will be responsible for creating the proper governance, controls and procedures for each component of Critical Control Targets within the Critical Controls Criteria. The Audit Firm will provide services marked in Light Blue, ClearCost consultant(s) will Lead for the following components in Red, with the CLIENT Lead subjects noted in Dark Blue. Assertion System Description Critical Control Targets & Execution SOC Reporting Fairness & Evidence Strategy & Planning Policies & Procedures Information Security Readiness Assessment SOC Training Infrastructure & Monitoring Uploading Evidence Providing Evidence Fairness Meetings, Status Meetings, Critical Control Target Reviews, and Compliance Documentation Reviews Assertion Approvals
  • 5. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #5 Engagement Process
  • 6. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #6 Critical Controls Process This engagement will include guidance and framework for the System Description, Information Security and Critical Controls Table (Five Areas) that are suitable for Type 1 or Type 2 reporting. Services will also identify risk assessment gaps within the control domains and remediation recommendations before the pre-audit and audit process. ClearCost services will include reviewing controls related to Change Management, Breach Compliance, Help Desk, Client SLA’s, Change Authorization Board Governance, SOC Training, Quarterly SOC Leadership Meetings and HR Controls for meeting compliance. The diagram covers the Lead Responsibilities for setting the Critical Controls Language and Targets. Critical Controls: Assessments, Language & Targets Define Governance, Security, Policies & Controls Execute Governance, Security, Policies & Contols Achieve Compliance & Evidence Gathering Evidence Review & Evidence Uploads ClearCost Lead Joint Efforts CLIENT Lead
  • 7. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #7 Areas of Required Critical Controls
  • 8. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #8 Five Principles of Critical Controls SOC 2 reports focus on controls at a service organization relevant to the following principles: • Security: The system is protected against unauthorized access (both physical and logical); end-point security, Network, DC’s and Cloud environments, • Availability: The system is available for operation and use as committed or agreed SLA’s, • Processing Integrity: System processing is complete, accurate, timely, and authorized, • Confidentiality: Information designated as confidential is protected as committed or agreed, and • Privacy: Personal information collected, used, retained, disclosed, and destroyed in conformity with the commitments by CLIENT criteria set forth with regards to Health Insurance Portability & Accountability Act of 1996 (“HIPAA”) and Personal Health Information (“PHI”) privacy principles. Types of Reporting The types of reporting are: • Type I or Report 1 - A report on management’s description of the service organization’s system and the suitability of the design of the critical controls - at one- point-in-time, • Type 2 or Report 2 - A report on management’s description of the service organization’s system and the suitability of the design and operating effectiveness of the controls – during the duration of time, • Fairness and Evidence Process – What controls and required, how controls are defined, who is responsible for controls, maintain service levels per client contracts, adhere to standards, and produce evidence during the audit period. CLIENT Leadership Meetings Quarterly Meetings with the CLIENT Leadership Team for meeting compliance: • Predict, Monitor, Identify, Mitigate and Address areas of Risk and implement a proper Risk Mitigation strategy • Controls for understanding the Compliance and Risk associated with the data and metadata that: ✓ operates, ✓ collects, ✓ processes, ✓ transmits, ✓ stores, ✓ organizes, ✓ maintains and ✓ disposes of information for our client’s entities.
  • 9. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #9 Project Approach and Execution Below is a systematic approach to our SOC Strategy, Analysis, Design, Governance, Readiness, Testing, Execution and Audit criteria and controls for the project.
  • 10. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #10 ClearCost Responsibilities This assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment. ClearCost will not perform any evidence gathering or write in documentation for the CLIENT environment outside of the noted areas of services shown in the deliverables table on next page. Consultant will be responsible for leading the following: • Project Kick-Off Meeting, • Project Status Meetings, • SOC Overview Status Reporting, • System Description Delivery, • Information Security Delivery, • Critical Controls Targets, • Change Management, Infrastructure & Compliance Meetings, • Pre-Audit Run Through, • Evidence Uploading and, • SOC Leadership Management DAR’s. CLIENT Responsibilities Because this assessment engagement is designed to provide reasonable, but not absolute assurance on all controls and governance within the data center environment, ClearCost will not perform any examinations of systems, data or application transactions within the CLIENT environment, and not responsible for any breaches outside of the noted areas of services in project scope section. In addition, the assessment services cannot be relied on for any instances of non-compliance with laws of regulations, fraud or material errors attributed to CLIENT personnel. CLIENT will understand its responsibility to inform, train and clearly communicate the security, availability, confidentiality and privacy that fall under the SOC regulations and responsibilities. Meaning that CLIENT understands its responsibilities to proper training and testing systems within the user community. CLIENT will be responsible for the following: • Maintaining the content for System Description and Information Security documentation, • Managing content of Critical Controls Table throughout the consulting engagement period and then until the final term after the official audit, • Providing all services to support and compliance of the Critical Controls Table functions, • Having personnel available for designing, implementing, documenting the controls suitable for operation effectiveness to fulfill the trust services criteria, • Providing supporting documentation for the following; governance, workflow, organization structure, information systems, and third-party contracts, • Participating in interviews, walk though reviews and evidence support to understand the elements within the Critical Controls Table, • Provide ClearCost consultants with proper and reasonable access to resources in a timely manner, and • Provide personnel for recording meeting notes, minutes and documenting recommendations during the consulting engagement.
  • 11. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #11 MAJOR COMPOMENTS OF PROJECT ENGAGMENT The following tasks are major components of deliverables for the consulting services engagement: (Contact ClearCost for receiving IP information within the following sections) Subject Task Est. Dates (*) Estimates are based on very limited information on the CLIENT Organization’s Capability Maturity Level Integration (aka “CMM” or “CMMI”) and what is currently available at the time of engagement. However, after the Project Kick-Off Meeting a ‘High-Leve’ Project Plan will be created to provide better accuracy and only ACTUAL time worked on the specific tasks will invoiced for the project.
  • 12. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #12 Project Deliverables & Documentation ClearCost Consultant(s) deliverables for the project include: Documents Format Project Planning (modification of this template) MS Word Monthly Project Status Reports PDF SOC Project Kickoff PDF System Description Template MS Word Information Security Template MS Word Critical Controls Table MS Excel Change Management Controls MS Word and/or Visio SOC Training Template PPTX SOC Integration Framework Poster 24”x 48” Poster Compliance & Readiness Templates MS Word Risk Assessment Quarterly Meeting Agenda Template PPTX Risk Assessment Worksheet Excel
  • 13. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #13 SOC Compliance & Readiness Templates Project templates may Include the following: ✓ Employee Handbook ✓ Employee Training Manuals ✓ Employee Job Descriptions ✓ Consultant or 3-Party Contractor NDA’s & Contracts ✓ Client, Vendor and 3-Party MSA’s ✓ Cloud or DC Infrastructure Diagrams ✓ Monitoring & Escalation Policy ✓ Asset Manage (CMDB) Table ✓ Risk Assessment Quarterly Agenda ✓ Risk Assessment Worksheet ✓ Breach Notification ✓ HIPAA Privacy Policy ✓ Terms of Acceptable Use Policy ✓ Incident Response Process ✓ Change Management Process ✓ Help Desk Process ✓ HIPAA / PHI Security Practice and Certification Manuals ✓ SOC Training Certifications
  • 14. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #14 SOC INTEGRATION FRAMEWORK The following SOC Integration Framework will be used for the Project Execution. Business Objectives Project Execution & Milestone Tracking Analysis, Strategy, Architecture, Apps & Processes Mapping, Approach & Budgeting Mark SMahre SOC-2 Integration Framework PLANINITIATE Suitability, Remediate & Pre-Testing AUDIT C-Level , Security Officer, Analysts, Subject Matter Experts, Project Managers & Consultants Assessment, Resources & Templates Sponsors Strategy, Requirements & Roadmap Business Case Project Scope Success Criteria HIPPA Req. Road Map Approvals Project Design Project Tasks Risk Assessment As-Is Assessment Financials Scheduling Project Timeline Resource Requirements Gap Analysis To-Be Requirements Create Templates Identify Partnerships SOC Governance HIPPA Mandates Status Reporting Change Controls Authentication Encryption Controls Project Kick-Off Auditor Assessment Employee Awareness Critical Controls System Description Information Security Operational Effectiveness Controls Testing Readiness Reviews Quarterly Meetings Monitor Results Lessons Learned Upload Evidence Audit Procedures Sampling Process SOC Compliance Report Auditor s Letter SOC Gap Letter DESIGN CONTROLS OPERATIONAL Execution, Sustainability & Reporting Risk Mitigations Suitability of Design Data RPO/RTO DR/BCP Strategy Incident Response Cloud Services Mahre & Schweizer 2017 Auditor Analysis Testing, Sampling & Fairness Task Owners: Assigning the Task Owners (Stakeholders / SPOC) for each task in the tables below. CXO & Leadership CISO CIO COO Legal CFO PMO SOC Team Security Team IT Team Operations Team Contracts Team Finance Team Consultants
  • 15. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #15 RECORDING TASKS AND KEY OBJECTIVES: (Contact ClearCost for receiving IP information within the following sections) Mapping & Approach: Readiness & Resources: Analysis, Architecture & Processes: Suitability, Remediate & Pre-Testing: Execution, Sustainability & Reporting: Testing, Sampling, and Fairness:
  • 16. Methodology Created and Documented by Written Mark S Mahre ClearCost US Reserves all rights for information contained within this SOC Integration Runbook Page #16 IN CLOSING Comments and Next Steps Analyze, Predict, Plan, Test, Implement and Improve End of Document