Could you please make full practicle video on soc1 and soc2 audit
@Vistainfosecofficial
Жыл бұрын
Dear Manoj, we appreciate your interest in our content. We’ve already uploaded numerous videos on SOC1 and SOC2. However, we understand your need for a practical video on these topics. Rest assured, we’ll work on creating that for you. In the meantime, please visit our website for more insights. Thank you!
@stephenjames8107
3 жыл бұрын
When do SaaS companies that handle sensitive data complete their SOC1/SOC2 audits?
@redsoxwinagain2007
2 жыл бұрын
Usually anually but set by them. It’s based on a 6-12 months of operating time with 12 months being standard.
@Vistainfosecofficial
Жыл бұрын
A SOC2 Report is only valid for a year or 12 months from the date of issue. As per the Industry Standard requirement, a SOC2 Audit must be performed annually, or after significant changes are introduced that may impact systems and control in an environment.The it takes 8 weeks to 12 weeks for completing SOC1/SOC2 Audit. However, depending on many other important factors such as the scope of your audit and how many controls are necessary the timelines may vary.
@elliotjim1351
3 жыл бұрын
Why are SOC 2 audit reports essential for business?
@redsoxwinagain2007
2 жыл бұрын
Because they are a good base to see that minimal controls are in place and working. The reports are very objective but also include and auditor opinion. That said, they have to go by what evidence was submitted and report on how they tested your controls. Suppliers are the biggest risk to most businesses. A SOC audit and report is evidence that the company has been evaluated by a 3rd party against a minimal standard.
@Vistainfosecofficial
Жыл бұрын
SOC 2 reports are essential documents that provides valuable insights into the organization's internal controls, security risk, security posture, and vendor management. The SOC2 Report indicates that an organization maintains a high level of information security and further provides assurance that they have taken all measures and steps to ensure Security, Privacy, Confidentiality, Process Integrity and Availability of critical data.
@SudiptaDebsufideb
Жыл бұрын
Was expecting a comprehensive explannation but it was very basic
Пікірлер: 10